1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
15

Write a report on your ubuntu project to make every day a mandela day​

Social Studies
1 answer:
Lera25 [3.4K]3 years ago
3 0

Explanation:

A skyscraper is a large continuously habitable building having multiple floors. Modern sources currently define skyscrapers as being at least 100 metres or 150 metres in height, though there is no universally accepted definition.

sorry

You might be interested in
Which of these statements best describes how Nigeria and South Africa are alike?
Finger [1]

Answer:

B (Both countries have an economy based mainly on manufacturing.)

Explanation:

Nigeria is known as the giant of Africa and South Africa is the 2nd biggest.

The both countries are known for it's manufacturing, cultural and sports. There is one form of rivalry or the other going on between Nigeria and South Africa. In economic, sports or culture, Nigeria and South Africa always compete for that.

3 0
3 years ago
Read 2 more answers
Which is not a means of making rational economic choices?
podryga [215]

Answer:

measuring production levels

Explanation:

Economic rational choices refers to a scientific frameworks that a person or  a group can use in order to fulfill all of their  interests and needs. The means are the things that we can use before we make those rational choices

To make a rational economic choices, there are several steps that generally need to be followed:

Understanding what want to be achieved - analyzing the resources that we possess to achieve it - formulating potential plans - assessing cost and benefit of our action - choosing the best plans.

Measuring production levels is an activity that we do after the plan is already executed. Is not something that we do before we make the choice.

5 0
3 years ago
"In which deployment model does the company own all devices, issue whichever device it chooses to a given employee, and retain c
Alekssandra [29.7K]

Answer:

Company Owned/Business Only (COBO)

Explanation:

Based on the information provided within the question it can be said that the deployment model that is being described is called COBO or Company Owned/Business Only. This is a business model that largely surfaced when mobile devices started taking off. This business model supplies workers with company owned devices and restricts the hardware for business use only.

7 0
3 years ago
Read 2 more answers
Complete the sentence regarding the relationship between price and quantity supplied.
Ostrovityanka [42]
The correct options are as follows;
1. DIRECT.
Supply refers to the quantity of a product that a producer is willing to bring to the market. The higher the price of the product in the market, the more the producer will be willing to produce more product. For instance, if a product is been sold for $20 in the market and the price now increase to $50, the producer will prefer to produce more of that product in order to increase his profits, he will not be willing to produce another product that its price is lesser than $50. Thus, the higher the price, the more the quantity supplied; this shows a direct relation between price and quantity supplied.
2. UPWARD SLOPING.
The supply curve is a graphical representation that shows the relationship that exist between the price of a commodity and the quantity the supplier is willing to supply. The graph move upward from left to right [Upward sloping], thus showing that as the price is increasing, the quantity supply too will increase.

3 0
3 years ago
Read 2 more answers
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
Other questions:
  • The Akshardham Temple, shown above, is a historic Hindu temple in New Delhi. As of 2010, over 80% of the population in _________
    6·2 answers
  • American industrial revolution began
    9·2 answers
  • Explain how productivity affects economic growth
    6·2 answers
  • Are there any just for health educators outside the united states
    14·1 answer
  • What is the purpose of an ombudsman?
    7·1 answer
  • Which prime minister won the Nobel Peace Prize?
    7·2 answers
  • Although your sister is not a scientist, she says that she uses scientific techniques in her everyday life. You do not believe h
    11·1 answer
  • Difference between profession and professional human resources​
    11·1 answer
  • What is the significance of selling tickets to most professional sports teams
    8·2 answers
  • As a learner what do you want to reseach on? Why?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!