1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marissa [1.9K]
2 years ago
6

Give 2 advantages the Viking sailors had.

Social Studies
1 answer:
Nat2105 [25]2 years ago
7 0

Answer: The addition of oars and sails gave Viking boats an advantage over all other watercraft of their day in speed, shallow draft, weight, capacity, maneuverability, and seaworthiness. Viking boats were designed to be dragged across long portages as well as to withstand fierce ocean storms.

Explanation:

You might be interested in
Animal charities that show photos of soulful eyed puppies and kittens locked in small cages are attempting to get donations usin
Reika [66]

Animal charities that display pictures of soulful-eyed dogs and kittens locked in small cages are attempting to get donations for the use of what poor country self.

The Humane Society is one of the most animal welfare packages in the international, and for an exact cause: not simplest does the Humane Society have a number of applications designed to guide domesticated animals, however, they have released tasks in opposition to a natural world searching, animal trying out, and manufacturing unit farming, too

The poor-state comfort version states that humans have an innate drive to lessen bad moods. They can be reduced with the aid of engaging in any mood-raising behavior, such as assisting behavior, as it is paired with superb values such as smiles and thanks.

Learn more about animals charities here:brainly.com/question/7982337

#SPJ4

8 0
1 year ago
Professor Wang is a member of the faculty committee on academic standards. Other committee members want to begin accepting stude
Karo-lina-s [1.5K]

Answer: a) the other committee members are all in favor of the plan.

Explanation:

According to the question's situation, Professor Wang does not support the below-average grade possessing students among the academic standard committee. Whereas other members of the committee want to support them.

So, Professor Wang can vote in favor if all the members of the committee decide to vote in supporting children with below average grade.This will convince Professor Wang as everyone is thinking of favoring students.

Other options are incorrect because discussing his opinion early will not necessarily change opinion of others. Private ballot voting will also lead to support the majority decision and will not include Professor Wang in that decision.Self esteem will not help in favoring students.Thus, the correct option is option(a).

3 0
3 years ago
What theory asserts that motivation is essentially a decision about how much effort to exert to get what you want in a particula
Serhud [2]

The theory that asserts that motivation is essentially a decision about how much effort to exert to get what you want is expectancy theory.

<h3>What is motivation?</h3>

It should be noted that motivation simply explains why people behave in a particular way.

In this case, expectancy theory states that asserts that motivation is essentially a decision about how much effort to exert to get what you want.

Learn more about motivation on:

brainly.com/question/11871721

8 0
2 years ago
During ww2 how many jewish people were estimated to have died from holocaust
marta [7]

Answer:

its estimated that about 11 million jews worldwide died due to the holocaust. (not exact)

7 0
3 years ago
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
Other questions:
  • Billy accidentally hit a baseball through the neighbor's window. Initially he felt _________ but after his Dad called him "stupi
    10·1 answer
  • Because people believe that mental functioning or intelligence is important for most jobs, _____ tests are among the most freque
    13·1 answer
  • Although Judaism, Islam, and Christianity are similar, what is one key difference among them? (44 c. 2) A. their thoughts about
    11·1 answer
  • Carol Gilligan has criticized Lawrence Kohlberg's theory of moral development because:
    6·1 answer
  • The Code of Hammurabi was...
    9·2 answers
  • Boiled egg in the morning is hard to beat
    7·1 answer
  • Who was the commander in Sheriff of the Texas army​
    12·1 answer
  • Tony Smith had just collected all the donations from a fundraiser for Feed My Starving Hippos. He was going to deposit the money
    11·1 answer
  • The response that is given to the conditioned stimulus is not usually quite as strong as the original unconditioned response, __
    12·1 answer
  • What function is most closely associated with the spinal cord tract indicated by the letter c?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!