I'm pretty confident I know the answer to this. The matching law states that the proportion of responses will match the proportion of reinforcers obtained for each alternative.
I'm a little confused by this question. Is job analysis really the first step, or is there something else that comes before it? I'll have to review my notes to be sure.
Social engineering seems like a possibility too. The attacker may have tricked Andrew into revealing the password somehow. I'll make sure to consider all the options carefully.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Bo
4 months agoOdette
4 months agoSherman
4 months agoTegan
4 months agoFreida
5 months agoJohnetta
5 months agoRolland
5 months agoSheridan
5 months agoBrittni
5 months ago