1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korolek [52]
3 years ago
9

What was similar about the ways the North and South treated slaves

Social Studies
1 answer:
horrorfan [7]3 years ago
5 0
They just blindly accepted that slavery was ok at the time
You might be interested in
Bottom-up processing involves analysis that begins with the
White raven [17]

Answer:

sensory receptors

Explanation:

in bottom up processing, we will collect the information that taken from all of our five senses (vision, smell, touch, hearing, and taste). The experience that we have from these senses will be transferred to our brain to be analyzed. Our brain will remember this experience and might influence the decisions that we make in the future.

8 0
3 years ago
Who is the president of Malaysia?
Marat540 [252]

Answer:

Muhyiddin Yassin

Explanation:

The Prime Minister of Malaysia (Malay: Perdana Menteri Malaysia) is the head of government of Malaysia. The prime minister directs the executive branch of the federal government. The Yang di-Pertuan Agong appoints a member of Parliament (MP) who, in his opinion, is most likely to command the confidence of a majority of MPs, the prime minister, usually the leader of the party winning the most seats in a general election.

5 0
2 years ago
Scott works for a large bank that is trying to limit the risk associated with unapproved USB devices to company documents. Which
Genrish500 [490]

Answer:

D. NIPS

Explanation:

NIPS which is known as 'network-based intrusion prevention system' is a system used to monitor a network and also protect the confidentiality, integrity, and availability of a network. Majorly, its function is to protect the network from threats or malicious activities, such as denial of service (DoS) and unauthorized usage from any source. So therefore, this makes Scott limit the risks associated with unauthorized USB devices.

7 0
3 years ago
Why education is power?​
LuckyWell [14K]

Answer:

For jobs

Explanation:

without education you can't get a job

7 0
2 years ago
What are the two main ways that the Constitution limits the power of the government?
jarptica [38.1K]

Answer:

1 making the people vote for the president

2 making the votes for a law have to be accepted by 2/3 of the house

6 0
2 years ago
Other questions:
  • 1. What two religious groups formed the Protestant Union?
    8·1 answer
  • One of four women who survived eight months in the colony Mary
    12·2 answers
  • I am trying to learn the names of all 50 states. While I am actively remembering and recalling this information, it is considere
    5·1 answer
  • Discuss five contributory factors to poverty in the world
    5·2 answers
  • Approximately how long would a person's life be prolonged if he or she did not start consuming a calorie-restricted diet until t
    9·1 answer
  • Many people believed that the British Parliament had become too powerful after the decline of the monarchy in the 17th century.
    8·1 answer
  • Why did Europeans want to find new routes to Asia
    12·1 answer
  • Fallon is afraid of loud sounds, like thunder. She associates lightning with thunder because it regularly precedes thunder. Thus
    7·1 answer
  • Place the following terms in order as they would be encountered as you moved distally from the pelvic girdle to the heel.
    7·1 answer
  • Brainliest to right answer
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!