1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
8

"it's never an insult to be called what somebody thinks is a bad name. it just shows you how poor that person is, it doesn't hur

t you." do you agree with atticus's assessment? why or why not? are insults harmless? when might they cause real damage?
Social Studies
1 answer:
Mazyrski [523]3 years ago
4 0
I agree because if its true, there should be no problem in accepting it. insults can be harmless, if your an overall sensitive person, but its just facing truth (if its true.). it may cause real damage if it is false and everyone surrounding hears it.
You might be interested in
Describes how social-networking sites help political campaigns
nevsk [136]

Answer:

Social networking sites  are used just like the present President of United States of America.

Explanation:

Social media have become ubiquitous communication channels for candidates during election campaigns. Social media platforms  enable candidates to directly reach out to voters, mobilize supporters, and influence the public agenda. These fundamental changes in political communication therefore present election candidates with a widened range of strategic choices.

3 0
2 years ago
Many Americans are alarmed about the idea of drone aircraft _____. A. flying over friendly foreign territory B. dropping bombs o
Karo-lina-s [1.5K]
The correct answer is D. flying over United States cities

That's because drones can be used for anything. They can even be used for spying on someone or assassination. That's why people are scared of others spying on them or of something worse happening.
3 0
3 years ago
Which of these mountain ranges represents the Rocky Mountains?
Harrizon [31]

Answer:

2.

Explanation:

3 0
3 years ago
Read 2 more answers
What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through thr
wolverine [178]

Answer: (A) Privilege escalation

Explanation:

 Privilege escalation is one of the type of attack that is typically perform by an attacker for the purpose of designing the flaws and also helps in exploiting the bugs in the different types of software applications and also the operating system.

According to the given question, the privilege escalation is the term which is used for describe about the various types of advantages for unauthorized accessing to different types of resources ion the system.        

 Therefore, Option (A) is correct answer.

4 0
3 years ago
Select the correct answer. Main idea: In a solar eclipse the moon blocks out the sun. Which of the following details supports th
raketka [301]

Answer:

It may be answer no. d.

Am I correct?

5 0
3 years ago
Other questions:
  • Geena brings in her one-month-old baby for her well-baby visit. after the completed examination, the doctor tells geena her baby
    12·1 answer
  • This is the second one
    5·1 answer
  • How does live in Australia show that the country was once a colony of the United Kingdom
    10·1 answer
  • The continental steppe climate is dominant in the Texas high plains true or false?
    9·1 answer
  • 29 Gerakan kaki renanggayabebasadalahgerakanberpusatpada.
    15·1 answer
  • The ethical obligations of a multinational corporation toward employment conditions, human rights,environmental pollution, and t
    8·1 answer
  • Makatuwiran bang baguhin ng isang tao ang itinalaga sa kanyang kasarian batay sa kaniyang sekswalidad
    5·1 answer
  • Florida was once an ocean because pieces of coral reef were found there?
    13·1 answer
  • Which statements reflect Genghis Khan’s leadership? Choose three correct answers.
    11·2 answers
  • What is considered to be the most well-known labor union?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!