Answer:
By passing and enforcing better laws to protect women and children rights
By educating women and children and also educating other members of the society who mistreat women and children
By raising awareness through media
By making women empowered financially and socially
Explanation:
Usually there are two ways to solve a social problem.
1- Internal change through education and changing people's behavior by awareness
2- External Change by introducing and enforcing proper laws
Apart from these media (print and electronic) plays an important role in raising the awareness among people. One such example is <em>The Me Too movement </em>and <em>#MeToo.</em>
If women are financially independent and socially empowered, that too would protect women from discrimination and violence.
Answer:
Stress- inoculation training is a form of cognitive preparation that can be used to minimize the impact of an anticipated threat.
Explanation:
stress inoculation training is a type of therapy called CBT ( cognitive behavioral therapy). This therapy is used to treat traumatic disorders. This therapy is usually a talk training which work to change negative thoughts that arise in one mind.
stress inoculation therapy worked to handle stress and make the people ready to handle stress even more successfully
I think it’s the first one , transportation
<u>Answer:
</u>
An information security professional with authorization to attempt to gain system access in an effort to identify and recommend resolutions for vulnerabilities in those systems is known as a Certified Information Systems Security Professional.
<u>Explanation:
</u>
- The profession of information security involves a great deal fo secrecy and integrity with the work and the client respectively.
- Not all external members are allowed to have access to the sensitive information bore by the government or a private organization.
- Only a person who is trustworthy and legally certified is allowed to have access to such information that too only when vulnerabilities arise and the systems are needed to be secured against those vulnerabilities.