1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
3 years ago
12

Southern States Wanted... But... So...

Computers and Technology
1 answer:
Dvinal [7]3 years ago
8 0
The southern states wanted slavery, but the northern did not, so they had a civil war. :P
You might be interested in
In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
Brrunno [24]

A useful advantage of Asymmetric encryption over symmetric encryption is that there is no secret channel necessary for the exchange of the public key, unlike in the symmetric encryption which requires a secret channel to send the secret key.  

Another advantage of Asymmetric encryption is that is has increased security. Asymmetric uses two different keys (Public and private) for both encryption and decryption of data while symmetric uses one.

5 0
3 years ago
Read 2 more answers
How many fnaf games did Scott Cawthon make?
MrMuchimi

Answer:

8 but he is making FNaF security breach

Explanation:

there is FNaF VR help wanted

7 0
3 years ago
Computer networks make setting appointments easier by _____.
Sunny_sXe [5.5K]

Probably providing a common calendar

5 0
3 years ago
Read 2 more answers
Hello everyone can help me give all the answer​
krek1111 [17]

Answer:

1. were

2. were

3 was

4 was

5 were

1 wasnt

2 werent

3werent

4 wasnt

5 werent

were you at work?

was it in the garden?

were they worried?

was lucy present?

were his friends late?

1 they were

2 it was

3 he wasn't

4 I was

5 they weren't

Explanation:

7 0
3 years ago
What are color highlights?
SVETLANKA909090 [29]

A- overusing highlights lowers the contrast and degrads the effect of the highlights.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
    14·1 answer
  • A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
    12·1 answer
  • Company XYZ has a new employee named John Anderson. His employee ID is XYZ1234. His email address will be <a href="/cdn-cgi/l/em
    10·1 answer
  • If Asa changes the text to bold, he has changed the style. True False
    8·2 answers
  • Plot element is typically the turning point in the most intense moment of a story
    8·1 answer
  • Mobile computing is growing in importance each and every day, and the IT manager must take that into account. Do some web resear
    14·1 answer
  • Please help with my Python code - Functions
    6·1 answer
  • Which line correctly starts the definition of a class named "team"?
    7·1 answer
  • Selection Sort List the resulting array after each iteration of the outer loop of the selection sort algorithm. Indicate the num
    10·1 answer
  • I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!