1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
12

Which fort did Zachary Taylor capture in Northern Mexico

Social Studies
2 answers:
AVprozaik [17]3 years ago
4 0
General Zachary Taylor captured Fort Vera Cruz, while in Northern Mexico!

Hope this helps! :)
sweet [91]3 years ago
4 0

Answer:

Zachary Taylor captured Fort Soldado in Monterrey

Explanation:

In the Battle of Monterrey (September 21-24, 1846) Gral. Zachary Taylor led the Army of Occupation to conquer Monterrey city. On September 21st, under Zachary's commandment William J Worth's division quickly captured Fort Soldado defeating Guanajato Regiment defending Federación and the Fort.

You might be interested in
Known for their seafaring skills and construction of fine canoes, the people of Micronesia produced functional wapepe, or ______
Scilla [17]

Answer:

Navigational maps

Explanation:

Micronesia is a subregion of Oceania, composed of thousands of small islands in the western Pacific Ocean. It has a close shared cultural history with two other island regions.

The people today form many ethnicities, but all are descended from and belong to the Micronesian culture. The Micronesian culture was one of the last native cultures of the region to develop

3 0
4 years ago
From a family systems perspective, the appearance of symptoms in a family member represents the manifestation of:
ch4aika [34]

From a family systems perspective, the appearance of symptoms in a family member represents the manifestation of a current family transaction pattern.

6 0
4 years ago
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
Pls help me help me ​
Tanya [424]
Answer:

Geography

Egypt’s geography contributed all aspects of Ancient Egyptian’s lives such as the Nile river being their source of food, water and transportation and the desert offering natural protection. And since the Nile floods allowed the Egyptians to grow crops which was a major part of Egypt’s economy.

Hope this helped. Have a great day:)
3 0
3 years ago
state of affairs in use of steroids in diffuse intrinsic pontine glioma: an international survey and a review of the literature
defon

State of affairs in use of steroids in diffuse intrinsic pontine glioma: an international survey and a review of the literature J Neurooncol.

A survey is a study approach used for accumulating information from a predefined organization of respondents to gain statistics and insights into diverse subjects of interest. they could have a couple of purposes, and researchers can behavior it in lots of approaches depending on the method selected and the take a look at's purpose.

Land surveying includes both geodetic surveyings, used for big areas and taking into account the curvature of the earth's floor (see geodesy), and plane surveying, which deals with regions small enough that the earth's curvature is negligible and can be ignored.

A survey is achieved which will discover, describe, monument, and map the bounds and corners of a parcel of land. it would additionally encompass the topography of the parcel, the vicinity of buildings and different enhancements made to the parcel.

Learn more about the survey here;

brainly.com/question/25257437

#SPJ4

7 0
1 year ago
Other questions:
  • Historically, stratification based on race and ethnicity has pervaded all aspects of political, economics, and social life. Cons
    8·1 answer
  • use the following terms to descibe the rise of the city-states polis, citizen, acrropolis, politics, and aristocracy.
    8·1 answer
  • According to the yerkes-dodson law, the relationship between arousal and performance can be described by a(n) ____.?
    15·1 answer
  • Is the process of describing and explaining the attitudes, values, and behaviors of an age group as well as predicting its futur
    8·1 answer
  • After learning in biological anthropology class that a cleft chin is recessive and that dimples, a free-hanging earlobe, and ton
    12·1 answer
  • u're over the age of 18, have been in the country for six years, and have learned English. What's your next step toward becoming
    14·1 answer
  • One type of fuel was used for thousands of years before other fuels were commonly used. Which fuel is an alternative resource th
    9·1 answer
  • Something written or created at the time of an event: ________ source
    7·1 answer
  • Which step of a citizen action plan would include a community survey? Determining the solution and criteria Evaluating the publi
    12·1 answer
  • Explain the effects of chinese cultural traditions on east asia (i.e. korea, japan, vietnam) over time. this includes: the sprea
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!