If the coughing continues and your chest is hurting then you probably have bronchidas
He wants equal rights for the Negros, they saved democracy in France and he wants the same rights in their country. (voting, desegregation..)
Defensive strategy is the confederate military strategy during the civil war.
Explanation:
At the beginning of the civil war the grand strategy of the confederates were to defend the borders of the south. They had no interest to invade the north but they simply wanted to survive and defend their right to secede. When union army took an offensive approach by oppressing and attacking the south, the confederate states plunged in to the war and started to be offensive against the union states.
Their soldiers were of great morale and filled with values of commitment. This made them to take up defensive strategy in the beginning of the civil war.
what is the question cant answer something if there is a question
Complete Question: Laura picks up her phone one evening to find that the Microsoft help desk was calling. She had been having trouble with a slow running computer but hadn't yet contacted Microsoft to get help for the problem. She was so pleased to hear that they found her IP address online and found malware on her computer and they were calling all of their clients to remove it. Laura has previously been a victim of a phishing scheme so she was prepared not to give any information to the help desk just incase they weren't legitimate but they didn't ask for her credit card information or Social security number. She figured they were going to help.
The Microsoft Help desk has asked Laura to go to a website and verify her information she they can help fix her computer. She sees all of her information on that web page and she doesn’t have to give them any information. What type of crime has Laura become a victim of?
ANSWER; Laura has previously been a victim of Phishing scam.
A phishing scam is a fraudulent activity that involves keeping a false website or sending a false e-mail with the intent of masquerading as a trustworthy entity in order to acquire sensitive information, such as usernames, passwords, and credit card details.
Seeing all the details in the website made Laura remember her previous experience which was a phishing scam.