Both C and D answers show uncorrect statements about the 2010 Haiti earthquake.
Answer C states that the quake registered at 7.8 on the Richter scale, but that's not true. The earthquake occurred inland on January 12, 2010, approximately 15 km southwest of Port-au-Prince and at a depth of 10 km at 16:53 local time. It recorded 7.0 on the Richter scale.
Answer D affirms that the death toll was less than 1,000, but this is also incorrect. The effects caused on this country were devastating. The bodies recovered on January 25 exceeded 150,000, calculating that the death toll would exceed 200,000. The final data of those affected were released by Prime Minister Jean-Max Bellerive on the first anniversary of the earthquake, the January 12, 2011, stating that 316,000 people died in the earthquake, 350,000 more were injured, and more than 1.5 million people were left homeless.
Answer:Cognitive Dissonance
Explanation: Cognitive Dissonance is the behavior that is shown by the person when he/she tries to fit their particular thoughts to makes the balance in the condition. the reduction in the dissonance is done by the his behavior, belief, attitude or thoughts change. So, Gary is also trying to fit in the situation according to his thought according to his mother behaviors.
You're looking at an ancient sand dune. What this means is that the place used to be like a sandy desert, similar to those in Africa. That is because the composition of sand is mostly silica, which appears in the form of quartz.
Chad signs dolly’s call, without her authorization, to the return of her paycheck, which became issued through the eastside marketplace. this is a forgery.
Authorization is the system of giving a person the capability to get the right of entry to a useful resource. Of path, this definition may also sound obscure, but many situations in real existence can help illustrate what authorization approach so that you can follow those standards to pc structures. an excellent example is house ownership.
Authorization is a system by means in which a server determines if the consumer has permission to apply a resource or get admission to a file. Authorization is typically coupled with authentication in order that the server has a few concepts of who the patron is that is inquiring to get entry. authorization is a method thru which the running device determines that a procedure has the proper to execute in this gadget. The most commonplace form of this management is the user name, which we are all acquainted with when we go online to a computer. the second form of running gadget safety is authentication.
There are 4 varieties of Authorization – API keys, basic Auth, HMAC, and OAuth. web improvement, programming languages, software program trying out & others.
Authorization is required to deal with sensitive records and belongings. with none of them, you are keeping facts susceptible to data breaches and unauthorized get the right of entry.
Learn more about Authorization here:
brainly.com/question/7088084
#SPJ4