1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nostrana [21]
3 years ago
6

1.ito ang gusaling ipinakilala ng mga Romano bilang bulwagan ng nagsisilbing korte at pinagpupulungan ng assembly

Social Studies
2 answers:
pashok25 [27]3 years ago
8 0
A. Coloseum because it is so yea have fun
vladimir1956 [14]3 years ago
3 0

Answer:

A.Colloseum

Explanation:

sa pagkakaalam ko

You might be interested in
What's the middle passage
Murrr4er [49]
<span>the sea journey undertaken by slave ships from West Africa to the West Indies.</span>
4 0
3 years ago
When determining how much money you will need to borrow in loans for
GarryVolchara [31]

When determining how much money a person will need to borrow in loans for each year of higher education, the person need to take into account future value and the interest rates.

<h3>What is loan?</h3>

A loan is a financial transaction in which one or more individuals, organizations, or other entities lend money to other persons, organizations, or entities.

The recipient incurs a debt and is normally responsible for paying both interest and the principal amount borrowed until the obligation is repaid.

A person must take an account the future worth and interest rates when computing how much income you will be needed to borrow for every year of your higher education.

Therefore, borrower must take into account the future value and interest rates.

Learn more about the future value, refer to:

brainly.com/question/14860893

#SPJ1

7 0
3 years ago
Stuart works for a financial brokerage. His job involves handling sensitive client information such as financial details. Stuart
SSSSS [86.1K]

Answer:Data Exfiltration

Explanation:

Data exfiltration refers to illegally movement of data or moving data without being authorized to do so.

It can also be referred to as data theft or data extrusion this information can be illegally taken by a drive or printer and it poses a huge threat to the company. An authorized employee can be responsible for this kind of theft by taking inside information or data to the outside malicious systems.

This can result to cybercriminals and open attacks to the company.

Types of Data Exfiltration and How They Work

There are different ways that data exfiltration can be committed and people are getting even more better and better at doing it.

Common types of data exfiltration and how they work.

Outbound Email -- this is when a person can forward internal emails to the external sources , they can email things like databases, planning documents , images and other confidential information that exist in the outbound email. The information bis transferred to a third party.

Downloads to Insecure Devices -- a person uses authorised channels and legal devices to transfer information illegally to unsecured devices such as their own smartphone or computer.

By doing this a person has exposed the company information to data exfiltration that can be done by anyone from their devices.

Uploads to External Devices -- the same threat can also occur if unauthorized devices are connected to authorised devices to upload certain files.

5 0
3 years ago
In what year was frederick douglass born and in what state?.
dybincka [34]

Answer:

He was born on the Eastern Shore of Maryland in 1818. Hope i helped :D

Explanation:

3 0
2 years ago
Name the three forms of Buddhism mentioned and give at least one characteristic of them.
galina1969 [7]

Answer:

Theravada, Mahayana, and Vajrayana

Theravada has stayed the most true to the original teachings of buddhism

In Mahayana someone who has accomplished the goal of complete enlightment is called a samyaksaṃbuddha

Vajrayana as formed in India and focuses on ​"the enactment of Buddhist ideas in individual life."

HOPE THIS HELPED!

4 0
4 years ago
Other questions:
  • What happened to the guy who jumped from a 100-foot tower into a large glass of root beer?
    6·1 answer
  • Pls pls pls pls help
    13·1 answer
  • According to the pluralist theory of government, ________.1. government does what the majority of voters want it to do2. governm
    5·1 answer
  • Rommell is studying for her final exam in Introduction to Art History. To do this, Rommell is putting information into her memor
    12·1 answer
  • What is prejudice, and how can its harmful effects be reduced?
    10·2 answers
  • Your order is supposed to be delivered between 5:00 and 6:00 p.m. . It's now 5:45 p.m. and you know you will be late delivering
    6·1 answer
  • Create a Public Service Announcement about the Bill of Rights.
    14·2 answers
  • Which large body of water forms Canada's eastern coast and is important for trade with Europe?
    14·1 answer
  • Explain how the change in white manhood suffrage affected white women and African American​
    14·1 answer
  • Ellen Galinsky and Judy David developed a number of guidelines for communicating with children about divorce. Which is NOT one o
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!