Sociology Questions
Explore questions in the Sociology category that you can ask Spark.E!
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
Others agree that changes have occured with family, but argue that change represents historically expected adjustments to changing conditions in society. Advocates argue that we need to view the family from a historically standpoint. Family changes can be for the better. This refers to the
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4.0, the browser will crash.
____ are software programs that hide their true nature, and reveal their designed behavior only when activated.
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
It is now recognized that men are not equally privileged, nor or women equally disadvantaged; gender is examined in relation to linkages to ______/ __________ and _______ (_______________).
Refers to the idea that there are varied ways to demonstrate masculinity. Three major culturally defined obligations for men involve(1)group leadership,(2)protecting group territory and weaker or dependent others, and(3)providing resources
Sees individuals as enacting culturally fashioned scripts and socially prescribed roles in front of others (everyday-life audiences).
Refers to persons who change gender identity.
masculine people are often thought to have __________ character traits
A family of immigrants or immigrant stock that maintains close ties with the sending country. Identity and behavior connect the immigrant family to the new country and the old, and their social networks cross national boundaries.
There are generally two skill levels among hackers: expert and ____.
Define concepts scientists are investigating.
____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.
feminine people are thought to embody _______ character traits
Involves one or more surgical procedures that change a transgender individual's genitalia or other biological sex characteristics to correspond with the person's gender identity; also called gender reassignment surgery, gender realignment surgery, and more often now gender confirmation surgery.
Is a social construction that reflects how people view varied social groups.
______________ __________, the scientist gathers, analyzes, and reports data primarily in words or stories
This __________ _________________ is apparent in our cultural expectations about how people should behave.
Evolution has put in place certain biological endowments that shape and limit family.