1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
2 years ago
10

Lisa, who is 4 months pregnant, has contacted a social worker several times at the community health clinic to plan for the futur

e of her child. During her last visit, she confided that she is addicted to heroin. The social worker has expressed his or her concern that the drug may harm her unborn child, but she does not seem worried and does not want to give up use of the drug. The social worker also knows that she obtains money for heroin through prostitution and is living on the street. Explain how Lisa's unborn child's rights supersede Lisa's right to confidentiality.
Social Studies
1 answer:
Papessa [141]2 years ago
5 0

Answer:

ok wow

Explanation:

The child is at risk of dying or being addicted to this drug upon birth. If she is living on the street and a prostitute, the baby is at risk of being born with an STD (yes that has happened) and generally being unsafe. She will not have anywhere to put this baby after she has it and the streets can be cruel. The baby could be killed, raped, sold, murdered etc. The child's safety in this case supersedes the mothers

You might be interested in
Daven, age 20, visits his 80-year-old grandma, vivian. daven warns vivian that he worries she could fall victim to "phishing." v
Arturiano [62]

When someone contacts you by phone or email and requests personal information that they can use to steal your identity, this is known as identity theft. This is further explained below.

<h3>What is identity theft?</h3>

Generally, To commit the crime of identity theft, also known as identity fraud, an impostor must first collect significant pieces of personally identifiable information (PII), such as a person's Social Security number or driver's license number, in order to assume the identity of another person.

In conclusion, It is referred to as identity theft when a person approaches you by phone or email in order to obtain personal information that they may use to steal your identity and utilize it for their own benefit.

Read more about identity theft.

brainly.com/question/17112484

#SPJ1

3 0
1 year ago
When a client calls a "dog" a "bog", this is an example of ____?
Lilit [14]
<span>Literal or phonemic paraphasias</span>
3 0
3 years ago
Why is the constitution considered a living document?
chubhunter [2.5K]
Yes because it was going to adapt in the future of how America will live
3 0
3 years ago
What does teresa’s behavior in the school setting in "seventh grade” help gary soto reveal about her character? she has a diffic
Shkiper50 [21]

Answer: The correct answer is she has a quiet and kind nature.

Explanation: Victor and Teresa are the characters in "seventh Grade" by Gary Soto.

6 0
3 years ago
Read 2 more answers
Which slogan is associated with the bolshevik (russian) revolution?
skad [1K]

The slogan associated with the bolshevik (russian) revolution is “Long live the revolution!”. Russian Revolution groups all the events that led to the overthrow of the tsarist regime and the prepared restoration of another, Leninist<span> , then between February and October 1917.</span>

7 0
3 years ago
Other questions:
  • Canadian citizen Michael Hallat began visiting Trader Joe's grocery store in Bellingham, Washington several times a week. While
    7·1 answer
  • Researchers at one point in time assess and compare the performance of different age groups on the SAT. The procedure used in th
    13·1 answer
  • How many people speak french at home in the u.s?
    12·1 answer
  • Construction of a solar power plant is proposed for a desert area near a school. a student has hypothesized that the shade cast
    9·1 answer
  • Social studies please help thank you!!
    14·1 answer
  • How does scarcity make countries interdependent?
    9·1 answer
  • CHKDSK is a system utility that is commonly found in Windows. What is CHKDSK? Use the Internet to research and write about CHKDS
    6·1 answer
  • Genghis Khan is remembered as both a brutal warrior and effective
    15·1 answer
  • Statutory laws are created by __________________ at the local, state, and national levels.
    6·2 answers
  • The graph above represents
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!