1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
4 years ago
5

The Mycenaeans valued objects that required time and effort to make. true or false

Social Studies
1 answer:
Reptile [31]4 years ago
7 0

The Mycenaeans did value objects. The answer is true.

You might be interested in
A common criticism of judicial federalism is that it leads to ________.
IRISSAK [1]
It prompts more prominent divided political impact. Quite a bit of legal federalism is subject to legal audit and also different acts characterizing the legal's part in the U.S. government. The principal Congress passed the Judiciary Act of 1789, which built up the lower government courts and determined the subtle elements of elected court locale.
5 0
3 years ago
T or F
dangina [55]

Answer: true i think

Explanation:

5 0
4 years ago
What type of economic system are marxist and conflict theories primarily critical of?
mixas84 [53]
The correct answer is capitalist.
Marx had neutral to negative feelings about capitalism - he thought that at one point, the system would stagnate, and would undoubtedly be succeeded by socialism. So capitalism as a system, according to him, was unnecessary. He thought that revolution was necessary to get rid of the system, and conflict theorists agreed. 
4 0
3 years ago
Read 2 more answers
What uses authentication header (ah) and encapsulating security payload (esp) to create secure data transmissions?
gtnhenbr [62]

AH is an important IPSec security protocol that provides packet authentication and anti-replay services. AH is defined in RFC 2402 and uses IP protocol security

The AH protocol only provides a mechanism for authentication. AH provides data integrity, data origin authentication, and optional replay protection services.

AH-style authentication authenticates the entire IP packet, including the outer IP header, while the ESP authentication mechanism only authenticates the IP datagram portion of the IP packet. Each protocol can be used alone to protect IP packets, or both protocols can be used together in the same IP packet.

Learn more about ESP at

brainly.com/question/27889683

#SPJ4

3 0
2 years ago
Buchanan Welders cannot raise its prices in its highly competitive industry. Which one of the following is an option if Buchanan
Murljashka [212]
The correct answer is C
8 0
3 years ago
Other questions:
  • What is 10-9(2-6a) equal to
    11·1 answer
  • Economically, what was the most common way of life in the Southern Colonies?
    14·2 answers
  • The (blank) was the main opposition group to apartheid in south africa. founded in 1912, the group was later banned by south afr
    9·2 answers
  • Give two reasons why both men and women could become victims of voilence
    11·2 answers
  • Which types of appeals are most often found at the end of a speech to show the audience the importance of the issue, as well as
    10·1 answer
  • Which of the following is an accurate comparison of the two court cases?Baker v. Carr (1961) - Shaw v. Reno (1993)A. Ruled that
    6·1 answer
  • What is a good time for a 100 meter dash in middle school?
    12·1 answer
  • Why is it important to stay positive in difficult times? ​
    7·2 answers
  • What is the temperature of the middle most layer of the Sun's atmosWhat is the temperature of the middle most layer of the Sun's
    15·1 answer
  • Who here goes to crimson cliffs middle school I do and who likes do re mi by black bear
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!