1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
4 years ago
9

.2. What approach to deviance do you find most persuasive: that

Computers and Technology
1 answer:
garik1379 [7]4 years ago
8 0

Answer:

The description for the given question is described in the explanation section below.

Explanation:

Since deviance constitutes a breach of a people's current standard. I believe Erickson's psychological concept that Deviance becomes a trait that is commonly considered to need social control agencies' intervention, i.e. 'Something must being done'.

  • There most probably resulted whenever the rules governing behavior appear inconsistent in just about any particular frame.
  • Therefore the principle of this theory is that even in the analysis of deviance this same significant point seems to be the social community, instead of the participant.
You might be interested in
In excel what happens when rename a sheet from sheet1 to inventory​
makvit [3.9K]

Answer:

Explanation:

The sheet name at the footer of the screen gets changed from sheet1 to inventory.

4 0
3 years ago
Which Creative Commons license type allows others to use and build upon work non-commercially, provided that they credit origina
Vera_Pavlovna [14]

Answer:

Creative Commons license type allows others to use and build upon work non-commercially, provided that they credit original author and maintain the same licensing is described below in detail.

Explanation:

Attribution-Non financially-ShareAlike

This permission lets others adapt, remix, and develop upon your work non-financially, as long as they charge you and license their new inventions under identical times. There are six separate license classes, scheduled from most to least licensed. the material in any mechanism or arrangement, so long as attribution is given to the originator.

8 0
3 years ago
A firewall relies on or a that determine what traffic should or should not be allowed to pass through
likoan [24]
A firewall determines what external network traffic(internet) should or should not be allowed to pass internal network(computer). A firewall is network security that protects software and hardware from untrusted sites that may have viruses, worms, and bugs that are detrimental to the computer.
5 0
4 years ago
An interface that doesn’t contain any constants or methods is called a ____________ interface.
valina [46]
I dont under stand but i think it is a "plane"

4 0
4 years ago
Consider designing a program where you need to store information about every student ASU. You need to be able to quickly determi
gulaghasi [49]

Answer:

Check the explanation

Explanation:

Both Arrays and Linked List can be used to store linear data of similar types, but they both have some advantages and disadvantages over each other. To store information about every student we can use an array

Reason:

In the array the elements belong to indexes, i.e., if you want to get into the fourth element you have to write the variable name with its index or location within the square bracket.

In a linked list though, you have to start from the head and work your way through until you get to the fourth element.

Accessing an element in an array is fast, while Linked list takes linear time, so it is quite a bit slower.

Example: store the data of students and have faster access and this program in example also do sorting

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

// struct person with 3 fields

struct Student {

   char* name;

   int id;

   char age;

};

// setting up rules for comparison

// to sort the students based on names

int comparator(const void* p, const void* q)

{

   return strcmp(((struct Student*)p)->name,

                 ((struct Student*)q)->name);

}

// Driver program

int main()

{

   int i = 0, n = 5;

   struct Student arr[n];

   // Get the students data

   arr[0].id = 1;

   arr[0].name = "bd";

   arr[0].age = 12;

   arr[1].id = 2;

   arr[1].name = "ba";

   arr[1].age = 10;

   arr[2].id = 3;

   arr[2].name = "bc";

   arr[2].age = 8;

   arr[3].id = 4;

   arr[3].name = "aaz";

   arr[3].age = 9;

   arr[4].id = 5;

   arr[4].name = "az";

   arr[4].age = 10;

   // Print the Unsorted Structure

   printf("Unsorted Student Records:\n");

   for (i = 0; i < n; i++) {

       printf("Id = %d, Name = %s, Age = %d \n",

              arr[i].id, arr[i].name, arr[i].age);

   }

   // Sort the structure

   // based on the specified comparator

   qsort(arr, n, sizeof(struct Student), comparator);

   // Print the Sorted Structure

   printf("\n\nStudent Records sorted by Name:\n");

   for (i = 0; i < n; i++) {

       printf("Id = %d, Name = %s, Age = %d \n",

              arr[i].id, arr[i].name, arr[i].age);

   }

   return 0;

}

Output:

Unsorted Student Records: Id = 1, Name = bd, Age = 12 Id = 2, Name = ba, Age = 10 Id = 3, Name = bc, Age = 8 Id = 4, Name = aaz, Age = 9 Id = 5, Name = az, Age = 10

6 0
4 years ago
Other questions:
  • Ooooooooooooooooooooooooooooh im blinded by the lightssssssssss
    11·1 answer
  • Which of the following best describes why Earth’s atmosphere can support life on Earth?
    14·1 answer
  • You use this method to determine the number of items stored in an arraylist object.
    12·1 answer
  • Create a class called Name that will have three fields first name, middle initial, and last name as parameters. Add a constructo
    15·1 answer
  • To illustrate a point in a Word document with a simple chart, what commands should you select?
    8·2 answers
  • Which technology can allow a single ground-based telescope to achieve images as sharp as those from the Hubble Space Telescope?
    7·1 answer
  • When 2 or more computers are connected it is called?
    14·1 answer
  • Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
    10·1 answer
  • Which of these statements about symmetric key encryption is true? The file is encrypted with a private key and can be decrypted
    14·1 answer
  • Resolution of bitmap graphics is typically measured in
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!