1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viefleur [7K]
3 years ago
15

_____are responsible for the majority of serious delinquent acts.

Social Studies
1 answer:
aev [14]3 years ago
6 0

Answer: (A) Lower class youth

Explanation:

 According to the given question, the lower class youth are basically responsible for various types of delinquent acts  which include the violence in the home and also in their social group, poor education and the bad school attendance. This occur due to the cause of lack of education and less interaction with the parents.

The lower youth is one of the stage in life where the child get easily influenced by other harmful things so we should always more careful about the delinquent acts.

Therefore, Option (A) is correct.

You might be interested in
Type of democracy where citizens elect leader to represent them in government ???
Anni [7]
A democracy where the citizens don't rule directly (such as in Switzerland, through referendums) is representative democracy, as opposed to a direct democracy.
3 0
3 years ago
g he US replaced Britain as the leader of the International System after WW II. They now carry the costs associated with such In
Alex17521 [72]

Answer:

a. Long Cycle Theory

Explanation:

In international relations theory, the Long Cycle Theory was first presented by  George Modelski in his book <em>Long Cycles in World Politics</em> (1987). Modelski claims that <u>the US replacing Britain as the leader of the International System after World War II is part of a cycle in international relations where one hegemon is gradually replaced by another over a period of roughly a century</u>.

The transition from one hegemonic power to another leads to the new world power carrying on the costs associated with such a position. And unlike defenders of the realist school of international relations, Modelski doesn't see this cycle as produced by the anarchy of the internationals system, but rather as a natural consequence of economic and political developments, including wars. According to him, Portugal was the world hegemon in the 16th century, Netherlands in the 17th century, Britain stretched his period of international dominance over the 18th and 19th century, and since the 20th century, the United States is the world's dominant hegemon.

3 0
3 years ago
Certified checks are guaranteed by the bank itself, not just by your signature.
xz_007 [3.2K]
Certified checks are guaranteed by the bank itself, not just by your signature; this is TRUE.
5 0
3 years ago
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
Getting information to the public during an incident is an ongoing cycle involving four steps. which sequence below shows the co
AlexFokin [52]

Answer: B. gathering, verifying, coordinatin, and disseminating information.

 To accomplishing the public information mission, the <em>logical order</em> for the four steps are:

1. <u>Gathering</u> - the fist thing is to collect the information.

2. <u>Verifying</u> - it is important to make sure that the information is correct, it's true.

3. <u>Coordinating</u> - you have to organize all the information, relevant and relating topics.

4. <u>Disseminating information</u> - lastly, spread the information, the news.

3 0
3 years ago
Other questions:
  • The scientific method used most often in which of these Social Sciences Sociology economics political science psychology
    12·1 answer
  • Explain the role of the Speaker of the House. List the responsibilities the position includes and discuss the kinds of power or
    8·2 answers
  • Why was it necessary to pass the thirteen amendment before the civil war amendments
    13·1 answer
  • It is the responsibility of federal courts to ensure that state and local laws are constitutional.
    6·1 answer
  • A cross-cultural study compared all 300 residents of a remote african village to 300 volunteers from chicago. What is the main w
    14·1 answer
  • I’m having trouble understanding my lesson.. could someone help me?
    10·1 answer
  • When kathryn's boss refuses to promote her to a highly demanding position because it will interfere with her role as a mother, t
    10·1 answer
  • when your phone alerts you that you received a text you check the message. when your phone doesn't sound an alert you check it m
    14·1 answer
  • Which statement best describes the diagram ? Effect: Hinduism became India's main Religion. Cause : A. caste system in india is
    15·1 answer
  • The rising phase of an action potential begins when the ____________ and ends when the _____________.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!