How could the information you share with others be used against you later?

Answers

Answer 1

The way that information you share with others be used against you later is through blackmail such as when you are running for a political office. It will be used to extort money from you or make you to do illegal things.

Why shouldn't you divulge your information?

People who have acquired your personal information may be able to obtain your login credentials for multiple websites or engage in online crimes like tax fraud while posing as you. Identity theft is the kind of crime that can have long-lasting effects on both your online reputation and your privacy in the digital world.

Therefore, Blackmail has changed over time from the act of requesting that someone pay money or do anything in order to prevent having negative information about them exposed.

Learn more about blackmail from

https://brainly.com/question/14466247
#SPJ1


Related Questions

you are a forensic specialist learning about the linux operating system. as the system boots, messages display on the linux boot screen. however, the messages scroll too quickly for you to read. what command can you use after the machine is completely booted to read the boot messages?

Answers

A command you can use after the Linux machine is completely booted to read the boot messages is: A. dmesg.

What is a Linux command?

In Computer technology, a Linux command can be defined as a software program that is designed and developed to run on the command line, in order to enable an administrator or end user of a Linux computer network perform both basic and advanced tasks by only entering a line of text such as viewing a message.

In this context, a Linux command which can be used by an end user to view and read boot messages after a Linux computer is completely booted is dmesg because it is designed and developed to display kernel-related messages.

Read more on Linux command here: brainly.com/question/13073309

#SPJ1

Complete Question:

You are a forensic specialist learning about the Linux operating system. As the system boots, messages display on the Linux boot screen. However, the messages scroll too quickly for you to read. What command can you use after the machine is completely booted to read the boot messages?

dmesg

fsck

grep

ps

8. in part 2 of the lab, dvwa revealed the user name that was used to make inquiries on the server. what was that user name?

Answers

user name used to make inquiries on the server revealed by dvwa is the root

On a Linux or even other Linux - based operating system, this root account name or account gets basic access to all commands and files. It is additionally known as the root account, root user, and superuser. In OS X 10.10 or before, has unfettered read and write access to all parts of both the file system. However, with OS X 10.11 or later, the root user's writing access to some file system locations is limited.

By design, the root user is deactivated. Even though it is possible to configure it, it is strongly advised that you avoid login into a Mac as the root user, whether local or remote.

Learn more about the root here:https://brainly.com/question/29222522

#SPJ4

write a function that draws a frog. call the function to be sure it works. put your python code for this answer.

Answers

Using the knowledge of computational language in python it is possible to write a code that write a function that draws a frog  and call the function to be sure it works.

Writting the code:

def DrawFrog():#Function to draw the frog

#the four print lines results in shape of the frog

print("  ")

print(" (----) ")

print(" ( >--< )")

print(" ^^ __ ^^")

return None #retruns nothing

for i in range(4):#for loop

print("Frog",i+1)

DrawFrog() #calling the function

print() #to go to next line

See more about python at brainly.com/question/18502436

#SPJ1

What can go wrong when a program uses both > > and getline() to read input from the same file? group of answer choices getline() may end up with a blank line, because > > can leave a dangling newline in the input stream. >> may read only a newline and not the intended word, because getline() reads everything on a line except the final newline. nothing in particular can go wrong, just the usual programming pitfalls. >> reads only one word, while getline() reads an entire line.

Answers

Getline()  may end with a blank line because >> can leave a dangling newline in the input stream.


cin >> leaves the new line character (/n) in the iostream . If getline is used after cin >> the getline sees this new line character as leading whitespace, thinks it is finished and stops reading any further.


You can learn more about at:
brainly.com/question/20388738#SPJ4

When Stacy tries to delete the field "Image,” in the Design view image below, she receives no warning message and the field deletes. But when she attempts to delete "BotanicalOrigin,” a warning message appears. Which best explains this difference?

a. “Image” is a primary key, and “BotanicalOrigin” is not a unique identifier.
b. “Image” is not a unique identifier, but “BotanicalOrigin” is a primary key.
c. “Image” contains no data, but “BotanicalOrigin” does contain data.
d. “Image” contains data, but “BotanicalOrigin” does not contain data.

Answers

When Stacy attempts to delete "Botanical Origin,” a warning message appears. The best explanation of the difference is “Image” is not a unique identifier, but “Botanical Origin” is a primary key. The correct option is b.

What is the primary key?

The column or columns that each row in a table uses to uniquely identify itself is known as the primary key. For Optim to insert, update, restore, or delete data from a database table, the table must contain a primary key. The primary keys set for the database are used by Optim.

Therefore, the correct option is b.“Image” is not a unique identifier, but “Botanical Origin” is a primary key.

To learn more about the primary key, refer to the link:

https://brainly.com/question/27170818

#SPJ1

what type of model dictates that all software developers follow a software programming model that uses discrete phases and reviews before the next phase of development is carried out?

Answers

The kind of model that is used by software developers is called waterfall.

The waterfall model is known as model development that is used in software engineering, less often – in other projects and industries.You can use the  waterfall model only if your project match with these criteria: All the requirements are known, clear, and fixed. There are no ambiguous requirements. The Waterfall model focuses very little on the end user or client involved with a project. Its main goals has always been to help internal teams move more efficiently passes the method of a project, which can work well for the software world. The five-phase waterfall model, there are: analysis, design, implementation, testing, and operation.

Learn more about the waterfall model at https://brainly.com/question/13439438

#SPJ4

Please see the attached workbook. What is the url query string for the extract in the attached worksheet?.

Answers

http://www.imdb.com/ is the url query string for the extract in the attached worksheet as a Query String is the string passed to the url in the form of parameters, it can contain one or more parameters, each parameter is separated using the ampersand.

What Does Query String Mean?

The part of a URL known as a query string is used to pass information to a back-end database or web application. Because the HTTP protocol is stateless by design, we need query strings. You must continue to operate a website in order for it to function as more than a brochure (store data).

There are several methods for doing this: You can use something like server-side session state on the majority of web servers. Cookies can be used to store data on the client. You can also use a query string in the URL to store data.

All URLs on the internet can be divided into three parts: protocol, file (or program) location, and query string. The majority of the time, the protocol you see in a browser is HTTP.

The location is represented by the hostname and filename in their typical format (for instance, www.brainly.com/somefile.html), and the query string is whatever comes after the question mark symbol ("?").

For example, in the URL below, the bolded area is the query string that was generated when the term "database" was searched on the brainly website, //www.brainly.com/search.aspx?q=database§ion=all.

To know more about URL, visit: https://brainly.com/question/19715600

#SPJ4

internet big box is a global retailer that has networked devices in many small networks in north america, europe, and asia. maria, an executive who works in the united states, communicates regularly with chen, an executive in china. which network type do the executives at internet big box use to communicate with each other?

Answers

The network type that the executives at internet big box use to communicate with each other is WAN.

A telecommunications network that covers a vast geographic region is known as a wide area network (WAN). Leased telecom lines are frequently used to set up wide area networks.

Wide area networks are used by businesses to transmit information to employees, students, clients, purchasers, and suppliers in different parts of the world. They are also used by governments and educational institutions. In essence, this form of communication enables a company to efficiently perform its routine tasks wherever it is. One could classify the Internet as a WAN.

A WAN is typically described as a computer network that spans multiple continents or even the entire world.

To know more about WAN click here:

https://brainly.com/question/621746

#SPJ4

Which command removes a selection from its original location so it can be moved to another location?
Cut
Copy
Undo
Redo

Answers

Cut removes a selection from its original location so it can be moved

Answer:

Explanation:

Cut - Copy

write a function called reverse that inputs a line of text, tokenizes the line with function strtok and outputs the tokens in reverse order.

Answers

Reversing an array in situ, the reverse() method provides a reference to the same array with the first element now being the last and the last element being the first.

How does reverse () work in java?Reversing the characters in a string is possible using the built-in method reverse() of the StringBuilder or StringBuffer class. By using this technique, the characters are substituted in the opposite order. In Java, the static method with the necessary logic to reverse a string is called reverse.Reversing the string in place is how reverse() operates. In reality, though, it simply generates a new string with the old data reversed in it.A method of the Java. util. Collections class is reverse(). The entries of a list supplied as an input are rearranged.the reverseOrder() function of the Collections class, which is a standalone Java class.Utilizing the comparator that the util package returns, we can reorder the Collection. The ordering imposed by an object's own compareTo method is known as natural ordering. Syntax: reverseOrder public static Comparator.

To Learn more About reverse() method Refer to:

https://brainly.com/question/15224791

#SPJ4

how can we use text to improve scenes and animations

Answers

The way that we could use text to improve scenes and animations is by:

You can reorder keyframes, alter their durations, and alter how keyframes transition. The keyframe transition characteristics outline the values that are interpolated between keyframes, including duration, and do so using mathematical techniques for various journey experiences, such as a hop or fixed linear travel.

What is the importance of text in animation?

The usage of animated text helps grab and hold viewers' attention. The text can also be applied in the following ways: bringing attention to crucial details, such as a brief advertisement or statement. a changeover from one subject to another.

Note that your presentation can include animations for text, images, objects, and other elements. Decide which text or object you want to animate. Choose Animations, then a specific animation. Pick an effect by selecting Effect Options.

Learn more about animations from

https://brainly.com/question/20098799
#SPJ1

listen to exam instructions you manage a network that uses a single switch. all ports within your building connect through the single switch. in the lobby of your building are three rj45 ports connected to the switch. you want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. employees connected throughout the rest of your building should have both private and internet access. which feature should you implement?

Answers

Employees connected to the rest of your building should have VLANs-based access to both private networks and the internet.

Explain about the VLAN?

A logical overlay network called a virtual LAN (VLAN) is used to separate the traffic for each group of devices that share a physical LAN. A local area network (LAN) is a grouping of computers or other devices that are physically connected to the same network and are situated in the same area, such as the same campus or building.

On a Layer 2 switch, a virtual LAN (VLAN) is formed to scale back the broadcast domain. One of the technologies it employs is the division of huge broadcast domains into smaller ones in order to enhance network performance. According to the type of network they carry, VLANs can be divided into five categories: Standard VLAN

To learn more about VLAN refer to:

https://brainly.com/question/25867685

#SPJ4

After launching the Mail Merge task pane,
the first step is to:
(A)Identify the data source
(B) Identify the main document
(C) Specify the letter size
(D)Specify the envelope size

Answers

After launching the Mail Merge task pane, the first step is to

B. Identify the main document

What is mail merge?

Mail merge is a method of building  letters or emails with a bit of automation.  

It requires two components

a template of a letter or an email with specific placeholders And a spreadsheet with a set of dataThese can be names, addresses or any other custom data.Form letters, mailing labels, envelopes, directories, and bulk e-mail and fax distributions. Mail Merge is most commonly used to print or email multiple recipients form lettersCustomize form letters for particular on mass-produce covers and labels.

Hence, Identifying the main document is the first stage in Mail Merge Task.

To learn more about Mail Merge from the given link

https://brainly.com/question/21677530

#SPJ13

viruses that load from usb drives left connected to computers when computers are turned on are known as (1 point) polymorphic viruses. encryption viruses. boot-sector viruses. script viruses.

Answers

Viruses that load from usb drives left connected to computers when computers are turned on are known as encryption viruses.

If they are found, encrypting viruses, a type of computer virus, can pose serious issues. Computer systems are essential to everyday life around the world. One of the most dangerous viruses is an encryption virus because, once it has infected your computer or laptop, it may start encrypting all of the important and private documents and files you have stored there, rendering them useless and unreadable. It may also be deleted, causing data loss, or it may trigger an automatic factory reset, which may erase all of your accounts and other crucial data.

Cybercriminals use encrypted Ransomware, which has grown to be the most common type, because it is challenging to decrypt it and get rid of the infection.

To know more about encryption virus click here:

https://brainly.com/question/13340185

#SPJ4

what command can you utilize to display tcp/ip configuration information for each network adapter installed?

Answers

The command that can you utilize to display tcp/ip configuration information for each network adapter installed is ipconfig command.

(Internet Protocol CONFIGuration) A command-line tool used to view and control the machine's allocated IP address. The current IP, subnet mask, and default gateway addresses of the computer are shown in Windows when you type ipconfig without any other options.

Ipconfig is a DOS tool that displays the current network parameters allocated and provided by a network and may be used from the MS-DOS and Windows command line. You can use this command to check your network settings and network connectivity.

displays all of the TCP/IP network configuration values that are currently in effect and updates the DHCP and DNS settings. Internet Protocol version 4 (IPv4) and IPv6 addresses, subnet masks, and default gateway are shown for all adapters when ipconfig is used without any parameters.

To know more about ipconfig command click here:

https://brainly.com/question/10017959

#SPJ4

what are the strategic options for legacy system evolution? when would you normally replace all or part of a system rather than continue maintenance of the software?

Answers

Change business procedures so they no longer require the old system and completely scrap the old system. Maintain the system as usual. Maintain it through system re-engineering.

Reengineering is the process of analyzing a system, making changes to reconstitute it in a new form, and putting the new form into practice. Simply put, replacing legacy systems can be challenging, especially if they are integral to running crucial business operations. The value of legacy systems for some businesses cannot be overstated. The business cannot operate without the outdated system. Although they are still necessary for many businesses and cannot be replaced, legacy systems are no longer supported and maintained since they are built on out-of-date technology and cannot be used with more modern systems.

Learn more about system here-

https://brainly.com/question/14253652

#SPJ4

Use the pivot table to answer the question.
2. How many positions are there in the Media & Design department? (1 point)
Oone
Otwo
Othree
four

Answers

Three, positions are there in the media & design department. Thus, option (c) is correct.

What is media?

The term "media" refers to the medium of communication. The media is the fourth pillar of democracy. The media was used to communicate with numerous people. There were the different categories of the media, such as print media (newspapers, magazines), electronic media (radio and television), and digital media (social media).

According to the media house are the division of the department are the main department are the media & design department. This department are the based on the three positions such as functional, physical, and operational. It was the three position on the based.

As a result, the three, positions are there in the media & design department. Therefore, option (c) is correct.

Learn more about on media, here:

https://brainly.com/question/14047162

#SPJ1

for reporting purposes, an organization establishes a(n) , which is separate from the operational database.

Answers

For reporting purposes, an organization establishes a data warehouse, which is separate from the operational database. Therefore, the correct answer option is: a. data warehouse.

What is a data warehouse?

A data warehouse can be defined as a logical collection of information that are gathered or obtained from many different operational databases, in order to both support and enhance day-to-day business analysis activities and decision-making tasks of various employees who are working in a business organization.

This ultimately implies that the primary purpose of a data warehouse is to logically aggregate a collection of information from all the departments in a business organization into a single repository, especially to be used for reporting purposes.

Read more on data warehouse here: brainly.com/question/18565560

#SPJ1

Complete Question:

For reporting purposes, an organization establishes a(n) _____, which is separate from the operational database.

a. data warehouse

b. autonomous database

c. embedded database

d. star schema

while assisting a windows user over the phone, you need to determine the ip address for the dhcp server along with the mac address of the ethernet nic. the user has successfully opened a command prompt. what command will you have the user type at the command line to determine these two addresses?

Answers

The command that you will have the user type at the command line to determine these two addresses is ipconfig / all.

(Internet Protocol CONFIGuration) A command-line tool used to view and control the machine's allocated IP address. The current IP, subnet mask, and default gateway addresses of the computer are shown in Windows when you type ipconfig without any other options.

Some computer operating systems have a console application program called ipconfig (short for "Internet Protocol configuration") that displays all current TCP/IP network configuration values and updates DNS and DHCP (Dynamic Host Configuration Protocol) settings.

The ability to force the host computer's DHCP IP address to be refreshed in order to request a different IP address is a significant additional feature of ipconfig. For this, two commands must be used sequentially.

To know more about ipconfig click here:

https://brainly.com/question/28258470

#SPJ4

oracle database is an example of the . a. hierarchical model b. file system data model c. relational database d. xml/hybrid data model.mcq answer

Answers

Option a is correct. The oracle database is an example of the a hierarchical model.

A group of data that is handled as a whole is called an Oracle database. A database's main function is to store and retrieve relevant data. The solution to information management's challenges is a database server. In a multiuser scenario, a server often manages a lot of data reliably so that multiple users can access the same material at once. Delivering excellent performance while accomplishing all of this. A database server also offers effective solutions for failure recovery and prevents illegal access.

The first database created for enterprise grid computing, the most adaptable and economical method of managing data and applications, is Oracle Database. Large pools of industry-standard, modular storage and servers are produced by enterprise grid computing.

To know more about Oracle database click here:

https://brainly.com/question/14256914

#SPJ4

how can good security be an enabler with snmp? >>> 12. a) what is the purpose of dynamic routing protocols?

Answers

Many network management technologies that can save money by avoiding travel to solve issues are made possible by excellent security.

Explain about the SNMP?

A networking protocol called Simple Network Management Protocol (SNMP) is used in Internet Protocol networks to manage and keep track of network-connected devices.

The client-server application model used by SNMP allows for information to be gathered by a software server component (the SNMP Manager) querying a software client component (the SNMP Agent), which is installed on a network device. Additionally, the SNMP Agent can be set up to deliver data to the manager without being contacted.

There is no other monitoring protocol standard like SNMP, even after more than 30 years. Almost all network and data center hardware is compatible with this protocol. Any monitoring system today must support SNMP because it is a widely accepted standard.

To learn more about  SNMP refer to:

https://brainly.com/question/27961167

#SPJ4

suppose n packets arrive simultaneously to a link at which no packets are currently being transmitted or queued. each packet is of length l bits and the link has transmission rate r bps. what is the average queuing delay for the n packets?

Answers

In a router buffer, the packet experiences a queuing delay while it waits to be transmitted onto the link.

How do you calculate queuing delay?The (N-1)L/R packet queuing delay for the Nth packetBest response  :  Every LN/R seconds, N packets arrive to fill the buffer.There is one packet delivered every L/R seconds.The packet is L bits long.Every LN/R seconds, answer N packets arrive to the buffer.There is one packet delivered every L/R seconds.The packet is L bits long.Broadband = R bpsThere is no queuing delay for the initial packet because none has arrived yet.The queuing delay for the second packet is L/R seconds.The queuing delay for the third packet is 2L/R because there have already been two packets.(N-1)L/R is the (N-1) packet queuing delay.The average queuing delay is therefore (L/R + 2L/R + 3L/R +... + (N-1)L/R) / N.

= (N*(N-1)L)/(2*R*N)

=(N-1)L/2R.

To Learn more About queuing delay Refer to:

https://brainly.com/question/14498367

#SPJ4

which type of attack occurs if an application overruns the allocated buffer boundary and writes to adjacent memory locations? race condition buffer overflow kernel flaw symbolic links

Answers

Type of attack occurs if an application overruns the allocated buffer boundary and writes to adjacent memory locations is buffer overflow.

What is race condition overflow?

When two or more threads have simultaneous access to common data and attempt to modify it, this is known as a race condition. You cannot predict the order in which the threads will attempt to access the shared data since the thread scheduling method can switch between threads at any time. Because both threads are "racing" to access/change the data, the outcome of the change in data depends on the thread scheduling algorithm.

What are the buffer overflow?

When the amount of data exceeds the memory buffer's storage capacity, a buffer overflow (or buffer overrun) occurs. The application that is trying to copy the data to the buffer as a result overwrites nearby memory locations.

What is memory allocation?

Setting aside portions of memory in a program for variables, instances of structures, and classes is a process known as memory allocation. The two fundamental types of memory allocation are: when you create an instance of a structure, class, or variable.

Learn more about buffer overflow click here :

https://brainly.com/question/9906723

#SPJ4

during a mail merge what item aer merged​

Answers

Answer: The mail merge process involves taking information from one document, known as the data source.

Explanation:

log(10×

[tex]log(10x4 \sqrt{10)} [/tex]

a data analyst adds a section of executable code to their .rmd file so users can execute it and generate the correct output. what is this section of code called?

Answers

Code results may be directly placed into a. Rmd file's text by surrounding the code with the letter "R" there is a file format called Markdown.

What does an RMD file mean?

The R programming language's open-source Integrated Development Environment (IDE), RStudio, is used to create R Markdown files, which are known as RMD files. It consists of YAML information, plain text with Markdown formatting, and sections of R code that, when produced with RStudio, come together to create an intricate data analysis document.For creating dynamic documents using R, there is a file format called Markdown. R Markdown documents, like the one below, are written in markdown (a simple plain text style) and include sections of embedded R code.    

To learn more about RMD files refer to:

https://brainly.com/question/26021537

#SPJ4

you have just configured the password policy and set the minimum password age to 10. what is the effect of this configuration?

Answers

You recently set the minimum password age to 10 while configuring the password policy. What impact will this setup have? For ten days, the user cannot change their password.

As long as the legitimate user is granted access, a compromised password can be used by the malicious user, posing a serious security risk if the Maximum password age policy setting is set to 0. This prevents users from ever being obliged to update their passwords. The amount of time (measured in days) that a password must be used before the user can change it is determined by the Minimum password age policy setting. You can choose a figure between 1 and 998 days, or by setting the number of days to 0, you can accept password changes right away.

Learn more about password here-

https://brainly.com/question/14580131

#SPJ4

1. What is a word processor program?
A software program that can be used to create, edit and print documents.
A software program that can be used to create, edit and print spreadsheets.
A software program that can be used to create, edit and view presentations.
An old machine used to type papers.

Answers

A word processor program is a software that can be used to create, edit and print documents.

write a select statement that lists all of the orders that included the fender precision select the order id, product id, product name, and order date sort the result by the product name in ascending order.

Answers

The select statement is SELECT product_code, product_name, list_price, discount_percent FROM products Order BY list_price DESC.

A SELECT query fetches 0–N rows from a set of tables or views in a database. The most frequently used data manipulation language (DML) command in most applications is SELECT statement. Due to the declarative nature of SQL, SELECT queries only indicate the result set they are looking for and not the methodology for doing so.

The query is converted by the database into a "query plan," which can differ depending on the execution, database version, and database software. The "query optimizer" capability is in charge of determining the query's optimal execution plan within any relevant limitations.

Because it can only access data in the database, the SELECT statement is a constrained type of DML query.

To know more about database click here:

https://brainly.com/question/6447559

#SPJ4

which of the following components of a successful access control framework is the process of proving that you are who you say you are?

Answers

Access control is a technique for limiting access to confidential information. An access control gateway allows only individuals whose identities have been validated to access company data.

What are the Components of Access Control?Access control is essentially the process of limiting who has access to a resource. There are five key parts to every access control system, whether it is physical or logical.Authentication is the process of establishing the truth of a statement, such as a person's or a computer user's identity. It could entail authenticating personal identity documents, confirming login credentials against stored information, or using a digital certificate to confirm the legitimacy of a website.The process of defining privileges or access rights to resources is known as authorization. For instance, access to employee records is often granted for human resources workers, and this policy is typically defined as access control rules in a computer system.Access: The user or machine can access the resource after being authenticated and granted access.Manage: Managing an access control system entails adding and deleting user or system authentication and authorisation. To simplify the management process, some solutions will sync with G Suite or Azure Active Directory.Audit: A tool frequently used in access control to uphold the least privilege concept. Users may eventually get access they don't need, for example if they change roles. This danger is minimized by frequent audits.

To Learn more About  Access control refer to:

https://brainly.com/question/27961288

#SPJ4

what does the mx record do in a forward dns zone? group of answer choices it identifies the hostname and port of a computer that hosts a specific network service, such as ftp or sip. it holds the alternative names for a host. it identifies the e-mail server to be used for e-mail traffic for the domain. it identifies the authoritative name server for a domain.

Answers

In a forward DNS zone, the MX record identifies the email server that will be used for email traffic for the domain.

So, this is correct. "It identifies the e-mail server to be used for e-mail traffic for the domain."

What is a DNS MX record?

A 'mail exchange' (MX) record in DNS directs email to a mail server. The MX record specifies how email messages should be routed using the Simple Mail Transfer Protocol. An MX record, like a CNAME record, must always point to another domain.

For these MX records, the 'priority' numbers before the domains indicate preference; the lower the 'priority' value, the better. Because 10 is less than 20, the server will always try mailhost1 first. If a message send fails, the server will fall back to mailhost2.

To know more about MX record, visit: https://brainly.com/question/26279891

#SPJ1

Other Questions
scientists and their contributions to the models of atom 4) Complete the notation configuration for Neon. jared runs a personal training studio, earning $5,000 last month. his fixed costs are $4,000, and his variable costs are $3,500. should jared shut down his business immediately? (1) Our detached and distant situation invites and enables us to pursue a different course. If we remain one people under an efficient government, the period is not far off when we may defy material injury from external annoyance; when we may take such an attitude as will cause the neutrality we may at any time resolve upon to be scrupulously respected; when belligerent nations, under the impossibility of making acquisitions upon us, will not lightly hazard the giving us provocation; when we may choose peace or war, as our interest, guided by justice, shall counsel.(2) Why forego the advantages of so peculiar a situation? Why quit our own to stand upon foreign ground? Why, by interweaving our destiny with that of any part of Europe, entangle our peace and prosperity in the toils of European ambition, rivalship, interest, humor or caprice?(3)It is our true policy to steer clear of permanent alliances with any portion of the foreign world; so far, I mean, as we are now at liberty to do it; for let me not be understood as capable of patronizing infidelity to existing engagements. I hold the maxim no less applicable to public than to private affairs, that honesty is always the best policy.Which stylistic device most contributes to a shift in tone in this excerpt? (5 points)A. Rhetorical questionB. Balanced SyntaxC. Extended MetaphorD. Figurative Language 1) In a group of 80 children, 35% of thechildren are girls. 9 of the girls chosevolleyball as their favourite sport.What percentage of the girls chosevolleyball? which of the following is a criticism of symbolic interactionism? a.) it focuses on the behavior of society as a whole instead of people interacting with one another. b.) it uses preconceived notions about people to predict their behavior while interacting with each other. c.) it does not consider the structural constraints people have while interacting with one another. d.) it does not focus on the meanings conveyed through the nonverbal aspects of human interaction. President Wilsons proposal to form the League of Nations was most weakened byhis illness while traveling to gain support.his shortage of campaign funds.his strong anti-German sentiment.his disagreement with Henry Cabot Lodge. what happened when the fbi asked apple to create a new version of the ios operating system was would allow the fbi to gain access to the locked iphone of syed rizwan farook? The amount of seed in a bird feeder decreased 11 1/4 ounces in 5 days. The amount of seed decreased the same amount each day. What was the change in the amount of seed in the bird feeder after 7 days? bryce earned the trust and respect of his employees by consistently modeling the kinds of behaviors that he expects from them. what type of power does bryce possess? find the Cartesian coordinate of the point where polar coordinates are [52, /4 ] the nurse is caring for a client with aggression disorder. the client has an anger episode and is threatening other clients in the emergency room with a knife. what should be the approach of the nurse in this situation? select all that apply. how to write as one fraction 7/2a+4/a*a The Monty Corporation has a staff of sales people who are paid a monthly salary of $1,600.00 plus an incremental commission based on the table below. If Sally sells $29,700.00, what is her total gross pay for the month Solve:-[tex]\bf 7(5a - 4) - 1 = 14 - 8[/tex] how do i make v the subject of the formula, W=5+v/v-3 productivity at the wisconsin branch of big box manufacturing has decreased significantly over the last twelve months. aaron, the branch manager, researches the problem and finds that many employees are spending significant time on social media while at work. he wants to construct a report for the company's leadership team, using the deductive approach. how should aaron structure the report? what are the Economical aims of the African Union a horticulturalist wants to produce geraniums with specific characteristics. she knows that the trait of red flowers is governed by the allele r(rr and rr) and the trait of white flowers is governed by the allele r(rr). the horticulturalist plans to cross a geranium that is true-breeding for red flowers with a geranium that is true-breeding for white flowers. which punnett square best describes this cross? in a diploid individual, one chromosome carries f and b genes, and the homologous chromosome carries different forms (alleles) of these same genes, f and b. see the image below for an illustration of the diploid, the original cell at the start of meiosis. if there is no crossover of the non-sister chromatids during the early phases of meiosis, the genotypes of the resulting gametes will be: