1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
3 years ago
14

What was the major cause of the Hundred Years’ War?

Social Studies
1 answer:
lapo4ka [179]3 years ago
6 0
The principal cause of the Hundred Years’ War was a dynastic struggle for the French throne
You might be interested in
PLEASE HELP WITH MY SOCIAL STUDIES ABOUT WORLD WAR 2!
anzhelika [568]
The Second World War was history's largest and most significant armed conflict. It served as the breeding ground for the modern structure of security and intelligence, and for the postwar balance of power that formed the framework for the Cold War. Weapons, materiel, and actual combat, though vital to the Allies' victory over the Axis, did not alone win the war. To a great extent, victory was forged in the work of British and American intelligence services, who ultimately overcame their foes' efforts. Underlying the war of guns and planes was a war of ideas, images, words, and impressions—intangible artifacts of civilization that yielded enormous tangible impact for the peoples of Europe, east Asia, and other regions of the world.

3 0
3 years ago
In your own words, summarize how the Jacksonian Era was characterized? will give Brainlienst
Bingel [31]
The Jacksonian Era was characterized by the idea that every citizen was equally important and that all should participate actively in government.
5 0
3 years ago
Which of the following is not a social engineering attack: a. Dumpster diving b. Hacking c. Shoulder surfing d. Persuading a rec
CaHeK987 [17]

Answer:

e. None of the above

Explanation:

Social engineering attack is the ability of a hacker to use manipulation to trick users into making security mistakes or giving away sensitive information. This engineering attack is based on four principles of <em>investigation, hook, play and exit.</em>

The hacker investigates the victim to gather informations before tricking the victim to trust him or her by deploying series of methods generally callled the hook. From the options listed (information) above, non of this four principle is obtainable.

6 0
3 years ago
How do command economies prioritize the interests of people, the government, consumers, and private businesses involved in the e
Kitty [74]

Explanation:

It seeks to eliminate unemployment. The central plan sets the priorities for the production of all goods and services. That includes quotas and price controls. Its goal is to supply enough food, housing, and other basics to meet the needs of everyone in the country.

5 0
3 years ago
Love, which can’t be observed or measured directly, is an example of a psychological construct. Please select the best answer fr
VikaD [51]

Answer:

true, as it is something we build up in our mind and set out to make but cannot be physically measured

7 0
3 years ago
Other questions:
  • The police may not make a nonconsensual warrantless arrest inside a person's home or arrest a guest within that home without:
    6·1 answer
  • The social psychologist Fritz Heider is historically important in the field for his contribution of
    9·1 answer
  • How can a wildflower from Switzerland grow wild in montana
    11·1 answer
  • Which of the statements about hunting behavior among chimpanzees is not correct?
    6·1 answer
  • Swahili in east africa and english in global commerce are examples of
    7·2 answers
  • A battle where one side holds a place that can be defended while the other side traps them in. 5 letters. 2nd letter is I.
    14·2 answers
  • Help anyone ??????plsss
    14·1 answer
  • Qué importancia tiene el arte en el ejercicio de<br> la política.
    12·1 answer
  • Q1: How is Zenn Buddhism Different than Traditional Buddhism?
    9·1 answer
  • Select all the correct answers.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!