1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
3 years ago
14

NEED ANSWER ASAP DUE IN 10 MINUTES!!!

Social Studies
1 answer:
makkiz [27]3 years ago
5 0
The answer is E. All of above are examples of how Greece was affected by their geography.
You might be interested in
A malicious actor has contacted multiple individuals at a company over multiple months in order to convince un-suspecting users
andrezito [222]

Answer:

D. Trojan Horse.

Explanation:

A Trojan horse is a kind of malware that is used to mislead computer users of its original intent. Most Trojan horses are usually not suspicious as they can come as an email attachment, advertisement etc. Immediately the user clicks the file or page, the attacker is able to have unauthorized access to the target network or the affected computer. This can further make the attacker have access to personal information.

This malicious actor who sent the file to several users on a companies network, just requires at least one of the computer users to execute the Trojan horse by clicking on the file, so the actor can have control inside the companies network.

6 0
3 years ago
Dr. wright is a therapist and she focuses on how unconscious thought processes impact behavior. her field of study is _______.
Oxana [17]

The field of study that she is likely practicing base on her focus on unconscious thought process that impacts behavior is the Freudian psychology. This is the study of psychology where in the study focuses more on the theories which was from a trained and original neurologist named Freud.

7 0
3 years ago
Richard lost his job after his company moved the jobs overseas. He now lives on a minimum paid job without medical insurance. A
marin [14]

Answer:

Conflict theorist

Explanation:

Conflict theorist interprete a society as in equal due to fierce competition based on materialistic perception such as money properties and basic infrastructure

8 0
3 years ago
During lecture, Psy 1001 students saw an experiment in which participants were told either that they would experience intense an
sveticcg [70]

Answer:

b. as the dependent variable.  

Explanation:

Dependent variable: It is defined as the variable that is being tested and measured in the scientific experiment. The experimenter or the researcher focuses on the fact that if they change the independent variable in an experiment, then how does it leads to change in the dependent variable.

Fundamentally, the experimenter or the researcher controls or changes the independent variable to see the undeviating effect on the dependent variable.

The dependent variable is always dependent on the independent variable in an experiment.

Example: The researcher is interested in how anxiety affects heart rate in humans.

8 0
3 years ago
Read 2 more answers
Lisa has an intense, irrational fear of being observed, evaluated, embarrassed, or humiliated by others in everyday situations,
Bess [88]
Most likely it's social anxiety disorder i'd say
8 0
3 years ago
Other questions:
  • Speaking from a manuscript is most useful when the speaker is required to be very precise in his or her message.
    14·1 answer
  • Why we need election.campaign​
    10·1 answer
  • What bonds are broken during dissociation?
    11·1 answer
  • New growth theory loading... suggests that the accumulation of knowledge capital can be slowed because knowledge is both nonriva
    15·1 answer
  • What ailment was common among soldiers who did not exercise proper hygiene?
    11·1 answer
  • HELP PLZ 30 POINTS!!!
    12·1 answer
  • Having a caring, family-like connection with people not part of one’s family
    12·1 answer
  • Why are human beings called social animals please help me .​
    9·2 answers
  • Which part of the government according to the constitution?
    5·1 answer
  • The act of recording noteworthy security events that transpire on a network or computing device is known as a(n)________________
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!