1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
riadik2000 [5.3K]
3 years ago
14

Which of the following did President Andrew Jackson support

Social Studies
1 answer:
Ann [662]3 years ago
5 0
President Andrew Jackson supported states rights
You might be interested in
Please help i’ll give you brianlest
nadya68 [22]

Answer:

It was the Thornton Affair im quite sure.

Explanation:

6 0
2 years ago
During lecture, Psy 1001 students saw an experiment in which participants were told either that they would experience intense an
sveticcg [70]

Answer:

b. as the dependent variable.  

Explanation:

Dependent variable: It is defined as the variable that is being tested and measured in the scientific experiment. The experimenter or the researcher focuses on the fact that if they change the independent variable in an experiment, then how does it leads to change in the dependent variable.

Fundamentally, the experimenter or the researcher controls or changes the independent variable to see the undeviating effect on the dependent variable.

The dependent variable is always dependent on the independent variable in an experiment.

Example: The researcher is interested in how anxiety affects heart rate in humans.

8 0
2 years ago
Read 2 more answers
During which phase of the kill chain framework does an intruder extract or destroy data?
Rainbow [258]

The stage of the kill chain framework that an intruder extract or destroy data is: <u>The extraction stage.</u>

<h3>What is extraction stage?</h3>

The extraction stage can be defined as the stage where an unauthorized person gain access to a sensitive or confidential information and then destroy the data or information after extracting it.

On the other hand an intruder can be defined as a unauthorized person who gain access to store data.

Therefore The stage of the kill chain framework that an intruder extract or destroy data is: <u>The extraction stage.</u>

Learn more about  extraction stage here:brainly.com/question/20491126

#SPJ1

4 0
1 year ago
Help ASAP please!
PSYCHO15rus [73]

Answer:

the answers are 1,2 and 4

8 0
3 years ago
A portion of the population selected to represent the population is called
Leviafan [203]
A portion of the population selected to represent the population is called. statistical inference. Data and Statistics. a census.
4 0
3 years ago
Other questions:
  • How Many Mc'Donalds Does Have U.S.
    15·2 answers
  • Coleman is currently 30 years old. when he was 15 years old, he took an intelligence test and was told that his iq score was 110
    9·1 answer
  • What was accomplished by members of the Second Continental Congress during their meeting in Philadelphia?
    13·1 answer
  • The u.s. constitution protects the right to free speech—which means only the government can take away this right.
    10·1 answer
  • A probation officer does not need a search warrant or probable cause to search a probationer's residence.
    6·1 answer
  • If you have a smartphone, it has parts and subassemblies that come from all over the world, including Mexico, Israel, Belgium, H
    10·1 answer
  • What was the most powerful, destructive force in 1814?
    5·1 answer
  • One result of the Silk Road was
    14·1 answer
  • What is the muslim city like
    5·1 answer
  • being a member of the chipotle rewards program is really rewarding. what can chipotle rewards members earn just by signing up an
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!