1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
15

I WILL GIVE U BRAINLIEST AND THANKS AND 5 STARS

Social Studies
2 answers:
LekaFEV [45]3 years ago
4 0

Answer:

protons & neutrons

Explanation:

The atom's nucleus, a dense and positively charged core, is made up of protons and neutrons, while electrons, which are negatively charged, are contained in an electron cloud surrounding the nucleus.

zysi [14]3 years ago
3 0
Hopes this helps:

Answer: protons & neutrons

Have a great day.
You might be interested in
What made Greece and rome alike
Airida [17]

Answer:

Both Greece and Rome are Mediterranean countries, similar enough latitudinally for both to grow wine and olives. However, their terrains were quite different. The ancient Greek city-states were separated from each other by hilly countryside and all were near the water.

Explanation:

I learned this areadey

5 0
2 years ago
What messages, overt and covert (obvious and hidden) do you send to others regarding what it means to be a "boy" or a "girl" and
Gnoma [55]

Most overt or covert behavior is given a gender by the society.

Explanation:

<u>The expectations of gender come with different sort of things that boys and girls are supposed to do differently. Which is as simple as body language sometimes or as complex as mingling habits and way of talking.</u>

There are times when people are told that they talk like or walk like the opposite gender which is due to a set stereotypical example everyone either lecterns to follow or never knows any better from.

We all are complicit in this as we learn the norms and try to act accordingly.

6 0
3 years ago
The majority of egyptians live along the Nile river and delta because
erica [24]

Answer:

because the river's annual flooding ensured reliable, rich soil for growing crops

Explanation:

6 0
3 years ago
How did George Washington get into foreign affairs?
Oksanka [162]

in 1789, The french revolution sent shock waves across the atlantic. many americans, mindful of french aid during their own struggle for independence, supported returning the favor. at that time, the british were once again inciting native americans to attack settlers in the west, hooing to destabilize the fledging rupublic

4 0
3 years ago
Stuart works for a financial brokerage. His job involves handling sensitive client information such as financial details. Stuart
SSSSS [86.1K]

Answer:Data Exfiltration

Explanation:

Data exfiltration refers to illegally movement of data or moving data without being authorized to do so.

It can also be referred to as data theft or data extrusion this information can be illegally taken by a drive or printer and it poses a huge threat to the company. An authorized employee can be responsible for this kind of theft by taking inside information or data to the outside malicious systems.

This can result to cybercriminals and open attacks to the company.

Types of Data Exfiltration and How They Work

There are different ways that data exfiltration can be committed and people are getting even more better and better at doing it.

Common types of data exfiltration and how they work.

Outbound Email -- this is when a person can forward internal emails to the external sources , they can email things like databases, planning documents , images and other confidential information that exist in the outbound email. The information bis transferred to a third party.

Downloads to Insecure Devices -- a person uses authorised channels and legal devices to transfer information illegally to unsecured devices such as their own smartphone or computer.

By doing this a person has exposed the company information to data exfiltration that can be done by anyone from their devices.

Uploads to External Devices -- the same threat can also occur if unauthorized devices are connected to authorised devices to upload certain files.

5 0
3 years ago
Other questions:
  • If I workout, lose weight, and better myself, would that help me get over my ex? :/
    5·2 answers
  • Babies as young as ________ months) learned that their own kicking moves a mobile; and they retained that learning without later
    11·1 answer
  • What is acceptance and commitment therapy used for?
    15·1 answer
  • Use the drop-down menu to complete the sentence.
    7·1 answer
  • The Georgia state constitutions is divided into ___ articles
    15·1 answer
  • Who is Shawn Michaels
    15·2 answers
  • As after taking cooking lessons, Thelma bakes a cake for her friend Louise's birthday. When Louise sees the cake, she says, "Wow
    12·1 answer
  • How did Magellan’s voyage compare to Columbus’s
    9·1 answer
  • What was the purpose of the section of Lincoln‘s Gettysburg address?
    12·2 answers
  • Trange or false belief that is firmly held despite evidence to the contrary is known ?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!