1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
11

What is substinence farming? What early african group of people used this type of farming?

History
1 answer:
Andrew [12]3 years ago
8 0
It is the productions of food that is used mainly for the farmer’s family or by the local community. This was used in developing countries around the world. It was only to feed the small community working on it. I believe it was the Bantu of the Niger-Congo group.

You might be interested in
HURRY ANSWER FAST !! Each of the following is a sign of economic freedom EXCEPT: A. producers produce what is profitable B. wage
Vlad1618 [11]
B is not an example of economic freedom because wages and prices are being controlled by the gov. controlling money is not freedom economically because the individuals are not controlling it themselves (which would be freedom) . The rest of the options are examples of economic freedom.
7 0
3 years ago
Read 2 more answers
Which accomplishments are most associated with the Gupta Empire?
Ksivusya [100]

Answer:

developments in astronomy and of the concept of zero

Explanation:

The most associated accomplishments of the Gupta Empire is the developments in astronomy and of the concept of zero.

The other achievements of the Gupta Empire are present in different fields include sculpture, war, literature,  architecture, and painting. All the achievements named the era as India's "golden age."

Hence, the correct option is "developments in astronomy and of the concept of zero".

4 0
3 years ago
Protectionist" trade policies are designed to A) increase imports. Eliminate B) protect domestic industry. C) reduce tariffs on
bekas [8.4K]
Answer should be B. protect domestic industry 
7 0
3 years ago
Read 2 more answers
Need help with this will award Branliest answer !!!
Alika [10]
Okay so #2 would be C.

And #3 would be B.

Good luck! :D
8 0
3 years ago
When the morris worm exploited the "finger" vulnerability, where did the shellcode reside when it executed?
eimsori [14]
<span>The Morris Worm was one of -- if not the -- first worms that used the Internet to travel, and it did so by being deposited in the buffer overflow. It used a network service finger vulnerability in Unix to spread from machine to machine: the finger program ran at the root (admin) level and was programmed to assume no username would exceed 100 characters. By creating longer names, the worm code was entered, copied, and passed on. Buffer overflow attacks occur when too much code or data is entered or created for the buffer to hold. This creates an error in which data is stored elsewhere, or in this case, the code entered using the username vulnerability.</span>
6 0
3 years ago
Other questions:
  • How does Jean Bodin define absolute rule?
    7·1 answer
  • What was Medieval European feudalism?
    7·1 answer
  • Which city currently charges drivers a "congestion toll" to drive into the heart of the city's financial, legal, and entertainme
    7·1 answer
  • Which statement comparing the Middle Ages to the Renaissance is false? A. The church had more power in the Middle Ages than it d
    15·1 answer
  • Ceremonial task of a governor that are not required by law
    8·1 answer
  • Why the Tribune Tower is important???
    8·1 answer
  • What is ISIS doing now?
    8·2 answers
  • Which of the following is a given power to the federal government Making marriage laws. Declaring war. Creating local government
    14·1 answer
  • What changes did the Market Revolution lead Congress to make between 1820 and 1850?
    8·1 answer
  • Question 6(Multiple Choice Worth 3 points)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!