1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
5

What were six accomplishments of the people of Mesopotamia? steam power multiplication and division metal-tipped plow weights an

d measures wheel water purification good roads written languages
Social Studies
2 answers:
irga5000 [103]3 years ago
7 0
The will, plow and writing are examples of their achievements I believe
Andreyy893 years ago
3 0

The wheel, plow, and writing (a system which we call cuneiform) are examples of their achievements. The farmers in Sumer created levees to hold back the floods from their fields and cut canals to channel river water to the fields. The use of levees and canals is called irrigation, another Sumerian invention.

You might be interested in
10. Why do people in deserts traditionally travel on backs of camels? (Write your answer
Varvara68 [4.7K]
Camels can drink water and then not have to drink water for a long long time, thus travellers don’t have to worry about giving them water.

Their feet are good for walking on sand.

Camels have always lived in deserts so they are used to living there, they won’t die as easily.
3 0
3 years ago
Often with downloaded music or apps, programs that seem authentic but perform an unwanted activity when activated are called a _
goldenfox [79]

A trojan horse are examples of malwares with a downloaded music or apps programs that seem authentic but perform an unwanted activity.

<h3>What is a trojan horse?</h3>

This refers to a class of malware that is often downloaded onto a computer while been disguised as a legitimate program.

Most time, the delivery method of this malware typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.

Hence, any example of a typical trojan horse are malwares with a downloaded music or apps programs that seem authentic but perform an unwanted activity.

Read more about trojan horse

brainly.com/question/10742940

#SPJ1

6 0
2 years ago
Think about the trade that happens between the united states and countries in Asia. Do you think trade has led to sharing of cul
Oxana [17]

Answer:

yes they both share there culture and there traditional thing

7 0
2 years ago
Jake, an 18-year-old, refrains from downloading pirated movies online as he believes it is immoral to engage in such practices.
Verdich [7]

Answer:

Superego.

Explanation:

Superego is seen to be one of the key components of Sigmund Freud's psychoanalytic theory of personality. This according to research is said to have been practically been acquired from our parents directly or indirectly. Superego is explained to work in a way that it is seen to suppresses the urge of its identity and makes its urge to behave in a moral way instead of being realistic about it.

It sometimes include rules and standards for good behaviors seen to involve those that are been authorized by our parents or authorities that has value of are held of high respect by us. These rules leads us to feelings of pride, value, and accomplishments when we find ourselves obeying or following them religiously and breaking them make us full of guilt.

7 0
3 years ago
Why are non-coercive measures such as conversational requests and directives better than coercive measures
Paladinen [302]

Answer:

Personally, I believe that the use of non-coercive measures such as conversational requests and directives are better than coercive measures because it allows civilians to feel less threatened and gives them the chance to trust

Explanation:

5 0
3 years ago
Other questions:
  • Where did the salt come from when trading with Ancient Ghana?
    5·1 answer
  • Lucinda has been struggling with depression for several years. although she has been able to hold a job, she spends most of her
    11·1 answer
  • Rounding decimals worksheet how was icky snerd driving his parents crazy
    15·1 answer
  • 2a. what is the difference between an entity and an entity class? 2b. what is the difference between an attribute and an identif
    7·1 answer
  • Where in Canada is Nickel found?
    11·2 answers
  • This type of information bias occurs when participants have ulterior motives for answering a question and thus may exaggerate or
    6·1 answer
  • Which perspective considers the relationship between individuals and their physical, cognitive, personality, and social worlds?
    7·2 answers
  • Scenario #2
    12·1 answer
  • Which type of law involves individuals and organizations seeking to resolve legal disputes?
    15·2 answers
  • As an urban region experiences urban sprawl, the number and size of roadways decrease. number of farms and parks increase. numbe
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!