1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
8

According to Phyllis Schlafly, the danger the Equal Rights Amendment poses to the fabric of America is that a. African-American

women from poor backgrounds will be considered equal to highly educated and accomplished white women. b. men will not be able to fulfill their dreams. c. women will topple from their position of special rank, privilege, and role in American society and its families. d. men will have to do some housework.
Law
2 answers:
labwork [276]3 years ago
6 0

Answer:

a. African-American women from poor backgrounds will be considered equal to highly educated and accomplished white women.

Explanation:

Phyllis Schlafly, a conservative activist, known for her opposition to feminism and her pivotal role in the defeat of the Equal Rights Amendment in the 1970s.

She believed that women's pursuit of social equality would hurt women living in sensitive situations. She believed it was unfair to equate young, wealthy, successful, white, healthy and educated women with poor, black, uneducated, old and sick women. She said that feminism did not think of women in delicate situations, who could not face the world and say that they have the same rights and duties as all of society.

USPshnik [31]3 years ago
4 0

<em>c. women will topple from their position of special rank, privilege, and role in American society and its families. </em>

<h2>Further explanation </h2>

Phyllis Schlafly or full name Phyllis Stewart Schlafly is a woman who has ambitions in voicing women's rights in the United States. She is also an American constitutional lawyer and Conservative movement.

She was born and raised in St. Louis. She attends a Catholic-only school.

Odile Stewart is Phyllis' only sister. Before she got married, she worked as a teacher at a Catholic-only school in St. Louis.

The United States Congress began and was held in New York City, Wednesday, March 4, 1789.

At least 27 amendments have been made since 1789 at the first American Congress. The amendments speak of government, finance, justice, humanity, the economy, development, defense, agriculture, natural resources, religion, ethnicity, and race, etc.

The amendments include:

  • Amendment I
  • Amendment II
  • Amendment III
  • Amendment IV
  • Amendment V
  • Amendment VI
  • Amendment VII
  • Amendment VIII
  • Amendment X
  • Amendment XI
  • Amendment XII
  • Amendment XIII
  • Amendment XIV
  • Amendment XV
  • Amendment XVI
  • Amendment XVII
  • Amendment XVIII
  • Amendment XIX
  • XX Amendments
  • XXI Amendments
  • XXII Amendments
  • Amendment XXIII
  • Amendment XXIV
  • Amendment XXV
  • Amendment XXVI
  • XXVII Amendments

Learn More

the American amendment brainly.com/question/13478306

United States Congress brainly.com/question/13478306

Details

Class: college

Subject: law

Keywords: rights, amendments, congress

You might be interested in
Identify and explain the eight general forecasts that experts believe are likely to occur in the area of computer crime.
VMariaS [17]

Answer:

Explanation:

1. The GDPR reality will hit

After six years of preparation, hype and debate the EU General Data Protection Regulation (GDPR) will be enforced beginning May 25, 2018.

Many firms processing EU citizens’ data from outside of the EU may not have understood that they, too, will be affected by the regulations. Recent analysis suggests that few firms are ready for the new regulations, raising the likelihood of breaches and potential fines.

2. Malware authors will get smarter

In recent years, a big trend in the anti-malware market has been the use of machine learning algorithms in detection engines that rely on features extracted from known bad samples.

These bad samples include metadata values, exported function names, and suspicious actions.

Malware authors will get better at building techniques to outsmart them as “NextGen AV” solutions become more commonplace.

In recent months we have seen malware filled with legitimate code and functionality which appears to have no purpose but to outsmart machine learning algorithms.

3. Extortion through ransomware hack-and-leak

There has been a rise in ransomware in recent years, partly enabled by online criminal malware marketplaces and partly due to the popularity of Bitcoin and other cryptocurrencies.

Businesses are a natural target for such attacks, as seen with WannaCry and Petya last year.

Ransomware can be spread across a large number of networked devices for maximum impact. Businesses rarely pay a ransom of this nature, as they typically have backups they can revert to when needed.

A more dangerous approach we believe criminals will begin to implement is stealing information and extorting victims by threatening to leak if ransom isn't paid. These leaks could be highly damaging, including incurring substantial fines, loss of customers, embarrassment to executives, and more.

4. Market manipulation via hack or Twitter bot

There haven’t been many cases of criminals looking for ways to target and exploit the stock market system online. However, the market remains an attractive target, as playing the market is “out-of-band” from the hack itself.

We predict we’ll see a repurposing of “fake-news” Twitter bots to push market-relevant information, which could be used in “pump-and-dump” style attacks, or could be targeted at algorithmic trading “bots.”

5. The ‘battle of the bots’ will emerge

It’s inevitable that attackers will begin to incorporate machine learning and artificial intelligence (AI) at the same rate as network defense tools. We may already be at this point, with online Twitter bots able to react to emerging events and craft messages to respond.

This could be the year we see the first battle of the AI bots. As cyber-criminals build systems that can “learn” and adapt to defenses, detection engines will also evolve using AI.

6. Supply chain woes

2017 was a huge year for supply chain attacks. We predict this will continue as criminals see this type of attack to be more and more viable.

The biggest chunk of this may be software supply chain compromise rather than third-party or hardware compromise.

7. Sociotechnical approaches to risk

Securing information has become less about having firewalls and policies, and more about complex interactions between people and machines.

Practitioners have also realized there is need to consider systems as a whole, rather than as discrete components, and have now begun to consider new approaches.

A possible new approach is safety engineering, which is already copied across other domains.

We may see greater emphasis on evolving security beyond traditional approaches, incorporating sociotechnical analysis.

8. IDN Homograph Domain Spoofing

The internationalized domain name (IDN) homograph technique uses similar characters in non-Latin alphabets to appear similar to the targeted Latin alphabet domain.

The non-Latin characters are interpreted by the Latin web browsers as “punycode.”

As an example, the punycode of “xn--oogle-qmc” resolves to “google.” Note the two different types of “g.”

Recently we have observed this technique being employed on a larger scale. Although it has been a proof of concept and used sparingly for a number of years, attackers can use a vast amount of subtle letter swaps using this technique.

We predict this technique will increase this year if web browsers continue converting the punycode domain into the unicode domain, thus appearing to be the legitimate domain to the end user.

While it’s difficult to predict what the future holds, it’s important to remain vigilant and aware to proactively defend against cybercrime.

5 0
2 years ago
To obtain a class E license, you don’t need to
pashok25 [27]

Answer:

a

Explanation:

because whoever created the rules socks

6 0
3 years ago
Read 2 more answers
Jeremiah is the owner of a software development company that is committed
lara31 [8.8K]

Explanation:

C. He is probably more likely to want to lease equipment so that he

C. He is probably more likely to want to lease equipment so that hecan regularly upgrade to the newest technology more hasily.

mark ‼️ it brainliest if it helps you ❤️

3 0
2 years ago
What are the consequences of not following the list of Assumptions and Principles in accounting?​
andrey2020 [161]
Jasmjenemenwmkwkwjwjwnehsbsbhw
7 0
3 years ago
During this procedure, a judge decides three issues: whether a crime was committed, whether the court has jurisdiction over the
KiRa [710]

Answer:

I believe the Preliminary hearing is the answer.

Explanation:

-Grand jury- has nothing to do with this part. Their job is to look at the evidence once the judge determines that the case can go to trial.

- Arraignment- is when the defendant is read what charges they are going to brought upon.

-Detention hearing- the judge decides whether or not the person should be Detained.  

3 0
3 years ago
Other questions:
  • What is the difference between a naturalized citizen and a natural-born citizen?
    5·2 answers
  • 16. Jim is a patrol officer who finds a large amount of marijuana.
    11·1 answer
  • *****
    8·2 answers
  • If you arrive at a 4 way stop intersection at the same time as another user on yur right
    5·1 answer
  • How many books are in the New Testament? <br> A: 35<br> B: 27<br> C: 36 <br> D: 25
    6·2 answers
  • What do you mean by mandamus?<br><br>Will mark brainliest ( just have 2 more )<br><br>Thank you​
    6·2 answers
  • Who becomes the<br> President if there is a<br> tie for President AND<br> Vice-President?
    11·2 answers
  • Based on due process, which of these instructions would a judge give to the jury in a criminal trial?
    5·1 answer
  • Suggest three ways in which womens can protect themselves against abuse​
    12·1 answer
  • What two safe driving skills a driver should use when driving in a raining road condition
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!