1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
4 years ago
6

The task of legislating federal laws falls into which of the following groups? A) State congressman in state senators. b) House

of representatives and senate C) Govenors D) Mayors
Social Studies
1 answer:
Alika [10]4 years ago
8 0

Answer:

If Congress wanted to effect a change in the Social Security payroll tax, to what congressional committee would the task initially be assigned?

House Ways and Means Committee

Explanation:

I used quizlet to find my answer!

You might be interested in
Dr. Yeadley administers an intelligence test to 100 college freshmen. Two weeks later, Dr. Yeadley returns and administers the s
NNADVOKAT [17]
If they have learned anything or gained any knowledge in the 2 weeks.
5 0
3 years ago
What were some ways that slaves resisted their condition?
Brut [27]

Answer:

Breaking tools, feigning illness, staging slowdowns, and committing acts of arson and sabotage--all were forms of resistance and expression of slaves' alienation from their masters. Running away was another form of resistance.

6 0
2 years ago
Write an informative essay in which you give two reasons that Queen Hatshepsut became a powerful leader. Support your reasons wi
Fed [463]

Answer:

Yeeee oh awy

Explanation:

7 0
3 years ago
What is one example of a cyber-attack within the United States?
Luden [163]

One example of a cyber-attack within the United States is:  A shortage of gasoline after an energy company is h.a.c.k.e.d.

<h3>What is cyber-attack?</h3>

Cyber-attack occur when a person h.a.c.k a website so as to steal  or destroy information or sensitive data.

When their is Cyber-attack on  a company or an organization website this tend to mean that a person has gain an unauthorized access to the company website or computer system so as to steal the store data.

Therefore One example of a cyber-attack within the United States is:  A shortage of gasoline after an energy company is h.a.c.k.e.d.

Learn more about Cyber-attack here:

#SPJ1

<h3 />

3 0
2 years ago
Which of the following employs the nomothetic model of explanation? An examination of all the considerations that resulted in 85
mote1985 [20]

Answer:

An isolation of the three most important reasons as to why men were selected to all the leadership positionsat a former women's college that went coed. -second choice

3 0
4 years ago
Other questions:
  • Arab americans are descendents of people from the ________ nations of the arab world.
    5·2 answers
  • By selling their high technology products to _____, Taiwan’s economy has grown rapidly.
    14·1 answer
  • 1 of 2 rivers in Mesopotamia crucial t ok life
    7·1 answer
  • What was delta airlines original purpose when it was founded in 1924 as Huff Darland dusters
    6·2 answers
  • Gustave lebon said people in a crowd had the tendency to feel, think, and act extraordinarily, which included a sense of anonymi
    12·1 answer
  • When beggar odysseus talks to his wife, he was a dramatic?
    10·1 answer
  • Which of the following would you expect to see in an incident action plan?
    14·1 answer
  • Why did the colonists in Virginia use indentured servants?
    9·1 answer
  • Identify factors that alded westward expansion and encouraged mass migration to the West.
    9·1 answer
  • How does the quote "I had rather make history than to write it. - Susan B. Anthony"
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!