1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
3 years ago
13

What best describes printing before The invention of the Gettysburg printing press

History
1 answer:
lana [24]3 years ago
6 0

Answer:

a long, expensive process

Explanation:

You might be interested in
Angelo knew that 64 = 8 × 8. Which expression also equals 64? A. 9 × 7 B. 10 × 6 C. 5 × 12 D. 32 × 2
7nadin3 [17]
The answer is D

D. 32x2=64
7 0
3 years ago
Which of the following writers contributed to the Harlem Renaissance?
Kay [80]

The correct answer is D) Zora Neale Hurston.

<em>The writer that contributed to the Harlem Renaissance was Zora Neale Hurston</em>

Zora Neale Hurston (1891-1960), was an African American writer and civil rights supported that contributed to the period known as the Harlem Renaissance with important novels such as "Sweat" and "Her Eyes were Watching God." Hurston was an important part of the Harlem Renaissance and was a friend of key figures of the Harlem Renaissance such as Countee Collen and Lanston Hughes.

8 0
3 years ago
Read 2 more answers
In the case Marbury v. Madison, what was William Marbury’s appointment?
Elden [556K]
He was appointed as a Federal judge.
3 0
3 years ago
Read 2 more answers
During the Cold War, the greatest deterrence to a nuclear war between the U.S. and the Soviet Union was?
Bogdan [553]
A.


Hope this helps:))
6 0
3 years ago
When the morris worm exploited the "finger" vulnerability, where did the shellcode reside when it executed?
eimsori [14]
<span>The Morris Worm was one of -- if not the -- first worms that used the Internet to travel, and it did so by being deposited in the buffer overflow. It used a network service finger vulnerability in Unix to spread from machine to machine: the finger program ran at the root (admin) level and was programmed to assume no username would exceed 100 characters. By creating longer names, the worm code was entered, copied, and passed on. Buffer overflow attacks occur when too much code or data is entered or created for the buffer to hold. This creates an error in which data is stored elsewhere, or in this case, the code entered using the username vulnerability.</span>
6 0
3 years ago
Other questions:
  • What strategy did the united states pursue in waging war against japan?
    8·1 answer
  • single company that controls a business or industry A. monopoly B. patent C. Network D. trust E. free enterprise system
    6·1 answer
  • This country surrendered after two atomic bombs were dropped on it.
    15·2 answers
  • What was one consequence of the widespread disease that killed many native americans?
    12·1 answer
  • How did the economic crises in france lead to the estates-general
    7·1 answer
  • Under the great compromise each state would have equal representation in the ______
    10·1 answer
  • What is the difference between human capital and capital goods?
    10·2 answers
  • GIVE AWAY THIS IS MY 5 TIME GIVING AWAY 100 POINTS AMKE SUREW YOU TELL PEOPLE AOUT ME
    8·2 answers
  • HELP ASAP!! Can someone help me write an article about Ancient Indus valley civilizations? And my teacher said to use informatio
    6·1 answer
  • Describe the significance of technological innovations in the area of transportation that have modified the physical environment
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!