1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
2 years ago
6

What great ideas have the Aztecs come up with?

Social Studies
1 answer:
maxonik [38]2 years ago
7 0

Many things can be attributed to this people, for example:

  • Those who invented chocolate were the Aztecs, the product was improved by European peoples. This was one of the great apprenticeships with this ancient civilization.
  • The Aztecs were one of the first societies to develop a compulsory educational system for your population. They were great scholars of the stars and mathematics. It is no wonder that even for the European societies of the time, some of its technologies were quite advanced. An example is its calendar similar to ours, which had 365 days.
You might be interested in
Who are the threat agents who will be most interested in attacking web applications created through appmaker?
Ostrovityanka [42]

Security misconfiguration is the threat agents who will be most interested in attacking Web applications created through AppMaker.

<h3>What is security misconfiguration?</h3>
  • Security misconfigurations are security controls that have been incorrectly configured or have been left insecure, putting your systems and data at risk.
  • Simply put, any poorly documented configuration changes, default settings, or a technical error in any component of your endpoints could result in a misconfiguration.
  • Security misconfiguration is the threat agent that will be most interested in attacking Web applications designed with AppMaker as the target architecture.
  • If the server's directory listing is not disabled and an attacker discovers it, the attacker can simply list directories to find any file and execute it.
  • It is also feasible to obtain the actual code base containing all of your custom code and then discovers significant problems in the program.

Therefore, security misconfiguration is the threat agents who will be most interested in attacking Web applications created through AppMaker.

Know more about security misconfiguration here:

brainly.com/question/14395018

#SPJ4

The correct question is given below:

As the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

8 0
1 year ago
How is social media a new type of “scaffold” for young women?
Svetlanka [38]

Answer:

It helps them socialize.

Explanation:

They use it 2 much lol

6 0
2 years ago
Read this excerpt from "President Kennedy's Speech at Rice University."
Veseljchak [2.6K]

Answer:

Time of service

Explanation:

Might be wrong but at leased I tried

4 0
2 years ago
Read 2 more answers
Formal presidential decisions to implement affirmative action regulations or to restructure the white house bureaucracy are usua
AlladinOne [14]
They are expressed as executive orders. The president can make these for other things too like limiting immigration or making treaties with foreign nations. They can be deemed unconstitutional and abolished by the supreme court, but they don't need the approval of the congress.
7 0
3 years ago
Describe the actions that the ancient Greeks were likely to take when starting a new colony.
Nostrana [21]

Answer:

provide a release for Greek overpopulation, land hunger, and political unrest

gathered food and supplies find good farmland in a safe area

Explanation:

3 0
2 years ago
Other questions:
  • Which document has served as a model for human rights protections for many newly democratic nations around the world?
    10·1 answer
  • List 5 human geographic characteristics <br> Please please help me urgent!
    12·1 answer
  • What advantage did the American merchants have during the early 1800s
    8·1 answer
  • Do you believe we have a true meritocracy in the United States? Why, or why not?
    10·1 answer
  • Two adjectives describing eminent domain
    13·1 answer
  • Why would C. Wright mills consider a member of congress to belong to the power elite?
    9·1 answer
  • Which of the following is an example of biased religious language? a. “Did you know Catholics are led by the Pope?” b. “I can’t
    12·2 answers
  • True or False: Increasing taxes were the biggest cause of the Revolutionary War
    8·1 answer
  • Of the five modes of adaptation, ____ is not a deviant response.
    13·1 answer
  • Why did Daniel Shays and other farmers start Shays’s Rebellion?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!