1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
11

Read the sentence from the passage and answer the question that follows: His many legs, pitifully thin compared with the size of

the rest of him, waved about helplessly as he looked. What does the word "pitifully" suggest about Gregor's legs in their current state? They are enormously long but very thin at the same time. They are delightfully trim compared to the rest of his body. They create a majestic look as they are paired with his large body. They help create an overall pathetic appearance.
English
2 answers:
arlik [135]3 years ago
7 0
They help create an overall pathetic experience.
Arturiano [62]3 years ago
5 0

the meaning of pitifully would mean that it would create an overall pathetic appearance. for instance "the dog wined and cried pathetically this is an example of of something or someone being pitifully.

You might be interested in
Identify the examples of persuasive writing. ( multiple choice)
o-na [289]

Answer:

6.

Explanation:

It is option 6 because they are trying to get you to believe that Spain is one of the most appealing countries. Which is called purseueding you and is an example of persuasive writing.

4 0
3 years ago
Why do you think any journalist would plagiarize or fabricate a story?
pickupchik [31]

...

Explanation:

They might fabricate a story because they want to stir up drama or they want to make the person they are taking about look bad

6 0
3 years ago
Write two original sentences, one containing an adjective phrase and one containing an adverb phrase.
german
Original I tookedbthe test so yea bye
8 0
3 years ago
Read 2 more answers
Information flow is a useful mechanism that can enforce a variety of security policies that are hard to describe in simple acces
I am Lyosha [343]

Answer / Explanation

For proper clarity, we redefine information flow as the navigation of data between humans and systems.

A proper and well secured mode of movement of information or data flow information flow is a critical factor when considering the performance of a process, decision making and in communications. The following are common types of information flow.

It should also be noted that the advantages of an information flow process can not be over emphasized.

Referring back to the question where we are being asked to describe how information flow serve as a building block to curb attacks can also point back to some of its advantages.

(1) Buffer Overflow attack: This can be described as an abnormal behaviour where a program while writing data or transferring data to a buffer exceeds the buffer's boundary and overwrites to adjacent memory locations which may result in abnormal program behavior including memory access errors, incorrect results, and crashes.  We should also understand that buffers are allotted areas of memory set aside to hold data, often while moving it from one section of a program to another, or between programs. Thus, information flow helps to curb the buffer overflow attach by setting a boundary limit in the process of transfer of communication between the program and the buffer therefor casing a stoppage in the overwrite process of a buffer overflow.

(2)  This can be likened to the page catch attack or Directory Traversal Attacks  where an attacker is are able to traverse out of the current directory into parent directories usually by supplying a series of “../” (dot dot slashes). Sometimes it is possible to back out of the root directory of the Web server and traverse into other directories on the file system. Typically, directory traversal attacks allow the attacker to access or overwrite files that are not intended to be accessible. Now to link the attack, it should be noted that the attacker tries to overwrite the buffer therefore intentionally creating a loophole in the program. Thus, by implementing the information flow, we can also curb this.

(3) This can be likened to the aforementioned process. If passwords are accidentally stored in a location where it is accessible to everyone, then it posses a risk of it being hacked or the password being changed. However, to prevent this, we can simply make use of the clear catch or clear buffer catch process, this way, we are sure of the security of the transfer of data which also streamlines it down to one of the functionality of the information flow process.

3 0
3 years ago
What type of pronoun should the writer replace Leonie with?
miss Akunina [59]

Answer:

Reflexive her or she

Explanation:

Because you're talking about a person who has feelings& can do things on their own & if you were talking about a dog or something that isn't alive you would have given or replaced it with a It pronounce

5 0
1 year ago
Other questions:
  • I realized that, though ties of blood made us kin, though I could see a shadow of my face in his face, though there was an echo
    14·2 answers
  • SOMEONE PLEASE ANWSER PLEASE MY ASSIGNMENT IS DUE TODAY IT'S A MULTIPLE CHOICE QUESTION, PART A: Which TWO of the following best
    7·1 answer
  • Sam and Chris are engaging in small talk, and looking for things they might have in common, a quest for similarities facilitated
    7·1 answer
  • What is the form of the word ANALYSIS?
    8·2 answers
  • If your name was Ashley what won’t you like about it?
    15·2 answers
  • What is the function of the phrase "with the oversized hat"?
    7·2 answers
  • What do you think the Canadian government should do in order to honour treaty rights?
    12·1 answer
  • Read the sentences below, identify the adjective, verb, and adverb. Box the adjective, underline the verb, encircle the adverb i
    14·2 answers
  • What is the definition of the word powerless?
    7·2 answers
  • The authors purpose in writing this selection is to _________
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!