1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
12

According to Sam W. Haynes, what were two reasons for United States expansion in the 1840s?

Social Studies
1 answer:
olchik [2.2K]3 years ago
7 0

Answer:

I think it's Maxican war because it says on the bottom

You might be interested in
Due today! Questions in a DBQ are based on
Dvinal [7]
Don’t press the link if might have a virus or cookies
6 0
3 years ago
Read 2 more answers
1.<br>What kinds of plants grow in the tundra?​
anastassius [24]

Answer:

short shrubs, sedges, grasses, flowers, birch trees and willow trees

Explanation:

5 0
3 years ago
Read 2 more answers
Alex was invited to a formal dinner by his manager. As he had never been a part of a formal six-course meal, he was not sure abo
Makovka662 [10]

The correct answer is B. Modeling

Explanation:

Modeling is a learning strategy or cognitive-behavioral technique that implies observing the behaviors or actions of others and then modeling or shaping own actions and behaviors according to the ones observed. This means learning occurs through modeling or by copying others. This is the case of Alex because as he does not know how to use cutleries he decided just to observe others and then copy their behaviors which means he larnt to use cutlery through modeling.

6 0
3 years ago
Which activity is an example of slander ?
Vesnalui [34]

Answer:

B

Explanation:

An slander is the defamation of a person, make a false spoke about a person. So in the Answer B this person is giving a speech based on lies about a  private citizen. That is the false spoke direct to a person.  

5 0
3 years ago
Read 2 more answers
What is to pass-through to gain secret information
kogti [31]
I believe the answer is: infiltrate
The infiltration method that most popular in recent years have been developed into two main method.
The first method is by posing into someone that work around the desired data and the second method is by using hacker to got into the other party's system.<span />
4 0
3 years ago
Other questions:
  • A city wants to build a new police station. What type of bond does it issue?
    12·2 answers
  • Mohit spent his days combing through garbage in Mumbai, India with his brothers and sisters. Sometimes he would find food, or so
    15·1 answer
  • We misjudge the causes of another person's behavior because we overestimate internal, personal factors and underestimate externa
    6·1 answer
  • A person ________ be cheaply prevented from using national defense, a(n) ________ good. cannot; excludable cannot; nonexcludable
    9·1 answer
  • Help ASAP
    12·2 answers
  • Frank worked as a professional cabinet maker most of his adult life. He very much enjoyed this work, but is now somewhat limited
    13·1 answer
  • Northc04
    7·2 answers
  • Difference between North Pole and South Pole
    15·1 answer
  • What is the best definition of mantle?
    8·2 answers
  • On July 4th 1918 did American launched 248 ships
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!