Answer:
what the guy said above me its correct
Explanation:
As of now, the government is doing an enough job to ensure that human rights are being protected through providing basic human rights such as food, water, and shelter. Though this is the case, we cannot deny the fact that there should be progress in terms of the different possibilities that the government may offer in order to address the current problems available right now. These human rights are being addressed, but of course, there should always be progress.
Answer:
Emotional propaganda
Explanation:
There are five different kinds of propaganda:
In Emotional propaganda, words are employed to create emotions in the minds of people, either good or bad. There are various ways by which words are used in emotional propaganda:
Other ways this propaganda manifests are black and white fallacy, quote out of context and plain folks.
B) It was unknown except to a few learned people
C) Well-developed kingdoms and civilizations flourished
D) slavery was nonexistent there
Answer:
C
Explanation; It's just how Africa was.
Answer:
Answer is: A THREAT
Explanation:
In computer security, a threat is a possible danger that may exploit a vulnerable to breach a security and therefore cause possible harm.
A threat can either be intentional (I.e. Hacking: an individual cracker or organization) or accidental ( e.g. malfunctioning of a computer) or otherwise a circumstance, action or event.
A threat is a potential for violation of security, which exists when there is a cicumstance, capability, event or action that could breach security and cause harm. That is, a threat is a possible danger enabling exploitation of a vulnerability.
Therefore the answer that best suits the question is A THREAT.
A threat is a potential danger that might exploit a vulnerability and cause harm to security.
A possible danger that might exploit a vulnerability, a threat is a potential for violation of security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. It is an entity or an action with the potential to cause damage to an organization's information systems or assets. For example, a hacker attempting to gain unauthorized access to a computer system is a threat.
#SPJ3