1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
2 years ago
9

Are you a sociopath

Social Studies
1 answer:
faltersainse [42]2 years ago
3 0

Answer:

1. c

2.c

3. b

4. c

I think I'm a sycopath...........

You might be interested in
Mariangela has dyslexia. Mariangela is taught in the regular classroom, where she has her own reading tutor for part of the day.
belka [17]

Answer:

Inclusion

Explanation:

Inclusion is a situation where children Or students that have special needs spend a vast majority of their time with non special neef students.

Mariangela who has dyslexia being taught in the regular classroom, is an example of inclusion.

8 0
3 years ago
An expert on parenting is addressing parents at the local grade school. when the topic of punishment is discussed, what is one o
prisoha [69]
On the topic of school, Suspension.
5 0
3 years ago
Read 2 more answers
In your opinion, How importance of having a security tools, privacy, social networking, employment contacts in hotel and why?​
ycow [4]

Answer:

With the increased use of social tools for business communications, social media security is more important than ever.

While the benefits of social are clear, there are risks to be wary of. According to the latest EY Global Information Security Survey, 59% of organizations had a “material or significant incident” in the past 12 months.

If you are on social (and who isn’t?), you need to protect yourself against common social media security threats.

Here’s how.

Common social media security risks

Unattended social media accounts

It’s a good idea to reserve your brand’s handle on all social media channels, even if you don’t plan to use them all right away. This allows you to maintain a consistent presence across networks, making it easy for people to find you.

But it’s important not to ignore the accounts you don’t use yet, the ones you stopped using, or don’t use often.

Unmonitored social accounts can be the target of hackers, who could start posting fraudulent messages under your name.

Once they gain control, hackers can send anything. That could mean false information that’s damaging to your business. Or maybe it’s virus-infected links that cause serious problems for followers. And you won’t even notice until your customers start coming to you for help.

Human error

Everyone makes mistakes. In today’s busy world, it is all too easy for an employee to accidentally expose the company to threats online. In fact, “employee weakness” was responsible for 20% of cyberattacks, according to the EY Global Information Security Survey.

Something as simple as clicking on the wrong link or downloading the wrong file could wreak havoc.

Some online challenges and quizzes can also be problematic. By completing them, employees can accidentally create social media security issues.

Explanation:

hope it's helpful

6 0
3 years ago
He has dissolved Representative Houses repeatedly, for opposing with manly firmness
Ket [755]

Answer:

D

Explanation:

Federalism they addresses the Declaration of independence

7 0
3 years ago
Beth buys her pumpkins at Sleepy Hollow Farm They charge .68 cents a pound She buys one that weighs 9, one that weighs 12 pounds
user100 [1]

She spends

12 pounds=$8.16

8.5 pounds=$5.28

9 pounds=$6.12

8 0
3 years ago
Other questions:
  • What is the justification for harsh sentencing guidelines, like california's "three strikes" law?
    11·1 answer
  • Where did the Industrial Revolution begin in the late 1700’s?
    5·1 answer
  • Environmental risk transition is most likely to be characterized by
    12·1 answer
  • Logical ____________ are arguments used to confuse or sway the reader to accept a claim/position in the absence of evidence.
    7·2 answers
  • Who got a big share of a sharecropper's harvest?
    7·1 answer
  • Vulnerable persons are those who are less able to protect themselves than other persons in a given situation. The Common Rule (4
    9·1 answer
  • Traditional religious attitudes toward nature have largely disappeared in modern societies
    5·2 answers
  • Which topic of study would most interest a geographer?
    5·1 answer
  • Which of the following is an example of an economic institution?
    9·1 answer
  • A researcher who does not want to manipulate or interfere with the behavior of research subjects would conduct a __________ stud
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!