1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
3 years ago
12

The Greek festival was enjoyed by all the visitors. passive or active voice

English
1 answer:
soldi70 [24.7K]3 years ago
3 0

Answer:passive

The Greek festival was enjoyed by all the visitors. passive

Explanation:

You might be interested in
Imagine that you are Atticus Finch writing a business letter to the judge to explain the reason you are appealing Tom's convicti
Lynna [10]

Answer:

7 over 4 equals b

Explanation:

accorfing to my calculations 7 over 4 equals b.

4 0
3 years ago
Read the following passage from “Letter from Birmingham Jail.”
grin007 [14]
A would be the correct answer
7 0
3 years ago
Which of the following essays would effectively describe John Wesley Powell's reaction when he first looked at the Grand Canyon?
ELEN [110]

b. expository essay i hope this helps really im am just trying to make it longer

4 0
3 years ago
Read 2 more answers
5-8 sentence of a summary of chapter 6 in mice and men
Vladimir [108]

Summary

In the same riverbed where the story began, it is a beautiful, serene late afternoon. A heron stands in a shaded green pool, eating water snakes that glide between its legs. Lennie comes stealing through the undergrowth and kneels by the water to drink. He is proud of himself for remembering to come here to wait for George but soon has two unpleasant visions. His Aunt Clara appears “from out of Lennie’s head” and berates him, speaking in Lennie’s own voice, for not listening to George, for getting himself into trouble, and for causing so many problems for his only friend. Then a gigantic rabbit appears to him, also speaking in Lennie’s own voice, and tells him that George will probably beat him and abandon him. Just then, George appears. He is uncommonly quiet and listless. He does not berate Lennie. Even when Lennie himself insists on it, George’s tirade is unconvincing and scripted. He repeats his usual words of reproach without emotion. Lennie makes his usual offer to go away and live in a cave, and George tells him to stay, making Lennie feel comforted and hopeful. Lennie asks him to tell the story of their farm, and George begins, talking about how most men drift along, without any companions, but he and Lennie have one another. The noises of men in the woods come closer, and George tells Lennie to take off his hat and look across the river while he describes their farm. He tells Lennie about the rabbits and promises that nobody will ever be mean to him again. “Le’s do it now,” Lennie says. “Le’s get that place now.” George agrees. He raises Carlson’s gun, which he has removed from his jacket, and shoots Lennie in the back of the head. As Lennie falls to the ground and becomes still, George tosses the gun away and sits down on the riverbank.

5 0
3 years ago
1. A requested task is subject to be reported when:
pantera1 [17]

Answer:

When it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, etc.

Explanation:

There are various tasks such as captcha authentication, surveys, article writing, product marketing, categorizing images, etc., that can be completed over the internet or websites by outsourcing it to third-party services or individuals.

Basically, this task are posted online or made available to specific experts (workers) who are saddled with the responsibility of completing the task at a specified period of time and for a particular fee depending on the arrangement between both parties.

However, a requested task is subject to be reported when it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, date of birth, etc.

Generally, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

3 0
3 years ago
Other questions:
  • Excerpt from “The Cloak”
    5·1 answer
  • Identify each step as part of either the revising or proofreading stage of the writing process.
    10·2 answers
  • I need the answer of my homework
    9·1 answer
  • Is this a complete sentence, a sentence fragment, or a run-on sentence? The plants are turning brown; we need to water them more
    14·1 answer
  • Earth surface is warmed by heat blank by the sun
    10·1 answer
  • Which sentence uses a semicolon correctly?
    12·1 answer
  • Whatever you post online—whether a silly picture, angry comment, or sharing about a chronic illness—is there forever. Delete it
    6·1 answer
  • Romeo and Juliet thesis statement about grudges? My teacher said that let go of old grudges, but it doesn't sound right so pleas
    6·1 answer
  • Select three ideas from the text that best support the statement that
    10·2 answers
  • What is a brief summary of Circe and Land of the Dead from the Odyssey.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!