1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
2 years ago
7

How did Italian city-states contribute to a boom in art and learning? the influence of italian city-states​

Social Studies
1 answer:
elena-14-01-66 [18.8K]2 years ago
5 0

Answer:

→ The city-states wealth encouraged a boom in art and learning. Rich families paid for the creation of statues, paintings, buildings, and avenues. These inculded universities and hospitals for learning.

Explanation:

You might be interested in
The constitutions is organized into a series of laws konw as
ArbitrLikvidat [17]
The Constitution was originally composed only of laws known as articles. Laws introduced later to the Constitution are known as amendments.
7 0
3 years ago
What in your view is the most important policy issue facing the united states? why is it important and which specific problems n
Volgvan

The biggest problems cited by the united states are:

1. Budget problem

2. Unemployment

3. HEALTH care

4. Immigration

5. Poverty

6. inequality in wages

7. Decline of religion and morals

8. Civil rights and race relations.

9.Education,Environment,Media,crime.

10. Terrorism

It is important to solve all the problems that are faced by any human being. Because a human should b free of tension and should have freedom in every way he looks.

The problem that first should be addressed is poverty because it's such a problem that keeps man not a man it makes life hell.

When the united states has no poverty then it's possible to think of development and other activities. As the poverty gets kicked out then education and other things come into play.

The most important issues that need to be addressed first are

1 poverty

2 terrorism

3 crime

4 Education

The problem once overcome can lead any nation to its success.

Learn more about united states here:brainly.com/question/811755

#SPJ4

7 0
2 years ago
Did Richard Nixon believe in small government or big government? Explain why
babunello [35]

Answer: Richard Nixon believe in a smaller but efficient government.

Explanation: I think because he wanted people to have power again. His goal was to empower local governments to deliver local services, but in doing so he made them even more beholden to the federal purse. Under Nixon, domestic spending grew from a little more than 10% of GDP to almost 14%.

3 0
3 years ago
Quickly Say something Dum!!~
Svetlanka [38]

Answer:

._.

Explanation:

7 0
3 years ago
Read 2 more answers
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
Other questions:
  • How do movies and television shows affect what immigrants expect life in the united states to be like?
    12·1 answer
  • A conflict of interest is any situation where a person's private interests and professional obligations collide. In the risk ass
    14·1 answer
  • In texas, local government comes in different forms, which includes
    11·1 answer
  • A special process that requires a haccp plan to be in place before the process is used in an operation is
    6·1 answer
  • The conflict police officers face that revolve around the requirement to do their duty as law enforcement officers and a desire
    12·1 answer
  • Within a gun's barrel, lands and grooves cause a bullet to spiral when exiting the barrel of the gun, much in the same way a foo
    8·1 answer
  • Does someone want to help me with my quiz?
    10·1 answer
  • Choose which innovation (invention) was more revolutionary (life
    6·1 answer
  • Carmen would rather spend time interacting and relaxing with friends than working. In fact, she recently turned down a promotion
    8·1 answer
  • the text defines psychology as the scientific study of how people think about, influence, and relate to one another.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!