1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
disa [49]
4 years ago
7

When did the Allies know of the mass killings at extermination camps in Poland? 1941 1945 1944 1943 1942

History
2 answers:
Murljashka [212]4 years ago
7 0

Answer:

1941

Explanation:

The allies new about the mass killings since the start, however did not want to know.

If this helped help me with a like:)

Ad libitum [116K]4 years ago
3 0
<span>1939-19451945




Hope this couod help

</span>
You might be interested in
True or false colonies were first established by greece around 700 bc to supply food
N76 [4]

False!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

8 0
3 years ago
How does the Sultan choose leaders in the military?
lutik1710 [3]

Answer:

To replace the nomads, Orhan organized a separate standing army of hired mercenaries paid by salary rather by timar estates. Those mercenaries organized as infantry were called yayas; those organized as cavalry, müsellems.

7 0
3 years ago
Portugal's control of the ___________ broke the hold of Muslims and Italians on Asian trade.
Dominik [7]

Answer:

d. Indian Ocean

Explanation:

Portugal's control of the the Indian Ocean broke the hold of Muslims and Italians on Asian trade.

8 0
4 years ago
In 1986, recognizing the growth and potential of cybercrime, the u.s. congress passed the _______.
jarptica [38.1K]

In 1986, recognizing the growth and potential of cybercrime, the u.s. congress passed the Computer Fraud and Abuse Act

Computer Fraud and Abuse Act of 1986 - Amends the Federal criminal code to change the scienter requirement from "knowingly" to "intentionally" for certain offenses regarding accessing the computer files of another.

The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.

Cyber laws have been put in place to keep users safe on the internet. This provides internet users with access, privacy, free expression, and jurisdiction.

To know more about  Cyber laws here

brainly.com/question/20768284

#SPJ4

3 0
2 years ago
Who emerged as the most powerful Rajput clan in north India?​
storchak [24]

Answer:

are you an army nice to meet you

6 0
3 years ago
Other questions:
  • Who were the ancestors of the first native people in north america?
    12·1 answer
  • The United States military draft was known as the
    15·1 answer
  • Physical capital is known as human-made objects.<br><br> TRUE<br><br> FALSE
    13·1 answer
  • Tecumseh and Tenskwatawa were brothers who:____________
    9·1 answer
  • Can someone please help me with this.
    6·1 answer
  • Describe the early U.S. naval campaigns?
    5·2 answers
  • ANSWER NOW
    8·1 answer
  • Which of these ww2 events are in chronological order?
    7·1 answer
  • Which of the following was a cause for WWI?
    6·1 answer
  • What was the purpose of the ghettos?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!