1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
3 years ago
13

During the Late Middle Ages:

Social Studies
1 answer:
Viefleur [7K]3 years ago
4 0

Answer:

dark plague, disease, deadly disease, pandemic

Explanation:

these could all apply to the blank space... not sure if it can be seen as helpful but ..

You might be interested in
Kelly is at a college party and notices everyone is drinking. She concludes that the majority of students on campus must also dr
MaRussiya [10]

Answer:

Descriptive norm

Explanation:)

5 0
3 years ago
This intercepted note proposed a German-Mexican alliance
devlian [24]

Answer:

Zimmerman Telegram

Explanation:

The Zimmerman Telegram was a note that Germany sent to Mexico, hoping to gain their support and alliance against the U.S. during World War I.

Here's a link to read more https://www.history.com/news/what-was-the-zimmermann-telegram.

Let me know if you have any other questions!

3 0
3 years ago
Longer key lengths, often measures in the thousands of bits, are common for which family of modern cryptographic algorithms? Gro
Aleks04 [339]

Longer key lengths, often measures in the thousands of bits, are common for public keys/asymmetric algorithm of modern cryptographic algorithms.

Option: A

Explanation:

Asymmetric Encryption Algorithms  is an algorithm which is considered secure when the key size is large enough. DSA was originally proposed with a 512 bit key size but later on revised to support key sizes up to 1024 bits. AEA isn't an actual encryption algorithm. Its a key agreement protocol that enables users to exchange encryption keys of an insecure medium.

One time pad play fair algorithms is a type of encryption when it applied practically it works securely but theoretically it can't compromise. Algorithm is based on the prime numbers obtained from public and private keys.

8 0
3 years ago
What term is used to refer to powers kept by the states?
Vilka [71]
The powers not delegated to the United States by the Constitution, nor prohibited by it to the states, are reserved to the states respectively, or to the people.

HOPE IT HELPED
8 0
3 years ago
What were some main generals that fough in the war (both sides)
Arte-miy333 [17]
Robert E. Lee
Stonewall Jackson
Ulysses S.
Grant and William Tecumseh Sherman??
7 0
2 years ago
Other questions:
  • Explain why congress needs to delegate rule-making authority to a specialized agency. what would happen if this did not occur
    13·1 answer
  • Eu presiso de uma poesia sobre a escola!<br> pfv é urgente!!
    13·2 answers
  • The forced payments sent to the pharaoh by conquered peoples are called
    14·1 answer
  • Vince and Juan are playing basketball. Vince shoots the ball, and Juan blocks the shot. Vince says, "Wow, I didn't realize how t
    8·1 answer
  • Which two people are in line to become president after the president?
    8·1 answer
  • PLEASE HELP ILL BRAINLIST
    13·1 answer
  • Can some one help me with this question its hard :( down below ill give brainliest
    8·1 answer
  • Which mayan calendar was used to keep track of religious days
    7·1 answer
  • What are two economic functions of the family​
    7·1 answer
  • Which principle was considered by john mill as more important than the duty to directly maximize the overall happiness of the co
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!