1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
10

What does the 4th amendment say in the constitution.

Social Studies
1 answer:
Rama09 [41]3 years ago
6 0
Answer:

protects people from unreasonable searches and seizures by the government.
You might be interested in
Which of erik erikson's psychosocial crises revolves around the child's learning to direct his or her own behavior?
olya-2409 [2.1K]
The correct answer is <span> autonomy versus shame and doubt

According to Erikson's theory of psychosocial development, around 18 months- 3 years of age toddlers experience a stage of psychosocial development known as </span>autonomy versus shame and doubt. During this stage of development, toddlers' main task is achieving autonomy- learning to independently direct his or her own behavior. In the <span> autonomy versus shame and doubt stage, children start exercising their independence gradually by picking what clothes they would like to wear, what toys and games they would like to play, etc. </span>
8 0
3 years ago
Read 2 more answers
_____________________ denotes the use of human interactions to gain any kind of desired access. Most often, this term involves e
elena55 [62]

The correct answer is social engineering

Social engineering is the ability to gain access to confidential information or important areas of an institution through persuasion skills.

Social engineering plays a key role in a large number of cyber attacks, regardless of whether the crime is large, small or sophisticated.

In the context of cyber crime, Social Engineering is widely described as a non-technical method used by cybercriminals to obtain information, conduct fraud or gain illegal access to victims' machines. Social Engineering is based on human interaction and is driven by people who use the scam to violate the security procedures they should have followed.

Common Social Engineering and attacks include phishing emails, vishing (phone calls from people posing as a respected company) and baiting (in English “fleshy”, where the attacker inserts malware into USB drives and then simply waits the user to connect them to the machine).

3 0
4 years ago
This is worth 35 points:<br> why is reconciliating with great Britain not an option for the colonies
FinnZ [79.3K]

Re conciliating with great Britain not an option for the colonies  The

King and Parliament believed they had the right to tax the

colonies. They decided to require several kinds of taxes from the

colonists to help pay for the French and Indian War. These taxes

included the Stamp Act, passed in 1765, which required the use

of special paper bearing an embossed tax stamp for all legal

documents. Other laws, such as the Townsend Acts,a.

Many colonists felt that they should not pay these taxes,

because they were passed in England by Parliament, not by their

own colonial governments. The colonists started to resist by boycotting, or not buying,

British goods. In 1773 some colonists in Boston, Massachusetts

demonstrated their frustration by dressing up like Indians,

sneaking onto ships in the harbor, and dumping imported tea into

the water. This was called the Boston Tea Party.

3 0
3 years ago
Eons is a website for baby boomers that allows members to find friends, share experiences on various topics, and post photos and
Dmitry_Shevchenko [17]

Answer:

Social networking site.

Explanation:

A social network is a website, online platform or app that allows people to create users that are then allowed to interact with others on the web. As it is detailed in the exercise, Eons allows users to do just that: interact, share and post everything you want with other users.

4 0
3 years ago
Latisha and Ricky work for a computer software company. Together they can write a particular computer program in 19 hours. Latis
Paraphin [41]

Answer: it will take Ricky 46.77 hours to write the program alone.

Explanation: Attached below is a step by step explaination of the solution.

8 0
3 years ago
Read 2 more answers
Other questions:
  • The hardness of a mineral is determined by Choose one: A. its ability to form cleavage planes. B. its ability to resist breaking
    12·1 answer
  • You are trying to decide between renting two apartments. You really prefer one over the other, but you can't really say why. Thi
    6·2 answers
  • How did Georgians face challenges when fulfilling the charter during the trustee period? (try not to copy from anywhere please :
    15·1 answer
  • Should the federal government have become involved in creating jobs in theater and the other arts
    6·1 answer
  • Which statements accurately describe information presented in the graph? Select two options.
    12·2 answers
  • Five themes and six essential elments of geography
    5·1 answer
  • In a market economy, decisions about which goods are produced are based
    14·1 answer
  • Regarding the structural powers of the Governor of Texas, how do they compare with the powers of other state governors?
    14·1 answer
  • Fill in the blank
    11·1 answer
  • Must move very rapidly in an episodic manner and is believable only for the moment. comedy tragedy melodrama farce
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!