1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KiRa [710]
3 years ago
6

Life expectancy is ______ for a poor person than it is for an average-income person.

Social Studies
2 answers:
prohojiy [21]3 years ago
4 0

The answer is less.  Poor people barely if not have no means to sustain themselves.  Many have no money for food, shelter or clothing. They forced to live on the streets and take what they can.  Though there government and non-government units who help the poor, many still have difficulty to survive.

Sonja [21]3 years ago
4 0

Answer:

a. less

Explanation:

You might be interested in
Activity 3: Set a SMART goal
Bezzdna [24]

Answer:

Yes, both goals are SMART.

Explanation:

Both goals are considered SMART because both goals are achievable if a person work hard. SMART stands for Specific, Measurable, Achievable, Realistic, and Timely. If these five factors are present in a goal so it is considered achievable. Both film star or a politician can be achievable if a person works very hard and ahs the talent that is needed by these fields so no one can stop him from achieving popularity in their field.

8 0
3 years ago
A city in the Middle East that is sacred to Jews Arabs and Christians is
STatiana [176]

Jerusalem middle east!!!

7 0
4 years ago
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
In thinking about mary (a female), a psychologist would tend to view mary's gender role as being comprised of
icang [17]

Answer:

The correct answer would be, Both masculine and feminine characteristics. In thinking about Mary, a psychologist would tend to view Mary's gender role as being comprised of both masculine and feminine characteristics.

Explanation:

Psychologists do a comprehensive personality assessment. When they assess a female's gender role, they tend to view both masculine and feminine characteristics in the female.

The feminine characteristics may include empathy, compassion, caring, sensitive, gentleness, sweetness, tolerance, nurturance, etc. These are all characteristics that are generally featured with females.

Courage, Strength, Independence, freedom, leadership, authority, competitive, protective, rational, goal directed, etc are characteristics that are more traditionally associated with males.

So when a psychologist will view the gender role of a female, he would see both masculine and feminine characteristics in that person.

6 0
3 years ago
"what is the "age of majority" in texas with regard to civil and criminal responsibility before the law?"
sveta [45]
Seventeen is the correct answer for this question.

8 0
4 years ago
Other questions:
  • Somnabolism A. occurs most often in association with night terrors B. is an outward expression of dream content C. occurs during
    12·1 answer
  • What type of leaders came to power in Italy Germany and the Soviet Union before World War 2
    9·1 answer
  • Which of the following is an accurate description of the amplitude of a wave?
    8·1 answer
  • Which of these areas in East Asia is the most densely populated
    14·1 answer
  • True or False: You cannot buy a license plate and registration for a car, or other four-wheel vehicle, without having liability
    13·1 answer
  • Which of the following situations describes the use of reward power? Situation 1: Lindsay, member of a charitable organization,
    6·1 answer
  • Please answer ASAP!!
    12·2 answers
  • To what extent do you agree with the notion that government should control the media? ​
    13·1 answer
  • The roads that are located near your town are national highways. They need repair, with many potholes that are dangerous for dri
    8·2 answers
  • Which primate trait most increases reproductive when living in a complex society?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!