Sociology Questions
Explore questions in the Sociology category that you can ask Spark.E!
an attack method that takes all the words from a dictionary file and attempts to log on by entering each dictionary entry by password
a computer attacker who tries to break IT security for the challenge and to prove technical prowess
True or False: According to the Rise and Fall Theories of Social Change modern societies are "more evolved" than earlier "primitive" ones.
Which theory is best represented by the following statement? "A social movement will succeed if it can develop an organization and leadership to advance its cause."
an undocumented and often unauthorized access method to a computer resource that bypasses normal access controls
a computer attacker who has hostile intent, possesses sophisticated skills, and may be interested in financial gain
Your sociology class this semester is an example of a/n what?
The abolition of slavery, suffrage movement, and Arab Spring are all examples of what?
a text file sent from a web site to a web browser to store for later use. cookie contain details gleaned from visits to a web site
As discussed in the lecture President Obama, President Trump, and President Gee would be considered what types of leaders?
True or False: According to the Structural Functionalist perspective, social change is inevitable and necessary.
a software program that collects information about internet usage and uses it to present targeted advertisements to users
What is a collection of people, not necessarily in direct contact with each other, who are interested in a particular issue?
True or False: Collective behavior is a state of mind.
Milgram's research as discussed in lecture demonstrated how people what?
Which of the following is not identified as a micro sociological explanation for joining a social movement?
a method that black-hat hackers use to attempt to compromise logon and password access controls. Brute-force password attacks usually follow a specific attack plan, including the use of social engineering to obtain user information
any item that has value to an organization or a person
Grace and Mia are "friends" on facebook.com. They have only met once, but frequently post messages on each other's "wall." Grace and Mia consider the other among their "best friends".
Chris started using drugs when he was 17. By the time Chris turned 20 he was living on the streets. According to Merton, Henry is a what?
