1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
14

In which excerpt does Sir Gawain display honesty and modesty by publicly acknowledging his failings in Arthur’s court?

English
1 answer:
natima [27]3 years ago
6 0
C) "Behold , sir," said he, and handles the belt, "This is the blazon of the blemish that I bear on my neck; This is the sign of sore loss that I have suffered there; For the cowardice and coveting that I came to there; This is the badge of false faith that I was found in there,...
You might be interested in
DOES ANYONE KNOW A BOOK BASED ON THIS PLOT PLEASE ASAP HELP
Harlamova29_29 [7]

Answer:

A heartbeat at a time

Explanation:

This book is very similar to the dilemma you explained, hope this helps ;).

5 0
3 years ago
What does Martin Luther King predict will happen if justice is denied African Americans
liq [111]

<em>Answer:</em> King predicted major segregation if racial justice could not be promptly achieved. Martin Luther King is an African-American activists and reformist that pleads for racial discrimination of Africa-Americans.

                                             I hope this helps you!

8 0
3 years ago
How does a writer create unease with negative diction
nalin [4]
Hey there! So diction basically means what words that the author uses. If they use certain words together, it can create the mood, which in this case is unease. An example might be using words like, "dark", "shadow", "creaking", "silence", or "creepy" in a horror/ scary story. When used together in the story, it can create the mood that something bad migjt happen. The author choses these words carefully to fit the passage. In otherwords, he would not use happy words if writing a horror story.
8 0
3 years ago
Jess is writing an informational essay on the benefits of listening to music while you study. Which of the following is an effec
Marta_Voda [28]

An effective hook used by Jess when writing an informational essay on the benefits of listening to music while you study is B. If there was a guaranteed way to be sure to answer at least 75% of the questions on an exam correctly, who wouldn't utilize it?

This is an effective hook because it grabs the attention of the reader and they would be eager to read the remaining essay so they would find out how to answer at least 75% of the questions on an exam correctly

<h3>What is a Hook?</h3>

This refers to the use of persuasion to draw the attention of a person to a piece of writing that is popular among marketers.

Hence, we can see that based on the fact that Jess when writing an informational essay on the benefits of listening to music while you study, an effective hook is given above.

Therefore, the correct answer is option B.

Read more about informational essays here:

brainly.com/question/329730

#SPJ1

7 0
2 years ago
Describe how a significant cybersecurity event has led to increased organizational focus on cybersecurity.​
hoa [83]

Answer:

A ‘Cyber Security Breaches Survey 2018’ revealed that over four in ten (43%) businesses and two in ten (19%) charities in the UK suffered a cyberattack. The survey found that 38% of small businesses had spent nothing at all to protect themselves from cybersecurity threats. A separate survey also found that a third of UK small businesses are risking their online safety by operating at or below the “security poverty line”. The most frequent types of cyber-criminal activity were sending fraudulent e-mails and impersonating organizations online. Malicious e-mails were also found to be the most common type of cyberattack in the Internet Security and Threat Report. The consequences of cyber-crime are costly as the total average cost of a data breach in 2019 is $3.92 million in research conducted by the Ponemon Institute.

Explanation:

What is Cybersecurity?  

Cybersecurity is making sure your organizations data is safe from attacks from both internal and external bad actors. It can encompass a body of technologies, processes, structures, and practices used to protect networks, computers, programs, and data from unauthorized access or damage. The goal of any cybersecurity strategy is to ensure confidentiality, data integrity, and availability.

There are several primary means by which cybersecurity issues can affect (or even destroy) an organization and its reputation. There is the risk that a hacker might obtain sensitive information such as bank account or credit cards details. There are open markets for such information on the “dark web”. If others access such sensitive information, the organization might find its banking or credit card facilities withdrawn or in breach of privacy laws. Each month high-profile security breaches impacting individual data are reported globally.

A second but related issue is that when a hacker obtains sensitive information about the organization it may find its reputation ruined. Few small organizations can survive the damage to its reputation that such lost data might cause. The damage to reputation and goodwill might be more crippling than the actual data loss itself. Loss of customer data may result in legal or regulatory action against the organization. A third party might file a suit against an organization as they have themselves incurred a loss. Organizations might also be subject to significant penalties and/or legal action arising from breaches of the privacy laws in many jurisdictions.

The most recent and alarming aspect of cybersecurity that causes considerable problems for organizations is ransomware. As early as 2012, reports of ransomware campaigns have adopted commercially focused business models. In many cases, a piece of malware is disguised and embedded within another type of document only waiting to be executed by the target user.  Upon execution, the malware may encrypt the organization’s data with a secret 2,048-bit encryption key or communicate to a centralized command and control server to await instructions carried out by the adversary. Once infected, the organization’s data continues to be inaccessible as the encrypts the data using the attackers encryption key. Once all the data accessible is encrypted, including in many instances the backup data and systems, the organization will be instructed on how to pay a ransom within days, or the adversary will remove the encryption key and the data will be lost. Literally, the adversary holds the data to ransom—hence, ransomware. The encryption key is sufficiently strong enough that cracking the key instead of paying the ransom is uneconomic—some estimate that an average desktop computer would take five quadrillion years to decrypt the data without the key In some cases, the target organization can hope that some researchers may have discovered a way to decrypt the data based on a design flaw. Otherwise the organization will have to look to restore the systems and data from a safe back up or consider paying the ransom. Keep in mind that even data restoration does not eliminate the risk the ransomware will not be reenabled or return based on the compromised integrity of the environment.

7 0
3 years ago
Other questions:
  • PLZ HELP WILL GIVE BRAINLIEST AND 50 POINTS
    12·2 answers
  • Which spelling rule applies to the word ancient?
    8·2 answers
  • 9. How is Zaroff's philosophy on hunting different from Rainsford's?
    5·1 answer
  • Order the topics from broadest to narrowest
    14·2 answers
  • Read the excerpt from "the Gettysburg address"
    13·1 answer
  • On which principle do Descartes and Galileo agree?
    6·2 answers
  • An inference that the writer wishes us to make is
    7·1 answer
  • women were recruited for jobs vital to the war effort on the home front. which is an obstacle they faced?
    11·1 answer
  • 90 Points. and put only the numbers
    14·2 answers
  • Re-write the question:<br>I've arranged to give my wedding party next week. Use "am"​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!