1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
7

In 1947, The National Security Act was passed by Congress. It unified the army, navy, marines, and air force under the Departmen

t of Defense.
True
or
False
History
1 answer:
Nuetrik [128]3 years ago
3 0
False. It was suppose to but each branch maintained their own.
You might be interested in
How did the restoration of voting rights to white Southerners undermine efforts to preserve and protect the voting rights of the
pav-90 [236]

Answer:

The restoration of voting rights to white southerners undermined efforts to preserve and protect the voting rights of the freedman by giving the people against it the power to vote or petition against it.

8 0
3 years ago
=^.^=
Semenov [28]
1) C 2) B 3) B Hoped this helped you
7 0
2 years ago
Read 2 more answers
Diary, Albigence Waldo, December 14, 1777 “I am sick—discontented—and out of humor. Poor food—hard lodging—cold weather—fatigue—
Flura [38]
<span>the siege of Yorktown 

</span>
4 0
3 years ago
Read 2 more answers
North Africa is the name given to the countries of Africa that border the?
natima [27]

Answer:

Mediterranean Sea

Explanation:

North African countries including the likes of Algeria, Egypt, Libya, Morocco, Sudan, Tunisia, and Western Sahara are bordered by the Mediterranean seas. which separate them from Middle East and Europe entirely.

Hence, in this case, the correct answer to the question is MEDITERRANEAN SEA

6 0
2 years ago
Substitution cipher text reads Fuhucimvo tvx mou wkyhmo hybuh kw mou cqcumuucmo sgcvxmg kw vcrqucm udgim ng mou mqfu ou vxrucsus
faltersainse [42]

<u>Explanation</u>:

Another method of encryption of messages is the Substitution cipher text which involves swapping each letter of a plaintext by a different symbol as programmed by the key.

One of the popular ways to <em>decrypt</em> substitution cipher is to <u>follow this steps</u>:

  • Scan through the cipher, looking for single-letter words.
  • Count how many times each word or letter appears in the puzzle.
  • Write your guesses over the ciphertext.
  • Look for apostrophes. ...
  • Look for repeating letter patterns

7 0
2 years ago
Other questions:
  • During world war ii, the effectiveness of german u-boats and underwater mines was ended by the development of select one:
    10·1 answer
  • Why was Central Park created
    15·2 answers
  • Based upon your examination of the excerpts of the Treaty of Versailles, did the peace treaty heed Wilson’s warning about "peace
    9·1 answer
  • In the last half-century, the constitutional command requiring equal protection of the laws for all people has been critical in
    7·1 answer
  • What were the short term consequences of the spanish conquest of the americas?
    9·1 answer
  • [i]Which of these is a common characteristic of cnidarians?[/i]
    13·1 answer
  • Which of the following structures was not built during the Hellenistic period? A. the Colosseum of Rome B. the Library of Alexan
    10·2 answers
  • Report Issue
    14·1 answer
  • Guys please help me i will give Brainliest Which Statements explain what happened during the haymarket square incident? A. rally
    13·1 answer
  • According to this specific document, was the us planning to go to war in vietnam before august 1964?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!