1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
3 years ago
8

Why Prithvi Narayan Shah are appointed the person favoured by the people at Kazi

Computers and Technology
1 answer:
mart [117]3 years ago
3 0

Answer:

At one time, Prithvi Narayan Shah could not decide who he should as the Kaji (equivalent to Prime Minister) and Pradhan Senapati (Commander-in-Chief). He had two commanders Biraj Thapa Magar and Kalu Pande in mind.

So, for the decision, he called a Bhaardaari Sabhaa (assembly of the courtiers) along with some people of his kingdom and chose Kalu Pande on the basis of popularity. He instructs his descendants in Divyopadesh to understand the popularity before nominating someone as the Kaji.

This is not a true democratic system as the candidates don't really come from between the people. The candidates are the two people who the King thinks are capable and only wants to know who is popular. This only seems like a precursor of democracy we have today.

I would not call Prithvi Narayan Shah was a democratic king, though

Explanation:

You might be interested in
Assume that a file containing a series of integers is named numbers.dat and exists on the computer's disk. design a programt hat
REY [17]
This is what I got so far, I hope this helped you!

8 0
3 years ago
Read 2 more answers
When a program uses a ____, it reads all the records in the file from beginning to end, processing them one at a time. Group of
DIA [1.3K]

Answer:

nooo noob 2+2=5

Explanation:

why noob bullly bully

4 0
3 years ago
Which of the following is a type of savings vehicle? A.Certificate of Deposit
Ksivusya [100]
<span>A is the correct answer. A Certificate of Deposit is a savings vehicle that offers a particular, fixed date of maturity for someone, with high interest rates as a result of this fixed term - they cannot remove the money early without incurring a loss of potential earnings.</span>
3 0
3 years ago
Cual es la relacion existe entre TENGNOLOGIA y la PRODUCCION DE ENERGIA
andrezito [222]

Answer:

la tecnología tiene energía para hacer que los dispositivos funcionen, que es como los humanos y la energía. Los seres humanos usan energía, ¡la tecnología también usa energía!

Explanation:

ps. this is in english, my home language

technology has energy to make devices work, which is like humans and energy. human beings use energy, technology uses energy too!

5 0
3 years ago
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
Other questions:
  • A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.
    5·1 answer
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • Why does hamlet want to kill himself and what stops him from doing that?
    10·1 answer
  • Where do you get your news? Is it owned by a large conglomerate does it matter to you who own your local news outlets? why or wh
    5·1 answer
  • I need help with getting a profile pic
    5·1 answer
  • Your company's network topology diagrams aren't very detailed so you're helping to improve them. The new set will have separate
    9·1 answer
  • I need trash talk for a comeback:
    11·2 answers
  • What allows a programmer to write code quickly and efficiently for an action that must be repeated?
    14·1 answer
  • Identify what algorithm or concept the following code relates to. void Sort(int array[], int tempArray[], int left, int right) {
    6·1 answer
  • While working on a Windows workstation, you've enabled Remote Desktop.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!