1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
12

Select a possible theme of the myth. Gold is a symbol of wealth and authority. Greed can result in negative consequences. People

who expect a reward for good deeds are selfish. Money does not bring as much happiness as friendship.
English
2 answers:
Marizza181 [45]3 years ago
5 0

Answer:

People who expect a reward for good deeds are selfish.

Explanation:

People who expect some kind of reward for good deeds are not necessarily selfish. If they were selfish, they probably wouldn't do good deeds. There is no logical aspect to living up to this statement. Therefore, among the alternatives, this is what I consider a possible myth theme.

mixer [17]3 years ago
4 0

Answer:

Greed can result in negative consequences

You might be interested in
A widely accepted way of thinking or behaving is a ____.
Korolek [52]

A widely accepted way of thinking or behaving is a convention.

It denotes set of generally accepted standards and norms and a way in which something is usually done. Example for convention is shaking hands when greeting someone. Controversial on the other hand is something causing people to have opposing ways.

7 0
3 years ago
Please help me ASAP !!!!
Fynjy0 [20]

Answer:

Yeah, the answer is D

Explanation:

3 0
2 years ago
Argumentative Essay Draft 4 parghraths
Vanyuwa [196]

Essay of why making organic pizza tastes and looks better than bad pizza. Procedural/Argumative Essay

Making homemade pizza takes patience and we like to use mostly organic ingredients. The following are the basic ingredients:

Let’s start with the dough we need:

• 3 1/2 to 4 cups of Bread Flour. Save some for later for rolling.

• 1 teaspoon of Sugar.

• 2 1/4 teaspoons of Instant Dry Yeast.

• 2 teaspoons of Kosher Salt.

• 1 1-2 cups of boiling water. (110 degrees Fahrenheit).

• 2 tablespoons and teaspoons of olive oil.

Next, combine the bread flour, sugar, yeast and kosher salt in a bowl then mix. While it is mixing add boiling water and the 2 tablespoons of olive oil. Stop mixing when the dough turns into a ball. If it is too sticky add 1 teaspoon of flour each time. If it is too dry add 1 teaspoon of water every time until solid. Then fold into a ball. After this, add the remaining 2 teaspoons of olive oil into a bowl, then add the dough into the bowl and let it rest for 10 minutes. After rolling it out on a baking pan is good.  

From here on, you need the tomato sauce. You can either choose to buy jarred sauce or just make your own. To make your own you need:

• 1 to 2 tablespoons of olive oil.

• 3 cloves of garlic minced.

• 1 medium onion chopped finely.

• 1/2 cup of chicken broth.

• 3 15 ounce cans of crushed tomatoes.

• Salt and Pepper.

• Pinch of sugar

• 1 teaspoon of dried oregano.

• 8 to 10 basil leaves chopped.

On the other hand, to make this you add a teaspoon of olive oil into a pan. Then throw in the garlic and onions. Cook for 4-5 minutes. After add the chicken broth. Then whisk and cook until liquid goes down to half leftover. After this add the crushed tomatoes, salt and pepper, a pinch of sugar, basil, and dried oregano. Cook for 30 minutes.

Finally, spread tomato sauce on the dough and spread grated cheese on top. You can even put other ingredients if you'd like to. From here on put the pizza in the oven and let it bake for 10-15 minutes. Finally, Enjoy!

Hope This Helps :)

4 0
3 years ago
Read 2 more answers
I ADDED SOME POINTS PLEASE HELP
zheka24 [161]

Answer:

A) Hope that helps!

Explanation:

6 0
3 years ago
Read 2 more answers
Information flow is a useful mechanism that can enforce a variety of security policies that are hard to describe in simple acces
I am Lyosha [343]

Answer / Explanation

For proper clarity, we redefine information flow as the navigation of data between humans and systems.

A proper and well secured mode of movement of information or data flow information flow is a critical factor when considering the performance of a process, decision making and in communications. The following are common types of information flow.

It should also be noted that the advantages of an information flow process can not be over emphasized.

Referring back to the question where we are being asked to describe how information flow serve as a building block to curb attacks can also point back to some of its advantages.

(1) Buffer Overflow attack: This can be described as an abnormal behaviour where a program while writing data or transferring data to a buffer exceeds the buffer's boundary and overwrites to adjacent memory locations which may result in abnormal program behavior including memory access errors, incorrect results, and crashes.  We should also understand that buffers are allotted areas of memory set aside to hold data, often while moving it from one section of a program to another, or between programs. Thus, information flow helps to curb the buffer overflow attach by setting a boundary limit in the process of transfer of communication between the program and the buffer therefor casing a stoppage in the overwrite process of a buffer overflow.

(2)  This can be likened to the page catch attack or Directory Traversal Attacks  where an attacker is are able to traverse out of the current directory into parent directories usually by supplying a series of “../” (dot dot slashes). Sometimes it is possible to back out of the root directory of the Web server and traverse into other directories on the file system. Typically, directory traversal attacks allow the attacker to access or overwrite files that are not intended to be accessible. Now to link the attack, it should be noted that the attacker tries to overwrite the buffer therefore intentionally creating a loophole in the program. Thus, by implementing the information flow, we can also curb this.

(3) This can be likened to the aforementioned process. If passwords are accidentally stored in a location where it is accessible to everyone, then it posses a risk of it being hacked or the password being changed. However, to prevent this, we can simply make use of the clear catch or clear buffer catch process, this way, we are sure of the security of the transfer of data which also streamlines it down to one of the functionality of the information flow process.

3 0
3 years ago
Other questions:
  • WALTER (lifting his head slowly): Mama . . . I never . . . went to the bank at all . . .
    8·2 answers
  • One characteristic of realistic contemporary drama is
    10·2 answers
  • Someone please help me on this
    12·2 answers
  • In this excerpt from "The Nun's Priest's Tale" in Chaucer's The Canterbury Tales, how is Pertelote, a hen, compared to Hasdrubal
    15·2 answers
  • In "Little Things Are Big," the narrator doesn't help because his is already late.
    5·1 answer
  • PLZZZ HELP WILL GIVE BRAINLIEST!!! Read the paragraph.
    8·2 answers
  • Help please thank you <3
    9·1 answer
  • HELP ME 4 QUESTIONS 30 POINTS!!!!
    8·1 answer
  • PLEASE HELP ME I HAVE 30 MINS TO TURN THIS IN
    9·1 answer
  • 1. Which of the following is an example of depository institutions?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!