1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vivado [14]
3 years ago
15

Which two statements are examples of animal responses to threats that help them survive?

Social Studies
1 answer:
Deffense [45]3 years ago
4 0
Where is are the statements
You might be interested in
Explain why the government imposes price floors and price ceilings in certain markets.
mina [271]
Price ceilings prevent a price from rising above a certain level. When a price ceiling is set below the equilibrium price, quantity demanded will exceed quantity supplied, and excess demand or shortages will result. Price floors prevent a price from falling below a certain level.
4 0
3 years ago
The Constitution party advances a conservative approach to issues and would most likely support policies that __________.
wel

Answer:

A

Explanation:

This would be so because to take a conservative approach, not much would change. A conservative outlook would support past laws, etc.

3 0
3 years ago
Write any two hindrances in infrastructural development​
tangare [24]

Answer:

-lack of clarity and consistency of national objectives and standards.

-complex and inflexible approval processes.

7 0
3 years ago
Why were Americans most likely willing to accept such a large growth of the federal government?
Leona [35]
Federal programs helped their own lives.
3 0
3 years ago
A secretary at your office just got off the phone with someone who said he was calling from the corporate IT department. The cal
lisabon 2012 [21]

Answer: Social engineering

Explanation: Social engineering is simply the use of engineering know-how in a deceitful and unethical manner. It involves gaining the trust of a user on the other side of either an email, website et cetera and using that gained trust to collect the user's delicate and private information such as bank details, password, pins and so on. These collected details allow them gain access into the user's accounts, PC etc.

The secretary in the office is most likely a victim of social engineering crime.

7 0
3 years ago
Other questions:
  • According to te fifth Amendment, when is a grand jury indictment required?
    9·1 answer
  • Which of the following situations would encourage the European Union to put tariffs on imports
    7·1 answer
  • What is the root word for navigation?
    10·2 answers
  • Two brothers Sam and Jim were fighting over the division of their ancestral property. After ten years of legal battle, a frustra
    14·1 answer
  • (Citizenship 02.02 MC) "In determining questions in the United States in Congress assembled, each State shall have one vote."—Ar
    11·1 answer
  • What is carved into Plymouth Rock?
    8·1 answer
  • The marginal propensity to consume (MPC) is defined as the fraction of a. total income that a household either consumes or saves
    12·1 answer
  • Which of the following characterizes the spoils system?. A. Elected officials rewarded their supporters with jobs. . B. Governme
    11·2 answers
  • PLEASEE HELPPPPP <br> FOR 35 POINTS
    8·2 answers
  • How does a woman being treated as a servant for a man show that equality between men and women is not being promoted?? PLS HELP;
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!