1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WINSTONCH [101]
3 years ago
14

In what language of the text , Maga Agos sa Disyerto written?​

English
1 answer:
vlada-n [284]3 years ago
8 0

\huge \text{Answer:}Known as Classical, or Literary, Mongolian, the written language generally represents the language as it was spoken in the era of Genghis Khan and differs in many respects from the present-day spoken language, although some colloquial features were introduced into Classical Mongolian in the 19th century.

\huge \text{Proud to be an Indian}

You might be interested in
The Article states:
insens350 [35]

The answer is conclusion

7 0
3 years ago
ASAP PLZZZ HELP What is the rebuttal of this paragraph? [1] It's all over the news: kids are spending a lot of time on homework.
pickupchik [31]

Answer:

5

Explanation:

A rebuttal brings the reader back to their side of the argument.

7 0
3 years ago
Read 2 more answers
It was a bright and sunny summer day, we were all hot and sticky. Swimming seemed a wonderful way to escape the heat. We decided
ololo11 [35]
D. “We decided to go to the pool.”

A sounds weird, B is incomplete, and C has random periods, leaving D
8 0
3 years ago
Read 2 more answers
Please complete this sentence. A bank of ...
Alekssandra [29.7K]
This gives no hints but my guess will be a bank of bankers
7 0
3 years ago
Read 2 more answers
Elizabeth is responsible for security policies. she is trying to implement sound end user security policies. what would be most
nadya68 [22]

Elizabeth should block end users from;

  • installing software and or
  • changing system configurations on their own machine.

<h3>Who are end users in computer science?</h3>

End users in computer science refers to the people who use Information Technology products in an organization.

<h3>What is a security policy in computer science?</h3>

The objectives and components of a company's computer systems are specified in its computer security policy.

Both extremely formal and casual definitions are acceptable. Organizational rules or security measures are used to enforce security regulations.

How a computer system is implemented technically determines whether it is secure or not.

Learn more about security policies:
brainly.com/question/4996925
#SPJ1

8 0
2 years ago
Other questions:
  • Which option is the best example of believable evidence that could be used in a hoax
    13·1 answer
  • Select the correct text in the passage.
    10·1 answer
  • Which word goes with be the reason for an action?
    15·1 answer
  • Should the story of lazarus and the rich man make us uncomfortable? Why or why not?
    10·1 answer
  • What is a news agency called that provides syndicated news to newspapers, magazines, and radio and TV stations?
    7·1 answer
  • PLEASE HELP FAST I WILL GIVE BRAINLIST
    12·2 answers
  • Which of the below best fits the definition of ADAPT? *
    6·1 answer
  • How did you feel when your mom denied you supper?​
    10·1 answer
  • HELP!
    9·2 answers
  • Qci-ycue-wyc. <br>..<br>come on join first​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!