1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
7

In what region of the united states is Mississippi located ?

Social Studies
1 answer:
Margarita [4]3 years ago
4 0

Answer:southern United states

Explanation:

You might be interested in
Which sociological perspective holds the view that people create their social worlds through interaction and manipulation of sym
antiseptic1488 [7]

Answer:

The answer is symbolic interactionism.

Explanation:

Symbolic interactionism is a sociological perspective that states societies are created through the interaction of its members, which in turn create symbolic "worlds" or perspectives that shape their culture.

These symbols may be created by the media, for instance, by the way they represent other cultures or role models for society.

3 0
3 years ago
What advantage did India have won making the constitution
tensa zangetsu [6.8K]

Answer:

- Freedom from the influence of the Great Britain

They no longer had to put up with the pressure of having to elect officials that is wanted by the Great Britain. They can elect someone who can genuinely care for the country's development.

- Ability to forms their own laws that are suitable to their own culture

some of the laws that made during the colonization designed to conformed to western principles  / philosophy. Making own their constitution means that India no longer have to do this.

- Ability to form an alliance outside of Great Britain's social circle.

Such as Russia and China for example. They won't be able to form an alliance with them if they are still under the British influence.

- Create the economy that benefit Indian people

Under British's rule, the trades laws that passed will most likely benefit the Great Britain rather than the Indian people. They will decide which products gets the subsidy and how much the products they can export. But this commodities might not be popular In Indian market.

3 0
3 years ago
The qualifications for becoming president are set forth by
Romashka [77]

Answer:

No person except a natural born citizen, or a citizen of the United States, at the time of the adoption of this Constitution, shall be eligible to the office of President; neither shall any person be eligible to that office who shall not have attained to the age of thirty five years, and been fourteen Years a resident .

Hope it helps :)

6 0
2 years ago
Although Hannah knows that praise strengthens desirable behavior in children, she is not sure what specific strategies she shoul
valentina_108 [34]

Answer: b. ​Combine physical contact with verbal praise

Explanation:

This is the best option of the options listed. Combining physical contact with verbal praise can have the effect of augmenting the verbal praise and giving it more power so to speak. For example, saying congratulations and then shaking a person's hand can really increase the weight of the congratulatory remark.

Using this method instead of the other options will help avoid confusion in the child as well as reduce the chance of the praise becoming meaningless as it was said one too many times.

4 0
3 years ago
Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just m
jonny [76]

Answer:

Those experts are called <u>White Hat Hackers</u>

Explanation:

<em>White hat hackers </em>are those whose hacking activities are for a noble cause. They are also known as <em>ethical hackers</em>. Their primary motivation is usually not for personal or financial gain.

Also, they cannot be involved in cyber espionage, system hacking without the permission of the system owner.

They could be <em>paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.</em>

6 0
3 years ago
Other questions:
  • the graph represents price and output quantities under a monopoly what price will the monopolist firm set
    12·2 answers
  • Mill argues that all types of pleasures are the same; that is, the pleasure of eating a chocolate cake is of the same type as re
    9·1 answer
  • 1. What are some of the challenges for forensic scientists in dealing with fiber evidence?
    12·2 answers
  • Karen was mugged at knifepoint 6 months ago while walking home from work. She has recently begun experiencing nightmares about b
    12·1 answer
  • In a popular movie about the Mafia, the head of the family chastises one of his sons, Sonny, for letting other people know what
    11·1 answer
  • ________ is a doctrine that raises a presumption of negligence and switches the burden to the defendant to prove that he or she
    8·1 answer
  • Why do historians classify ancient Sumer as a civilization?
    10·1 answer
  • When people are deprived of _____ sleep, they compensate for the loss directly and show a rebound effect to recover from the los
    5·2 answers
  • Pedigree diagram shows how a recessive tree is inherited in a family the red circles show family members with the trait.
    5·1 answer
  • The Himalayan Mountain Range is where ______ _____________ is located.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!