1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
14

John adams and many others who would end up writing the founding documents of america believed in a system, known as a _________

_, where the people would set up and agree upon the basic rules and procedures that would govern them.
Social Studies
1 answer:
labwork [276]3 years ago
4 0
A constitutional system
You might be interested in
Europeans wanted slaves because the crops they were growing in their New World colonies were __
Liula [17]

Answer:

I'd say new and confusing because they did not know how to grow new crops that they weren't familiar with.

Explanation:

4 0
3 years ago
Name the dynasty that attached and overthrew the shang dynasty in 1100 BC
Anna11 [10]
The Zhou Dynasty. They later on created the Mandate of Heaven.

Hope this helped!
3 0
3 years ago
The goal of interpretive research and theory is ____________. a. changing the social world b. shifting perception c. challenging
Vinvika [58]

Answer:

D. Understanding

Explanation:

Interpretive research is a form of research that seeks to reveal the actual definition toward a reasonable understanding of selected cases.

In other words, it is a undertaking to analyze and comprehend social reality.

This often done through the personal perception of the people within the social construct where the issue of analysis is being conducted.

Hence, in this case, the correct answer is "Understanding"

5 0
2 years ago
N a theocracy, rules claim to have gotten their power from:
Mama L [17]

Answer:

god

Explanation:

5 0
2 years ago
_________ is any danger to which a system may be exposed. Select one: a. Exposure b. Information security c. Security d. Threat
kow [346]

Answer:

The answer is D. Threat.

Explanation:

In computer security, a threat is defined as a possible danger through which vulnerability can be exploited to infringe security and in this way, provoke possible harm. A threat could be "intentional" or "accidental". It could be provoked by an event, a specific action, or any kind of circumstance.

A threat can exploit some vulnerabilities related to a resource. This can provoke many problems concerning some properties that belong to the resources. They include confidentiality, integrity or availability and it can also affect other involved parties. For example customers and suppliers.      

3 0
3 years ago
Other questions:
  • Tom is studying how changes in income affect the frequency of eating out. In this example, "changes in income" is the ________ v
    10·1 answer
  • Which of the following events would cause both the equilibrium price and equilibrium quantity of number two grade potatoes to in
    9·1 answer
  • A researcher is interested in how individuals in a certain city feel about the chance of their becoming victims of a crime. To i
    10·1 answer
  • Which of the following is NOT a recommended characteristic for incident objectives?
    12·1 answer
  • How does Multiculturalism affect activism?
    7·1 answer
  • Anita is not sure if she should consider going to college or trade school after she graduates from high school. She decides to a
    11·1 answer
  • The main feature of the Virginia plan regarding the legislature?
    9·1 answer
  • How were people made aware of the magna carta's existence?​ (NEED HELP ASAPP!!)
    11·1 answer
  • Napata, the capital of the Nubian Kingdom, became a center of trade?
    12·1 answer
  • Judy is able to walk a 2-inch-wide balance beam, hop and jump accurately into small squares, and perform jumping-jacks. judy is
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!