Women make up 52 percent of the voting-age population and are more likely to vote, yet

Answers

Answer 1
Answer: Gender discrimination has been a prevalent issue that prevented a century of women not to participate.

Discrimination has become widespread nowadays ranging from gender discrimination, racial discrimination, work discrimination and many others.These types of discrimination are experienced by almost all people everyday without them even knowing it. Some discrimination lies behind a sweet smile and an accommodating eyes and in order to defend yourself against this discrimination you need to load up yourself of a lot of self confidence.
Answer 2
Answer:

Answer:. TRUE

Explanation:


Related Questions

Search engines enable you to
Given an "out" string length 4, such as "<<>>", and a word, return a new string where the word is in the middle of the out string, e.g. "<>". Note: use str.substring(i, j) to extract the String starting at index i and going up to but not including index j.makeOutWord("<<>>", "Yay") → "<>"makeOutWord("<<>>", "WooHoo") → "<>"makeOutWord("[[]]", "word") → "[[word]]"
2. How does simple interest differ from compound interest?
What feature of virtualization software allows you to revert to a previous point in time in the event you make an unrecoverable error
What should be done with statements or sections which are unclear?

Which of the following situations would not require knowledge of networking?Stand alone home computer
all the computers of a banking system
a typical classroom of computers
computers used by Social Security Administrators

Answers

A stand alone home computer would not require knowledge of networking among the choices given in the question. The correct option among all the options that are given in the question is the first option. the other options given in the question will all require the knowledge of networking. I hope the answer helps you.

Answer:

A stand alone home computer would not require knowledge of networking among the choices given in the question. The correct option among all the options that are given in the question is the first option. the other options given in the question will all require the knowledge of networking. I hope the answer helps you.

Explanation:

What is the value of Distance in the given scenario? a) 20 b) 30 c) d d) 40

Answers

Answer:

Explanation:

I apologize, but I'm unable to determine the specific scenario or context you are referring to. Could you please provide more details or clarify the scenario you are referring to so that I can assist you better?

Can you provide more details about the scenario you are referring to?

I apologize for the confusion. Without any specific scenario or context provided, it's difficult for me to determine the value of distance in the given scenario. If you can provide more details or clarify the scenario you are referring to, I would be happy to help you further. Please provide any relevant information or specific context related to the scenario you have in mind.

Can I run crisis remastered on max settings?

Answers

Yes....................................

Which action would you use in a rule to disallow connection silently? (a) Accept (b) Drop (c) Reject (d) Forward

Answers

Answer:

In a rule to disallow connection silently, the action you would use is "Drop" (b).

Explanation:

When you use the "Drop" action in a rule, it means that any incoming connection matching the rule will be silently discarded or ignored. The connection will not receive any response or acknowledgement that it has been dropped. This can be useful in scenarios where you want to block unwanted or malicious traffic without alerting the sender.

For example, let's say you have a firewall configured with a rule that drops all incoming connections from a specific IP address. If a connection attempt is made from that IP address, the firewall will simply drop the connection without sending any response back. The sender will not receive any indication that the connection was dropped, which can help protect your network from potential threats.

It's important to note that the "Drop" action differs from the "Reject" (c) action. While "Drop" silently discards the connection, "Reject" sends a response back to the sender indicating that the connection has been rejected. This can be useful in situations where you want to inform the sender that their connection was not allowed.

In summary, the "Drop" action in a rule is used to disallow connection silently. It silently discards incoming connections without sending any response back to the sender.

Which concept often comes in conflict with privacy rights?A.right to be left alone
B.right to encroachment
C.right to know
D.right to publicity

Answers

The correct answer is C.

Ned and mary ann are saving their files to a cd

Answers

you can't save files to a cd you can only save music or photos or videos to a cd