1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
3 years ago
9

They also created a soundless music heard with the eyes,a beethovian swirl of melodies and ______?

History
1 answer:
choli [55]3 years ago
6 0
The correct answer is C
You might be interested in
What happened in the final phase of the civil war
ladessa [460]

Explanation:

Lee's Surrender at Appomattox. Robert E. Lee surrendered to Ulysses S. Grant at Appomattox on April 9, 1865, ending the fighting of the eastern theater and effectively ending the American Civil War.

6 0
2 years ago
Read 2 more answers
Molasses was used to make rum, a colonial export.
mario62 [17]

Answer:to restrict the colonies' ability to trade

to make it easier for the colonists to trade with the Dutch

to make it harder to import molasses from other countries

Explanation:

4 0
3 years ago
Read 2 more answers
Please help me!
Lapatulllka [165]

Answer:

3-C

4-D

.................

5 0
3 years ago
Read 2 more answers
How did Andrew Johnson's behavior in office influence the events of the Reconstruction era?
iVinArrow [24]
"<span>a. Johnson's behavior and use of the veto prevented Republicans from getting their bills passed without Southern Democrats supporting them" is the best option, since Johnson sympathized with the South and was opposed to many aspects of Reconstruction.</span>
6 0
3 years ago
What is a way victims of identity theft in Florida can track activity on their credit report? by giving lenders permission to ac
Grace [21]

Answer:

by canceling all of their credit and bank cards

Explanation:

Identity theft is extremely dangerous because it allows thieves to have access to a person's name, credit card number and social security number. This allows all this data to be used without consent in any activity that the thieves want, which can cause a lot of damage to the identity owner.

Anyone who is a victim of this type of theft must act quickly, contact creditors and cancel all credit and bank cards.

6 0
4 years ago
Other questions:
  • Which led to the decline of the Aztec empire?
    12·1 answer
  • Which of these factors led to the stock market crash of 1929?
    5·2 answers
  • 1. What was John Locke’s part in the American Revolution? (1 point)
    5·1 answer
  • Why did europeans see africans as a better source of labor than the native americans?
    11·1 answer
  • Who is the frist president of us
    14·2 answers
  • Can someone help me
    12·2 answers
  • All of the following are examples of proxy wars that took place during the Cold War EXCEPT _____.
    14·1 answer
  • Where are most production decisions made in the American economic system?
    11·1 answer
  • 10. What's the difference between taxes and<br> grants-in-aid?
    11·2 answers
  • The Twenty-fourth Amendment prohibited poll taxes. What was the main goal of this amendment?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!