Answer:Sorry I didn’t write this in the comment but it didn’t let me but
Explanation:so some questions I would like to meet..? Lol
In the period of the Sui Dynasty (581-618 AD), Chang’an before was named Daxing. However, in a later time, the city got new reformations and innovations and was renamed Chang’an by the Tang dynasty administrators which then served as the Tang capital until its collapse in 904 AD.
This ancient imperial capital was the eastern commencement point of the Silk Road. The Silk Road has been of an enormous importance to the trade and cultural exchange to Xi’an (formerly Chang’an) as well as important crossroads for people from entire China, middle east, Rome, and Central Asia. The city thus developed into a hub of diverse ethnic recognition and religious beliefs.
In addition to the above, the tang dynasty manifested a tremendous cultural and religious fluorescence when it grew into a Buddhist learning center and also Taoism, attracting many pilgrims, and other scholars as well as philosophers. This didn’t end only with Buddhism, many other faith denominations emerged such as Nestorian Christianity, Zoroastrianism and Manichaeism, and later Islam.
therefore, the factors that made the tang cipital of Chang'an a center of culture and trade were mainly A and C; It welcomed foreigners and their beliefs, it was located at one end of the silk Road.
Trade along the Silk Road has had the following effects on the world around 1000 CE:
A.) People in South and Eaat Asia ate foods grown in the Middle East.
D.) People in South Asia has access to materials such as silk and glass.
8 the answer would be approximately 7 feet layers to the ground above the awarefewt
Answer:
Active Session Hijacking
Explanation:
Based on the information provided within the question it can be said that the type of attack being described is called an Active Session Hijacking. Like mentioned in the question this refers to an attack on an active TCP/IP communication session, where the attacker gains access to the communication and assumes the identity of the user that has been hijacked and disconnected.