1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sauron [17]
3 years ago
14

A valuable product developed during the Song dynasty

Social Studies
2 answers:
gtnhenbr [62]3 years ago
8 0

during this time, people turned to Buddhism to escape their suffering. India .... a valuable product of fine pottery that was developed during the Song dynasty.

qwelly [4]3 years ago
4 0

The actual answer is porcelain.

You might be interested in
Why were the hunger games created?
lapo4ka [179]

Answer:

"The Capitol started the Hunger Games as a way to show the citizens of Panem who was really in charge, and to prevent a similar rebellion that happened in the past from happening in the future."

7 0
3 years ago
Read 2 more answers
Plz help!
Paraphin [41]

Explanation:

Trade was also a boon for human interaction, bringing cross-cultural contact to a whole new level. When people first settled down into larger towns in Mesopotamia and Egypt, self-sufficiency – the idea that you had to produce absolutely everything that you wanted or needed – started to fade. A farmer could now trade grain for meat, or milk for a pot, at the local market, which was seldom too far away. Cities started to work the same way, realizing that they could acquire goods they didn't have at hand from other cities far away, where the climate and natural resources produced different things. This longer-distance trade was slow and often dangerous but was lucrative for the middlemen willing to make the journey. The first long-distance trade occurred between Mesopotamia and the Indus Valley in Pakistan around 3000 BC, historians believe. Long-distance trade in these early times was limited almost exclusively to luxury goods like spices, textiles, and precious metals. Cities that were rich in these commodities became financially rich, too, satiating the appetites of other surrounding regions for jewelry, fancy robes, and imported delicacies. It wasn't long after that trade networks crisscrossed the entire Eurasian continent, inextricably linking cultures for the first time in history. By the second millennium BC, former backwater island Cyprus had become a major Mediterranean player by ferrying its vast copper resources to the Near East and Egypt, regions wealthy due to their own natural resources such as papyrus and wool. Phoenicia, famous for its seafaring expertise, hawked its valuable cedarwood and linens dyes all over the Mediterranean. China prospered by trading jade, spices, and later, silk. Britain shared its abundance of tin.

My hands hurt now :')

Anyways Hope this helped, Have a nice day!

5 0
3 years ago
An example on how the kkk was supported
azamat

The Ku Klux Klan is a terrorist organization that was created and supported after the American Civil War by former Confederate soldiers with the aim of pursuing and murdering blacks.

The founding of the Ku Klux Klan happened between 1865 and 1866 in Pulaski, a small town in the interior of Tennessee. The founders of the Klan were six former members of the Confederate Army, troops who fought for southern states seeking separation during the American Civil War.

4 0
3 years ago
Robert Sternberg suggests that intelligence is culturally defined. Please select the best answer from the choices provided T F.
topjm [15]

The statement given by Robert Sternberg which suggests that the intelligence is culturally defined is TRUE. Intelligence quotient of individuals also changes with change in regions.

Intelligence is in the culture and customs followed by an individuals or group of individuals in a way that how the ancestors or super senior people have impacted the way of living.

<h3>Intelligence</h3>

  • The intelligence of a person cannot be defined in exact numbers but is grouped from a range of being less intelligent to being very intelligent, and it cannot be seen but can be felt and experienced.

  • Intelligence differs with changing cultures, which is dependent on factors like the upbringing of such person belonging to a specific culture and the teachings of life left behind by the ancestors.

  • The individuals belonging to a culture have different intelligence because of the customs and traditions that have been set as standard practices and followed from such period.

Hence, the statement given above by Robert Sternberg which suggests that the intelligence is culturally defined is TRUE.

To know more about intelligence, click the link below.

brainly.com/question/9944825

7 0
2 years ago
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
Other questions:
  • Your roommate rushes home from a physiology lab shouting "i have a sinus arrhythmia! i'm going to die and i've never been to veg
    8·1 answer
  • What do lines on a contour map indicate? A. degrees east and west of the equator B. elevation above sea level C. degrees north a
    9·2 answers
  • Which statement about Joan of Arc is true? A. She was a Benedictine nun who predicted that France would fall to King Edward III.
    13·2 answers
  • Which of the following is an example of feedback? Group of answer choices being confused by an unfamiliar word in a lecture smil
    12·1 answer
  • The question "Will a change in the data coincide with a change in some important outcome?" relates to which of the four characte
    12·1 answer
  • In the united states, what percentage of unintended pregnancies is terminated by abortion?
    12·1 answer
  • Every time you eat cotton candy, you are reminded of the time you went to a carnival with your best friend and ate cotton candy
    9·1 answer
  • SOCIAL SCIENCE
    10·1 answer
  • According to Peter Navarro, how do urbanization and increased wealth impact water usage?
    14·2 answers
  • A fracture can be both ________
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!