1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
9

Which of the following statements can be used as evidence that ancient Greek beliefs and art has been influential? Select the th

ree correct answers. A. The Metropolitan Museum of Art in Modern in New York City contains many abstract paintings. B. We read fables as children to learn moral lessons. C. Today sculptors and painters avoid realism in their art. D. The columns of the Lincoln Memorial in Washington D.C. provide balance and harmony. E. Comedies and dramas are popular types of theater on Broadway.
Fist one will mark brainlyest
Computers and Technology
2 answers:
Alik [6]3 years ago
7 0

Answer:

B

Explanation:

WINSTONCH [101]3 years ago
3 0

Answer:

A, B, D

Explanation:

I'm gonna go with these few answers because, well I'm not an expert with this stuff but the Metroplian Museum of Art has the Greek Design on the walls. And B, children are required in school to read such things for this reason. And D, seams like the correct answer for this better than the other ones.

Hope I helped you out, Reza106157

You might be interested in
What best describes "broadband access"?
Andre45 [30]

Answer:

The Correct option is : d. BROADBAND ACCESS enable users to connect to a high speed networks

Explanation:

As the names implies BROADBAND ACCESS can be defined as a technology that enables users to have the access to fast and high speed internet connection when browsing, streaming or downloading reason been that BROADBAND ACCESS is more faster and quicker which inturn enables the user to do a lot more on the internet which is why BROADBAND ACCESS is often refer or known as a high and fast speed Internet access connection.

5 0
3 years ago
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
4 years ago
Egovernment involves the use of strategies and technologies to transform government by improving the delivery of services and en
aleksandrvk [35]
I guess the answer True
3 0
3 years ago
Using tracking code, google analytics can report on data from which systems?
soldier1979 [14.2K]
The correct answers are:
<span>E-commerce platformsMobile
Applications
Online point-of-sales systems
Source and explanation: https://goo.gl/guJKC9
</span>
6 0
4 years ago
Write the name of the tab, the command group, and the icon that you need to use to justify text
const2013 [10]

Answer and Explanation:

In order to use the justified text

The name of the tab is the Home tab

The command is

First select the data in which you want to justify

Than go to the home tab after that go to the paragraph tab and then click on the dialog box launcher after that choose the drop-down menu of alignment and set justified text

The shortcut key is to use it is Ctrl + J

4 0
3 years ago
Other questions:
  • I need someone who knows HTML to finish the code.
    12·2 answers
  • A user reports his or her computer is slow to boot. You check the boot order and determine that the computer is checking the C d
    12·1 answer
  • write a program that asks the user to enter a positive integer, then prints a list of all positive integers that divide that num
    6·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • What happens if you have you an image that has 6 bits-per-pixel and you change it to 12
    6·1 answer
  • When working on developing an ability, it is important to get feedback to know how you are doing.
    6·1 answer
  • You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
    5·1 answer
  • What is missing in the following program in order to have the output shown?
    15·2 answers
  • If int a = 4, int *b = &amp;a , int **c= &amp;b;<br> what is the value store in c.
    15·1 answer
  • There is overlap in the subjects of study in the different information technology disciplines.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!