1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
6

Help asap plzzzzzzzz

English
1 answer:
maw [93]3 years ago
7 0

Answer:

Ez drop the discord and i got you

Explanation:

You might be interested in
Which graphic organizer is used to identify causal relationships?
larisa [96]
I had to look for the missing detail for this question which I attached here.
And I would say that among the given images, the one that presents the identification of causal relationships would be the second one. Hope this answers your question.

5 0
3 years ago
Read 2 more answers
Which girl did Squeaky once defend?
mariarad [96]
I do not understand your question..
3 0
3 years ago
1. A requested task is subject to be reported when:
pantera1 [17]

Answer:

When it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, etc.

Explanation:

There are various tasks such as captcha authentication, surveys, article writing, product marketing, categorizing images, etc., that can be completed over the internet or websites by outsourcing it to third-party services or individuals.

Basically, this task are posted online or made available to specific experts (workers) who are saddled with the responsibility of completing the task at a specified period of time and for a particular fee depending on the arrangement between both parties.

However, a requested task is subject to be reported when it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, date of birth, etc.

Generally, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

3 0
3 years ago
Which sentence from the lokale is an example of figurative language?
Lena [83]

Answer:

C

Explanation:

as and like are what is in a simile. as a dessert!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

6 0
3 years ago
Read 2 more answers
In this excerpt from Leo Tolstoy's The Death of Ivan Ilyich, how does Ivan Ilyich use the Caius allusion to deal with his impend
marusya05 [52]
I would say that the way Ivan Ilyich uses the Caius allusion to deal with his impending death is that Ivan Ilyich realizes how unfair death is and becomes even more determined to save himself in any way he can.
He compares his life to that of Caius's, who did or experienced nothing Ivan had, so he doesn't want to accept the fact he is going to die like that.
8 0
3 years ago
Read 2 more answers
Other questions:
  • What does E.D. do with each project she comes up with? 1 has it approved by her father 2 designs a test or quiz over the project
    12·1 answer
  • PLEASE HELP
    5·1 answer
  • Suppose Charlotte wants to find out more about military honors. She would find most of her information by
    13·1 answer
  • Read this passage, which contains words spoken by the bearded man in "The Three Questions":
    11·2 answers
  • Whitch of these is one reason the great depression began​
    13·1 answer
  • What is a simile in the short story marigolds
    6·1 answer
  • How does the author best reveal that iqbal is courageous?
    14·1 answer
  • 5 paragraph essay for difference between knowlege and ignorance
    6·1 answer
  • Is Peeta's love for Katniss genuine or was it simply a strategy to help win the Hunger Games?
    15·2 answers
  • When readers use context to figure out the meaning of an unknown word they are doing what: 1‐ using online dictionary to look up
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!