1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
3 years ago
15

ECONOMICS!!!!

Social Studies
1 answer:
attashe74 [19]3 years ago
7 0

Answer:

its b

Explanation:

yeah.. I just know it off the top of my head

You might be interested in
If you wanna be friends add the snap: taylorjade290
igor_vitrenko [27]

Answer:

OK

Explanation:

7 0
3 years ago
Read 2 more answers
Characterize ronald franz. what kind of a human being was he? did he have your sympathy? why or why not?
lorasvet [3.4K]

Franz was a warmhearted and caring man who took on the role of Alex's father. He has sympathy because of his kind characteristics and the fact that he was lonely after losing his beloved family.

Sympathy involves understanding from your very own perspective. Empathy includes placing yourself within the different person's shoes and understanding WHY they'll have these specific feelings. In becoming aware of the root reason why someone feels the manner they do, we are able to better understand and provide healthier options.

Sympathy (which comes from the Greek system, which means "together," and pathos, referring to emotions or emotion) is used while one character stocks the feelings of some other; an example is whilst one experiences unhappiness while someone near is experiencing grief or loss. Empathy is likewise associated with pathos.

When you cross see someone in grief and tell them how sorry you're, it can sense that you are empathetic to their state of affairs. in any case, you understand it must be horrible to live a loss like that. maybe you even make the effort to deliver them flora or a card. but, that is an instance of sympathy.

Learn more about sympathy here brainly.com/question/2003163

#SPJ4

7 0
2 years ago
8. How did World War I change the Middle East? How can this influence be seen on the contemporary political map?​
Contact [7]

Answer:

The misfortunes in the Middle East were faltering: the war not just attacked the land and pulverized armed forces, it decimated entire social orders and economies. Thusly, the experience of World War I in the Middle East is maybe more likened to the experience of World War II in Europe.Nov 16, 2015

Explanation:

The misfortunes in the Middle East were faltering: the war not just attacked the land and pulverized armed forces, it decimated entire social orders and economies. Thusly, the experience of World War I in the Middle East is maybe more likened to the experience of World War II in Europe.Nov 16, 2015

6 0
3 years ago
Read 2 more answers
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
You have a paid internship working in an after-school academic program. Your supervisor mentions that the program, and your posi
Elena L [17]

Answer:

I believe the answer is c

4 0
3 years ago
Other questions:
  • The states control voting requirements for national elections<br> True or false
    11·2 answers
  • Citizens had to pay a fee to the poll worker before they could vote
    14·1 answer
  • Prior to the American Revolution, which British law required colonists to provide housing for British soldiers?
    15·1 answer
  • Despite scientific evidence to the contrary, Harry believes that drinking dandelion tea would improve his long-term memory becau
    9·1 answer
  • A researcher wants to test the effect of alcohol on driving performance. Participants first drive through an obstacle course bef
    13·1 answer
  • All of the following are true about the early political leaders of Mexico mentioned in your lecture except: a. Vicente Guerrero
    14·2 answers
  • What group formed in Boston in 1765 to protest British taxes and laws?
    5·1 answer
  • Describe two advances ( new ideas) of the scientific revolution​
    12·1 answer
  • Help me help help help help help help help help help help help help help help help
    11·1 answer
  • How is life in urban areas different than in rural areas?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!