1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ainat [17]
3 years ago
10

Do you support or oppose kaepernicks action explain maximum

English
1 answer:
AlladinOne [14]3 years ago
5 0
I am not against what Kaepernick actions because everyone stands up for what they truly believe in and he did what he felt he wanted to go for and believed in so in my opinion i support his actions and many others have as well.
You might be interested in
The organization that is responsible for the regulation of presidential campaign contributions is known as the __________.
Neko [114]

Answer:The answer is B: Federal Election Commission

The organization that is responsible for the regulation of presidential campaign contributions is known as the Federal Election Commission.

Explanation:

The Federal Election Commission (FEC) is an independent agency responsible for administering and enforcing the Federal Elections Campaign Act governing the federal elections financing. It was created in the year 1975 by the US congress. They are responsible for the disclosure of campaign finance information. They are also in charge of the public funding of presidential elections.

8 0
3 years ago
The political, economic, or cultural environment that surrounds an event provides the event with its ________.
Licemer1 [7]
The answer that would best complete the given statement above would be option A. Historical context. The political, economic, or cultural environment that surrounds an event provides the event with its historical context. Context<span> is the "setting" for an event that occurs, and the elements, conditions, and characteristics of this specific time will have an impact on the relevance of the event. Hope this answer helps.</span>
8 0
3 years ago
Read 2 more answers
How is post event management done?
TiliK225 [7]

Answer:

You can encourage feedback & send Thank you's since everyone likes to be appreciated. Also a good thing to do is engage in social media. Make sure to also be balancing the budget. Update the website every once in a while. Some other things you can do is extend the duration of your event. Also, try taking the time to be critical of yourself & your team. You need to deal with your event in details to see what worked well and what worked a little less. By doing this you will more easily be able to highlight possible margins for progress for future events. Also try to not to forget to pay any bills.

7 0
3 years ago
What effect do the speaker’s words have on the three friends?
olganol [36]

Answer:

feel grateful...

Explanation:

answer- A

5 0
3 years ago
1. A requested task is subject to be reported when:
pantera1 [17]

Answer:

When it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, etc.

Explanation:

There are various tasks such as captcha authentication, surveys, article writing, product marketing, categorizing images, etc., that can be completed over the internet or websites by outsourcing it to third-party services or individuals.

Basically, this task are posted online or made available to specific experts (workers) who are saddled with the responsibility of completing the task at a specified period of time and for a particular fee depending on the arrangement between both parties.

However, a requested task is subject to be reported when it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, date of birth, etc.

Generally, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

3 0
3 years ago
Other questions:
  • Based on the excerpt from Lawrence Ferlinghetti's poem "To the Oracle at Delphi," what does the Oracle symbolize?
    13·2 answers
  • The sun had risen. … The white man, standing gazing upwards before the doorway, heard in the hut a confused and broken murmur of
    6·2 answers
  • If a Supreme Court justice were to argue using a precedent, what might he or she do?
    13·2 answers
  • According to the following entry, which syllable is stressed in the word noticeable?
    13·2 answers
  • Richard connell describe the coastline "as an broken front of snarled and ragged jungle" why does he use the word "snarled"
    11·1 answer
  • What is in the medicine bag and what does Martin add to it at the end of the story?
    15·1 answer
  • Which best paraphrases "two hours’ traffick
    12·2 answers
  • Label each group of words S for sentence or CF for clause fragment. 3. "Because we discussed the topic of the test in great deta
    8·1 answer
  • n your opinion, what makes literature “good” or “bad”? How comfortable are you in determining the quality of literature? Do you
    5·1 answer
  • What information can you learn from the illustrations that supports this passage
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!