1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
2 years ago
15

Discuss the importance of positive attitudes in resolving conflict between your friends.​

Social Studies
2 answers:
nevsk [136]2 years ago
5 0

Answer:Attitude plays a very important role in conflict management. Nothing can be achieved unless and until you believe in yourself and have a positive attitude. An individual must avoid finding faults in others. ... Individuals tend to lose control on their emotions and overreact hurting the sentiments of the other person.

Explanation: Hope this help buh-bye

ohaa [14]2 years ago
3 0

Answer:

Nothing can be achieved unless and until you believe in yourself and have a positive attitude

Explanation:

hope this helps!!

You might be interested in
what was the long-term impact of martin luther's break from the catholic church? what do we see today as a result of his "revolu
melisa1 [442]
The long-term impact of the break from the Catholic Church was the rise of Protestantism, a denomination within Christianity.

People who followed Martin Luther would establish communities which later formed the protestant Churches and people who remained loyal to the Catholic Church ensured the continued existence of the Church.

Today we can still see the split, for example, Southern Europe is mostly catholic and northern Europe is mostly Protestant.

<span />
6 0
3 years ago
Read 2 more answers
What is one goal u have to improve your physical, emotianal, mental or social health?
Nadya [2.5K]

Answer:

I write a lot about the importance of self reflection--especially come the end of the year. This is the time when, more than ever, it's important to take a step back and look hard at what's been working, what hasn't, and what you can do differently in order to effectively move forward and become successful.

What most people forget though is to audit all pillars of their life. As much time and attention you give your business or your work, you also need to give to your physical body, your emotions, etc. We are humans--we are not robots. And of course it's not always easy to ask yourself, "Have I been happy lately? What do I need to do to improve my emotional well being?" But being aware of all aspects of you is what creates balance--and staying balanced is what allows you to play the long game.

4 0
2 years ago
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
Describe the different approaches taken by the United States toward its new possessions after the war.
irina [24]

Answer:

Take control of the area and gain economic benefits.

Explanation:

Take control of the area and gain economic benefits are the different approaches taken by the United States toward its new possessions after the war. Powerful countries takes possession of new regions with the help of war in order to support its economy by using natural resources as well as taxation.  These approaches helps the country to gain more benefit and maintain power in the region.

3 0
3 years ago
Members or leaders of a political party meeting to make political plans is a..
Dmitry_Shevchenko [17]
I believe the answer is caucus
Hope this helps have a great night!!!
4 0
3 years ago
Other questions:
  • Interpret the effects of monopolies and cartels on the consumer
    6·2 answers
  • Simonâs rabbit gets a treat every night. The treats come in a bag that makes a clicking sound. When the rabbit hears the crinkli
    11·1 answer
  • How do you rate virgil's performance as guide in this canto?
    13·1 answer
  • True or false for exploring the environment, humans depend on hearing more than any other sense
    5·1 answer
  • What seas other than the Black Sea border the Balkan Peninsula
    9·2 answers
  • How did Henry Clay feel about foreign policy? Was he for or against it?
    8·1 answer
  • How were state constitutions important to the writing of the U.S. Constitution?
    7·2 answers
  • _____ are mental categories used to group objects, events, and characteristics. algorithms concepts semantics morphemes
    15·1 answer
  • In what way did the Haitian Revolution differ from the French revolution?
    5·1 answer
  • Which early empires observed and noted human and animal behaviors?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!