1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
14

How does the pollen reach the egg?

Social Studies
1 answer:
Alexxx [7]3 years ago
7 0
The pollen left on stigma starts to germinate to grow pollen tube toward the egg cell 

You might be interested in
Identify two ways party leadership can influence members of their party in Congress. Identify one factor that makes it difficult
Wittaler [7]
Based on your question that ask about how leader influenced there members in the congress and what factor that makes it difficult to be successfull. First leadership trait is Offering or Endorsing Financial Assistance, and also their political power may affect. The factor that makes it difficult is the limit.
6 0
3 years ago
What are the 5 major rivers in central Europe and northern Eurasia
LuckyWell [14K]

Answer:

the Danube, the Volga, the Loire, the Rhine, and the Elbe

Explanation:

Don't be shy to give a brainlist if I am correct.

Got answer from goo gle.

6 0
3 years ago
Jade puts up a collection of sports memorabilia for bids on BuyBay, an Internet auction site. Khalil makes the highest bid and s
dusya [7]

Answer:

Option D.

Explanation:

Cyber fraud, is the right answer.

Internet fraud is a kind of scam or hoax which makes control of the Internet and could include hiding of erudition or furnishing false information to trick victims out of capital, property, and estate. There are a number of criminal and unlawful activities committed in this cyberspace.

the given question is a case of cyber fraud for the reason that jade received the payment from Khalil through the internet but she did not send the collection to him.

8 0
3 years ago
Why did the Dutch settle New York?
mart [117]
I don’t know haha haha hahha hhaaa
5 0
3 years ago
Read 2 more answers
According to nist sp 800-14's security principles, security should ________.
IgorC [24]
The answer is: <span>Be cost-effective, support the mission of the organization, requires a comprehensive and integrated approach

The nist sp 800-14 filled with the general Expectation that must be filled for an information technology system to be sued by a private corporation or </span><span>government agency. cost-effective and comprehensiveness will ensure that the benefit from using the technology will outweigh the cost</span>
3 0
3 years ago
Other questions:
  • The roman emperor famous for creating a code of law is _____________ .
    15·2 answers
  • In Ancient Egypt, a slave would most likely have worked as a
    11·2 answers
  • Why were the Phoenicians able to spread their culture over a wide area?
    10·1 answer
  • In a hypothetical situation, a certain species of flea feeds only on pronghorn antelopes. In rangelands of the western United St
    8·1 answer
  • Americans who supported the constitution, in its original form, were called ____________
    11·1 answer
  • Which of the three branches of government do you believe is most important (legeslative, esecutive, judical)? Why? Which one do
    15·2 answers
  • Why did buck find it necessary to stop respecting personal property branliy
    11·2 answers
  • An example of the Judicial Branch checking the power of another branch is BEST represented by
    5·1 answer
  • Quotes from revolutionary leaders about common sense
    6·1 answer
  • Scaffold Tech Corp. requires all job applicants for mid-level management positions to take a company aptitude test. This exam me
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!