1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inna [77]
3 years ago
11

What behaviors are Buddhists advised to abstain from in pursuit of right conduct?

Social Studies
1 answer:
krok68 [10]3 years ago
4 0
<span>1. They are advised to abstain from using foul language, lying, slandering, gossiping and backbiting to promote right speech.
2. They are advised to abstain from taking life of a living being, using violence, being dishonest, stealing, taking drugs or liquor and showing disgraceful sexual behavior to promote right action.
3. They are supposed to abstain from earning a livelihood by means of a profession t</span>hat may harm others like dealing with drugs or weapons; this is important for right livelihood.<span>
</span>
You might be interested in
________ is the kind of stress that exceeds the optimal level
scoundrel [369]

Answer: Distress

Explanation: Distress is the amount of stress that we consider excessive and for intance, results in an overreaction of the body causing diverse symptoms.

Every person has its own level of tolerance and not every person is distressed by the same things.

3 0
3 years ago
The Act allowed the U.S. government to hunt down, detain, and prosecute alleged terrorists.
Stells [14]

It was the Patriot Act.  This was the result of the attacks on September 11, 2001 that led to the destruction of the World Trade Center.  It called for more aggressive actions to fight terrorism. Among them were the arrest, detention and trial of terrorists.  It also called for removing barriers to data gathering and terrorist investigation.  Opponents criticized because of its treatment of detainees and the extreme measures taken against terrorism.

3 0
3 years ago
For each of the following situations, identify the type of threat to internal validity from the list.
shtirl [24]

Answer:

a) The researcher tested the effectiveness of a new method of teaching drug dosage and solution calculations to nursing students using a standardized calculation examination at the beginning, midpoint, and end of a 2-week course. - MATURATION.

b) In a study of the results of a hypertension teaching program conducted at a senior center, the blood pressures taken by volunteers using their personal equipment were compared before and after the program. - INSTRUMENTATION.

c) The smoking cessation rates of an experimental group consisting of volunteers for a smoking cessation program were compared with the results of a control group of people who wanted to quit on their own without a special program. - SELECTION BIAS.

d) Thirty percent of the subjects dropped out of an experimental study of the effect of a job- training program on employment for homeless women. Over 90% of the dropouts were single homeless women with at least two preschool children, whereas the majority of subjects successfully completing the program had no preschool children. - MORTALITY

5 0
3 years ago
If disclosure of a subject's involvement in a specific research study can be potentially harmful to the subject, and the consent
sergey [27]

Answer:

D. Obtain a waiver of documentation of informed consent.

Explanation:

The most helpful approach to protect the subject identity is to obtain a waiver of documentation of informed consent, with this, the researcher does not need the subjects signature and name of the subject on the consent form hence the subjects identity is protected, or the consent form can be entirely waived, or the documentation of the subjects consent form can also be waived. It is a provision by the IRB.

7 0
3 years ago
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering
olga55 [171]

Answer: Brute force attack

Explanation:

Brute force attack is the attack that is carried out by pressing every key from the device to crack the correct username and password of any authorized user .It is considered as the hacking technique in which attacker captures the network of the user.

To counter brute force attack, neutralizing the system is possible solution before attacker can access the network. If the attacker enters the network then preset number of login attempts should be implemented on the system.In this way, account will get disabled after determined number of failed attempts.

Thus, the attacker would not have the opportunity to try every key for gaining the right password and username.

8 0
3 years ago
Other questions:
  • The most powerful religious force in contemporary american society is the
    15·1 answer
  • After Alison saw her sister knock an earring down the drain after setting them next to the sink, Alison began putting her earrin
    12·2 answers
  • How is the president able to have more power than what is said in the constitution?
    11·1 answer
  • How did the crusades impact trade in Italy
    14·1 answer
  • Which situation best illustrates the function of money as a measure of value?
    5·2 answers
  • Simon Bolivar led the Latin Revolutions against this European Power
    7·1 answer
  • What are groups of people in one place who are ruled by a parent<br> country elsewhere
    10·1 answer
  • which of the following describes the process of conversion to eastern orthodox christianity in kievan rus?
    10·1 answer
  • Molly looks at a yellow notebook under sunlight conditions and she perceives it to be yellow. When she looks at it indoors under
    9·1 answer
  • WILL GIVE BRAINIEST TO CORRECT ANSWER
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!