1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
3 years ago
6

What are three characteristics of a Pharaoh?

Social Studies
2 answers:
7nadin3 [17]3 years ago
5 0
It is Hardened,privileged, and lost
dangina [55]3 years ago
4 0
The answer is foolish , lost , ignorant.
You might be interested in
Question 2 of 10
Irina18 [472]
Its D: false beliefs!
3 0
3 years ago
Read 2 more answers
This preserved piece of the delta floor from Western Indiana shows how animals lived and died together. It also shows us that at
murzikaleks [220]
B. Western Indiana was periodically glaciated. (It’s why Indiana gets flatter the further north you go)
7 0
3 years ago
How many miles apart were Sparta and Athens?
Kazeer [188]
153 miles is the difference. Sparta and Athens are 153 miles apart.
4 0
3 years ago
All of the following are within the nine ethical principles discussed EXCEPT:_________.
Lelechka [254]

Answer:

This is an incomplete question, the options are missing.

Explanation:

Ethics can be defined as the moral principle which governs the conducting of an activity or it defines an individual's character or morality.

It is derived from the Greek word "ethos" which means "moral character".

There are nine core principles in ethics. They are :

  • Respecting Autonomy
  • Do No Harm
  • Being Just
  • Benefiting Others
  • According Dignity
  • Being Truthful
  • Treating Others with Care and Compassion
  • Accepting Responsibility
  • Pursuit of Excellence
5 0
4 years ago
What term refers to malicious code that sits dormant until a particular event occurs to release its payload?
Vadim26 [7]

Logic bomb refers to malicious code that sits dormant until a particular event occurs to release its payload. "Logic bomb is a string of malicious code inserted intentionally into a program to harm a network when certain conditions are met."

A logic bomb is sneaky because its code lies dormant until the trigger occurs. Logic bombs are subtle, sophisticated cybersecurity attacks and can also corrupt the data in your system, delete the files and clear your your hard drive. Logic bombs are small bits of code present in other programs.

A logic bomb can be malicious but not malware.

to know more about Logic bomb click below

brainly.com/question/9852117

#SPJ4

5 0
2 years ago
Other questions:
  • Think about the structure of your legislature and its similarities and differences with Article I of the Constitution.
    15·1 answer
  • What are people called who are not subject to any nation or government?
    11·1 answer
  • Your 3-year-old daughter, Noria, recently attended a birthday party, where she received a bag of colorful plastic toys. There we
    13·1 answer
  • A paragraph about family life education
    7·1 answer
  • The new administration chose to emphasize a well-rounded experimental curriculum in which arts and trades were emphasized; by do
    5·1 answer
  • Danny, who has a damaged amygdala, accidentally spilled kerosene on a campfire and got badly burned. later, dannys reaction to f
    9·1 answer
  • How does the bill of rights ensure the basic rights and freedoms of americans?
    15·2 answers
  • Which competency includes the knowledge, skills, and abilities to recognize and implement needed adaptations or entirely new tra
    11·1 answer
  • Federalism has several challenges. what are they? write in points <br>​
    5·1 answer
  • Which country was NOT a major colonizer in the New World in the 16th century (1700s)?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!