1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
10

W jakim celu powstawały pieśni żołnierskie i partyzanckie?

Computers and Technology
1 answer:
Bogdan [553]3 years ago
7 0
Some people can’t understand polish btw so do use English too but the answer is.

Wojna partyzancka, również pisana wojna partyzancka, jest rodzajem walki toczonej przez ludność cywilną lub inne osoby, które nie należą do typowej jednostki wojskowej.
You might be interested in
When approaching a bicyclist from the rear, you should slow down and
Veronika [31]

Answer:

A. Wait until it is safe to pass the bicyclist with at least three feet of clearance.

Explanation:

This is one of the traffic safety precautions to follow when driving especially in most parts of the United States of America.

Traffic safety guidelines are a list of Rules and instructions usually available in manuals and online made available by the government to its driving population in order to maintain law and order and prevent accidentals on the road. When effectively followed this guidelines can help to reduce accidents by a high Margin.

4 0
3 years ago
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a
klasskru [66]

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

3 0
3 years ago
The device that store data and program for current purpose​
Musya8 [376]

Answer:

A computer, what you are using. smh.

6 0
3 years ago
Read 2 more answers
You want to discard your old computer and want to securely erase the data from your hard drive. What can you use to do this and
qwelly [4]
Go here this should help bunches!
http://www.microsoft.com/security/online-privacy/safely-dispose-computers-and-devices.aspx
Hope this website helps!
5 0
3 years ago
Who wrote the book of luke​
netineya [11]
Luke himself wrote t the book
5 0
3 years ago
Other questions:
  • Write a program that assigns two integer values from standard input to the variables int1 and int2, then prints "true" if they a
    10·1 answer
  • A circuit contains three resistors connected in series. the value of r1 is 150 , the value of r2 is 60 , and the value of r3 is
    8·2 answers
  • A financially stable person is able to
    12·2 answers
  • A(n) ________ moves over the spinning platters to retrieve data from the hard disk.
    6·1 answer
  • While surfing online, Patricia checks her email and reads the latest messages. She then browsers a website and logs in a comment
    8·1 answer
  • What does NCR stand for
    12·2 answers
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • A company that manufactures machine parts orders a new system that makes products at ten times the speed of the earlier machine.
    15·1 answer
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • The NVCC college professor receives frequent emails disguised as official business emails. They may be requests to reset a passw
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!