1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antiseptic1488 [7]
3 years ago
12

Why did americans want george whachington to be president

Social Studies
2 answers:
Kitty [74]3 years ago
7 0
Americans wanted to make George Washington president because he was a war hero, and they wanted to have someone trustworthy as president. George Washington helped win the war, and that proved that he was trustworthy.
oee [108]3 years ago
5 0
<span>Americans wanted to make George Washington president because he was a war hero, and they wanted to have someone trustworthy as president.</span>
You might be interested in
________ controls cover security processes that are designed by strategic planners and implemented by the security administratio
Lorico [155]

Answer: Managerial

Explanation:

Managerial control is the part of management process in an organization.This control system is followed for management of operations, setting certain standard of performance for employee and organization,security design etc.It also involves methods to solve issue and take corrective actions.

This control of management is created by strategic planner as per planning business organization function , responsibility and goals.This plan is implement in firm by security administration

4 0
3 years ago
__________ are distinctive styles of creative works and they represent different types or formats of media content
amid [387]
Genres are distinctive styles of creative works and represent different types or formats of media content.
6 0
2 years ago
Harold and Marci decide to burglarize Superior Jewelers. Their friend Carl, an employee at Superior, helps by telling them the l
cestrela7 [59]

Answer: This is how each person will be charged:

Principal = Harold

Accomplice=Marci

Accessory before the fact = Carl

Accessory after the fact=Shawn, David

Explanation:

Principal :

Is the person who commit the actual crime , Harold is the one who went inside and cracked the safe hence he is the one who commited the actual crime.

Accomplice:

This is the person who assists someone to commit a crime , Marci drove the van to the place where Harold will commit this crime so she provided him with the transport to go and commit burglary and she is the one who helped Harold get away .

Accessory before the fact:

This is a charge given to someone who encourages ,counsels and aids someone to commit a crime eventhough this person will not be physcally there at the scene. Carl is the one who told them where the vault is located which encouraged them more to commit this crimes because they were equipped with knowledge.

accessory after the fact

This is a charge given to someone who helps a person who has committed a crime eventhough they were also not there at the scene. Shawn is told by Harold that him and merci have commited burglary but he decided to help him get away instead of reporting the crime. David saw the crime being commited but still didn't say a thing to the police.

5 0
3 years ago
How chi John Tyler become president?
Lilit [14]

John Tyler became the tenth President of the United States (1841-1845) when President William Henry Harrison died in April 1841. He was the first Vice President to succeed to the Presidency after the death of his predecessor. As a Senator he reluctantly supported Jackson for President as a choice of evils.

6 0
4 years ago
Jennifer is a junior system administrator for a small firm of 50 employees. For the last week a few users have been complaining
love history [14]

Jennifer most likely seeing ARP Poisoning .

<u>Explanation: </u>

ARP or Address Resolution Protocol poisoning refers to when an attacker uses his devices to send falsified ARP messages over a LAN in order to link the attacker’s MAC Address with the IP addresses of one or more legitimate computers on the server.

Through this, the attacker is able to receive any message the legitimate computer received as well, allowing the attacker to block, modify or even intercept the communications of the legitimate computer on the server. The symptoms shown in the case here, showing intermittent connection losses even though no large downloads are taking place.

5 0
3 years ago
Other questions:
  • A plague called The Black Death swept Medieval Europe. At the time, people believed cats spread the plague (cats were associated
    7·2 answers
  • What is the first name of the wagon leader
    11·2 answers
  • Hi<br> What is the difference between noise and music?<br> Answer if you know!!!!!
    7·2 answers
  • How did God help Moses convince the pharaoh to let the Hebrews leave Egypt?
    10·2 answers
  • John reads that the Fed has recently begun increasing its interest rates. Which of the following investments would lose value mo
    12·1 answer
  • What does the name Phoebe mean?
    10·2 answers
  • Which of these was NOT a component of the American System?
    12·1 answer
  • Name the people who involved on teaching?​
    11·1 answer
  • how Spain’s final attempt to regain control over Mexico contributed to Antonio Lopez de Santa Anna’s rise to power.
    7·1 answer
  • As she nears her 100th birthday, Maggie, though remaining happy, has begun to become much less involved with her church and othe
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!