1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ymorist [56]
3 years ago
14

How did the domestication of the camel help the development of the silk road ?

Social Studies
1 answer:
igomit [66]3 years ago
4 0
Because it was easier to travel and transport things with the camel, the camel was like a car
You might be interested in
Which of the following United States agencies is NOT concerned with international affairs?
algol [13]
C

Explanation: Have a nice day!
8 0
3 years ago
Read 2 more answers
What is a blitzkrieg and what supplies and equipment did it require
LenKa [72]

the Blitzkrieg "lightening war '. Its is based on speed and surprise and was hectic used by the germans early on in WW2 .  this most were conducted at the speed of a foot soldier or at best a horse 
7 0
3 years ago
Which part of the Thirteen Colonies is represented by Cluster B?
exis [7]

Answer: The New England colonies represents the Cluster A of the thirteen colonies

Explanation: Hopes this helps.

8 0
3 years ago
Why was George Washington sent to western Pennsylvania
andre [41]

Answer:

Virginia's governor sent 21-year old Maj. George Washington to deliver an ultimatum to the French. Control of the expansive Ohio Valley region, especially near the joining of the Monongahela and Allegheny rivers (modern-day Pittsburgh), was of great interest to both the British and their French rivals.

Explanation:

4 0
3 years ago
Read 2 more answers
_________ is any danger to which a system may be exposed. Select one: a. Exposure b. Information security c. Security d. Threat
kow [346]

Answer:

The answer is D. Threat.

Explanation:

In computer security, a threat is defined as a possible danger through which vulnerability can be exploited to infringe security and in this way, provoke possible harm. A threat could be "intentional" or "accidental". It could be provoked by an event, a specific action, or any kind of circumstance.

A threat can exploit some vulnerabilities related to a resource. This can provoke many problems concerning some properties that belong to the resources. They include confidentiality, integrity or availability and it can also affect other involved parties. For example customers and suppliers.      

3 0
3 years ago
Other questions:
  • After the 2002 Bipartisan Campaign Reform Act was passed, which new form of tax-exempt organizations first made a major impact i
    5·2 answers
  • Why does conflict develop?
    12·1 answer
  • Dawn is a week old. Ellis is six years of age. Fritzi is nine years of age. Girard is fifteen years of age. In the context of th
    15·1 answer
  • Historically, police officers made an arrest only as a last resort in what crime?
    10·1 answer
  • 2. Using data from the Apollo era, the U.S. Geological Survey recently released the first
    8·1 answer
  • Milk is a good source of water if you do not have water to drink.<br><br><br> TrueFalse
    14·1 answer
  • When liz asks her father if he minds her borrowing the car, she notices he frowns and shakes his head. What is liz observing in
    7·1 answer
  • true or false? the rhina and danube rivers create the northern boundary of the roman empire in 177 AD​
    8·1 answer
  • The Sibley Commission found in 1960 that most Georgians
    13·2 answers
  • What type of loop uses a boolean expression to control the number of times that it repeats a statement or set of statements?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!