1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
13

Plz help as fast as you can! Thank you!

Social Studies
1 answer:
Mumz [18]3 years ago
6 0
The answer is B market
You might be interested in
Imagine that you live in Los Angeles, California. Your friend has taken a trip to Saudi Arabia to see its capital city, Riyadh.
ss7ja [257]

It's because the time zones are different because one of the girls are on the other side of the Prime Meridian. Hope this helps mate<3

~Maddy

EDIT (or another way to say it: The times are different because they both are in 2 different time zones. This is because one of the girls are on the other side of the Prime Meridian.)

8 0
3 years ago
Does Athens have the right to take over the island of Melos?
Novosadov [1.4K]
Yes because of the wars and everything that can back it up tell me if u need more help
8 0
3 years ago
Two of the reindeers are named after weather phenomenon. Name the reindeer.
mariarad [96]
Comet and Blitzen are the two reindeer you are looking for.
7 0
4 years ago
Read 2 more answers
Which of the following is a government that does not tolerate parties of differing opinion?
Elden [556K]

The answer is B Totalitarian Government

3 0
3 years ago
Read 2 more answers
__________ occurs when one person or program successfully masquerades as another by falsifying data and gains an illegitimate ad
jolli1 [7]

Answer:

The answer is a spoofing attack.

Explanation:

The different protocols related to the TCP/IP suite do not provide the correct ways or mechanisms to authenticate the message's source or destination. Thus, these protocols are vulnerable to spoofing attacks because the applications must take more precautions to know the identity regarding the sending or receiving host.

When there are spoofing attacks in the protocols referring to the TCP/IP suite, there is necessary to use firewalls to solve the problem. We can also see spoofing attacks in e-mails. Spammers use this technique to hide the origin of the respective e-mails and provoke issues like misdirected bounces.  

3 0
3 years ago
Other questions:
  • Thomas Ware is 67, African-American, married with 2 grown children, and retired from the postal service 4 years ago. At an initi
    7·1 answer
  • One 'code' that the Americans used to communicate during WWII was the
    13·2 answers
  • When two friends, who support two different political parties, only quote statistics that support their favorite political party
    9·1 answer
  • Which of the following is LEAST likely
    5·1 answer
  • 60 points for this for answering this question
    8·2 answers
  • Why might the artist have put the sun god in the center of the stone?
    5·1 answer
  • PLEASE HELP ME AND THANK YOU SO MUCH!! &lt;3<br> Here is 25 points if answer :3
    8·1 answer
  • All of the following are characteristics of drug cartels except __________.
    9·1 answer
  • Find another (Greek myth or other mythology:Egypian, Norse, Native American, African, Asian, etc.) and summarize its plot in the
    5·2 answers
  • This is me at home. ​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!