1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
12

How were Kurdish people generally treated during the 20th century?

English
1 answer:
tino4ka555 [31]3 years ago
5 0
I'm like 90% sure it is d sorry if I get it wrong for you!

You might be interested in
Which theme is best supported by this passage?
Ganezh [65]

Answer:

Courage can be seen in the most unlikely people

Explanation: though now women should be seen as equals in colonial times they were vastly underestimated, even if they were suspicious on the women they wouldn’t truly believe that a woman could have pulled off something like that.

3 0
3 years ago
Which of the following sentences is a compound sentence? A. The line was significantly shorter than usual which was a relief. B.
soldier1979 [14.2K]

Answer:

b

Explanation:

I'm pretty certain that this is either b or d. This one does sound like its b, though.

4 0
3 years ago
Read 2 more answers
3. The girl picked the flowers. *
gtnhenbr [62]

Answer:

1.a. the books are brought by the students

2b. the ball is played by the boys

3.b. the flowers are picked by the girl

7 0
2 years ago
Read 2 more answers
Which does not describe the meaning of plausibility? supportable undeniable believable defensible?
slavikrds [6]
Undeniable is the answer
7 0
4 years ago
Which details support the central idea that information on the Internet is not protected well enough? Check all that apply. “onl
jenyasd209 [6]

The correct answers are "Only a small fraction is securely encrypted; the remainder is poorly encrypted" and "Anybody can get their hands on more information".



It is true that not all of the internet traffic is protected. About 60% of this traffic is encrypted; the rest remains a work in progress. This puts uncovered information at the risk of getting collected by able computer security technicians.


With the increasing availability of tools to simulate firewall security breaches, free to download from the internet, anybody who takes the time to learn these practices is capable of compromising unencrypted information - or even encrypted, depending on their skill.



The other options are not to be considered supportive of the central idea since:



The quantity of internet users is irrelevant to the fact that whether the current amount of information is at risk or not. The precautions these users take when browsing the web however, are a more contributing fact to the idea.

Most people do not take adequate precautions when it comes to their privacy, evidence being that the amount of personal data submitted to social networks allows their administrators to take advantage of it, selling the information to advertisers and ensuring a multi-millionaire income.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Do you know this answer
    5·1 answer
  • 50 POINTS
    12·1 answer
  • Which two sentences from the article support how the author feels about Malala?
    13·2 answers
  • During April and May, the rain was so _____ that we thought we might have to trade in our car for a boat.
    6·1 answer
  • Which of the following is a trait for American romanticism?
    9·1 answer
  • Rising Action of la luna
    5·1 answer
  • What is a more formal way of saying "not worthwhile"?
    11·1 answer
  • Can we just talk about the Moro arc in dbs
    5·1 answer
  • Location B is which place?<br> O Canaan<br> O Mediterranean Sea<br> O Egypt<br> O Syrian Desert
    14·1 answer
  • Making inferences the narrative of the life of Frederick Douglass, what inference can be drawn about the boys in this excerpt
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!