1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
4 years ago
13

Who has flash backs of drowning and then there were none

English
1 answer:
STatiana [176]4 years ago
7 0

Answer:

  Anne frank

Explanation:

aka dairy of a young girl

You might be interested in
In his Four Freedoms speech, Roosevelt believes that to attain "freedom from fear" the world must:
marshall27 [118]
D. reduce the number of weapons.....
6 0
3 years ago
Read 2 more answers
To critique a text, readers_______ .
Helga [31]

Answer:

examine and explain their position on a central idea

Explanation:

www.quizlet.com

5 0
3 years ago
Read 2 more answers
Can someone pleaseeee help and if you’re correct i’ll give brainliest
Dafna11 [192]
All of the above! ..
6 0
3 years ago
Read 2 more answers
1. A requested task is subject to be reported when:
pantera1 [17]

Answer:

When it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, etc.

Explanation:

There are various tasks such as captcha authentication, surveys, article writing, product marketing, categorizing images, etc., that can be completed over the internet or websites by outsourcing it to third-party services or individuals.

Basically, this task are posted online or made available to specific experts (workers) who are saddled with the responsibility of completing the task at a specified period of time and for a particular fee depending on the arrangement between both parties.

However, a requested task is subject to be reported when it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, date of birth, etc.

Generally, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

3 0
3 years ago
Which of the following best summarizes why the family was having mouse trouble
lapo4ka [179]

The family is having mouse problems probably because their house provides  food for them. so I'd suggest putting the food in plastic tupperware and containers.

:)  

3 0
3 years ago
Other questions:
  • Read this excerpt from a student election speech:
    5·2 answers
  • What type of figurative language is the quote “if sharks come, God pity him and me”
    10·2 answers
  • In bad weather, driving a car can be difficult.
    14·2 answers
  • What is the main problem the author discusses in "A Student's Guide to Global Climate Change"?
    9·1 answer
  • Someone please help thank
    14·2 answers
  • Which sentence uses who correctly?
    8·2 answers
  • Why do we need to suffer through english when we already speak it???? I am sooooo b0rEd in english
    14·1 answer
  • eveloping and improving communication skills will help ensure that messages are sent and received properly. Please select the be
    5·1 answer
  • Carlos was ambidextrous, so, when he sprained his right wrist, he was still able to throw accurately with this left hand.
    5·1 answer
  • Question for Understanding: How did Wilhelm Marr apply ideas of
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!