1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
3 years ago
5

How did public transportation change life in the cities

Social Studies
1 answer:
kykrilka [37]3 years ago
7 0
The answer is it allowed people to work further away. 
You might be interested in
What factors are evidenced by a country's G.N.P. How?
Zanzabum

Answer:GNP can be calculated by adding consumption, government spending, capital spending by businesses, and net exports (exports minus imports) and net income by domestic residents and businesses from overseas investments.

Explanation:

3 0
3 years ago
How does development occur in social study subject class 8​
Margaret [11]

Answer:

I hope it helped u

stay safe stay happy

8 0
3 years ago
Developed in 1965, affirmative action is a policy that attempts _____.. . . A) to establish law schools for minorities. B) to ma
MaRussiya [10]
Developed in 1965, affirmative action is a policy that attempts C. to make up for past discrimination policies.
Through this action, more women and African-Americans were supposed to gain more rights than they had at that moment.
7 0
4 years ago
Read 2 more answers
Why is it difficult to conduct a security cost-benefit justification for controls before an attack occurs?.
kondor19780726 [428]

The impact of a phishing is difficult to predict, making it challenging to do a cost-benefit analysis of safeguards before an attack occurs.

<h3>What is phishing?</h3>

Phishing is a form of social engineering in which an attacker sends a message pretending to be someone else in order to mislead the recipient into giving the attacker access to their personal information or to install malicious software, such as ransomware, on their infrastructure. Phishing attempts are getting more and more complex, and they frequently transparently duplicate the site that is being targeted, giving the attacker complete access to the victim's computer and enabling them to breach any further security measures. With the FBI's Internet Crime Complaint Centre registering more than twice as many instances of phishing as any other type of computer crime as of 2020, phishing is by far the most frequent attack carried out by cybercriminals.

Learn more about phishing, here:

brainly.com/question/23021587

#SPJ4

4 0
1 year ago
Why do you think Europeans in salve trade might want to consider their victims as “something less than human”?
DENIUS [597]
For then people wouldn’t feel bad and think of black people as human. They were like animals to europeans so they didnt care
8 0
4 years ago
Other questions:
  • To help prevent ____ attacks, you must educate your users not to type logon names and passwords when someone is standing directl
    13·1 answer
  • Discipline, Integrity, Compassion, Courage and Humility. Please describe how you have demonstrated these core values in your per
    8·1 answer
  • Solomon asch's findings on conformity might best be used to explain why
    5·1 answer
  • Explain the differences between the earliest linear models of communication as action and the later interactive and transactive
    15·1 answer
  • What is the factors of production
    12·2 answers
  • The ___________ guaranteed union members the right to nominate candidates for union office and participate in union meetings.
    6·1 answer
  • In a 2-3 sentence response how does the cartoon reflect America's attitude and policy after World War I? Use 2 pieces of evidenc
    9·1 answer
  • Who donated the South Region of Italy​
    14·1 answer
  • Who is in charge of the meetings in the Georgia Senate?
    9·1 answer
  • Onam falls in between ............... and ................ every year and is regarded as the National Festival of Kerala.​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!