John Adams 1797 - 1801 Federalist
3. Thomas Jefferson 1801 - 1809
4. James Madison 1809 - 1817
5. James Monroe.
Answer:Some of the steps taken by the central and the state governments in the country are:
road traffic rationing,
increasing green cover along side roads,
sprinkle water on trees nearby the roads,
vacuum cleaning of roads,
promoting Swachh Bharat Abhiyan,
cleaning of rivers and water bodies
Explanation: I mean there’s more but I’m not gonna type that much like I do other times.
Answer: Karen is following the use of secondary source.
Explanation:
A secondary source is a source found referenced in another source. Take for instance, if you are reading a research article by Kola (2014) and Kola quotes or refers to
the information previously published by Temi (2006), referring to Temi in your own work would be considered a secondary source—i.e., you are not citing Temi’s original research, but rather Kola’s reference to Temi’s research.
<u>Authority, familiarity, trust, consensus, scarcity, urgency, intimidation, and social proof</u> are the factors that contribute to the effectiveness of social engineering techniques.
<h3><u>How does social engineering work?</u></h3>
A wide variety of malevolent behaviors carried out via human interactions are referred to as social engineering. It uses psychological trickery to persuade people to breach security or divulge private information. Attacks using social engineering take place in one or more steps.
A culprit first looks into the target in order to obtain background information, such as possible avenues of entry and lax security measures, needed to carry out the attack. The attacker then makes an effort to win the victim's trust in order to offer motivation for later actions that violate security protocols, including disclosing private information or allowing access to vital resources.
Learn more about engineering techniques with the help of the given link:
brainly.com/question/24002168
#SPJ4