1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
10

The most common religion in india is __________.

Social Studies
1 answer:
Tju [1.3M]3 years ago
7 0
1.The most common religion in India is Hinduism.

2. <span>Since cultures are blending more because of urbanization, recognition of the caste system has decreased in many places.</span>
You might be interested in
How did slave trade lead to colonization of Africa?
fredd [130]

Answer:

Dear eriabn

Answer to your query is provided below

Slave trade was a trade of slaves from Africa. It was between three countries, Africa ,France and America. Slaves were bought from Africa and then packed in ships for three months and later on sold to the plantation owners on the port of baundeax in France. Others were sold in America.

Explanation:

Slavery refers to a system whereby people were ill treated and forced to hard work.

The Europeans were reluctant to go and work in distant and unfamiliar lands meant a shortage of labour on the plantations. So this was met by a triangular slave trade between Europe, Africa and the Americas. The slave trade began in the seventeenth century. French merchants sailed from the ports of Bordeaux or Nantes to the African coast, where they bought slaves from local chieftains. Branded and shackled, the slaves were packed tightly into ships for the three-month long voyage across the Atlantic to the Caribbean. There they were sold to plantation owners. The exploitation of slave labour made it possible to meet the growing demand in European markets for sugar, coffee, and indigo. Port cities like Bordeaux and Nantes owed their economic prosperity to the flourishing slave trade.

6 0
3 years ago
What movie is the line ""i’ll have what she’s having"" from?
valentinak56 [21]

Answer:

When Harry Met Sally

Explanation:

3 0
2 years ago
Read 2 more answers
Mention the important teachings of Hinduism.​
Musya8 [376]

Answer:

hindus believe in the doctrines of samsara(the continuous cycle of life,death and reincarnation) and karma (the universal law of effect and cause)

7 0
2 years ago
2 Points<br> Which of the following is another term for a free-market system?
Finger [1]
I believe it’s capitalism
8 0
2 years ago
Read 2 more answers
Stuart works for a financial brokerage. His job involves handling sensitive client information such as financial details. Stuart
SSSSS [86.1K]

Answer:Data Exfiltration

Explanation:

Data exfiltration refers to illegally movement of data or moving data without being authorized to do so.

It can also be referred to as data theft or data extrusion this information can be illegally taken by a drive or printer and it poses a huge threat to the company. An authorized employee can be responsible for this kind of theft by taking inside information or data to the outside malicious systems.

This can result to cybercriminals and open attacks to the company.

Types of Data Exfiltration and How They Work

There are different ways that data exfiltration can be committed and people are getting even more better and better at doing it.

Common types of data exfiltration and how they work.

Outbound Email -- this is when a person can forward internal emails to the external sources , they can email things like databases, planning documents , images and other confidential information that exist in the outbound email. The information bis transferred to a third party.

Downloads to Insecure Devices -- a person uses authorised channels and legal devices to transfer information illegally to unsecured devices such as their own smartphone or computer.

By doing this a person has exposed the company information to data exfiltration that can be done by anyone from their devices.

Uploads to External Devices -- the same threat can also occur if unauthorized devices are connected to authorised devices to upload certain files.

5 0
3 years ago
Other questions:
  • Which concept is part of disengagement theory
    8·1 answer
  • Why did big businesses and/or industry favor immigrants for their workforces
    7·1 answer
  • Which might happen the longer the Rocky Mountains exist?
    13·1 answer
  • Which items would you most expect to find in a discussion of Native American culture?
    15·1 answer
  • Which of the following is believed to be the synaptic basis for learning and memory?
    10·1 answer
  • Plsssss help the options for the first drop down are fire
    6·1 answer
  • Reminiscent of the ________ tradition, a view supporting animal rights suggests that some animals have the cognitive capacity to
    13·1 answer
  • Which house is the lower house?
    6·1 answer
  • Can humans stop all pollutions
    14·2 answers
  • The tall towers surrounding a mosque, from which the faithful are called to prayer, are called ________.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!