1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
3 years ago
13

What influential work about the Vietnam war was written by Tim O Brien

Computers and Technology
1 answer:
MArishka [77]3 years ago
4 0
- Question -

What influenced work about the Vietnam War was written by Tim O Brian?

- Answer -

The Things They Carried

______________________________________________


These were a series of short stories O Brien wrote including in these stories his experiences with the Vietnam War



\boxed{ -  \ The \ Wolf  \  -}

You might be interested in
What is the most important basic property of melody? Why?​
enot [183]

Most good melodies restrict their basic range to no more than an octave-and-a-half. Most good melodies use repeating elements. Listeners should be hearing certain melodic intervals, rhythms and other musical shapes repeating throughout the melody

5 0
3 years ago
Animal wisdom/ the last wolf .compare and contrast the overall feeling of each poem
masha68 [24]
List the poem please. I won’t be able to answer without it.
3 0
3 years ago
How does the practice of storing personal genetic data in privately owned computer databases raise issues affecting information
frozen [14]

Answer:company privacy policy change, third party access, non-effective laws, database hacking

Explanation:

Company privacy policy:company privacy policy protecting consumer information may not be strong enough, and may also change unfavourably in the future depending on certain factors.

Third party access: company may be pressurized by law enforcement/government to release genetic data for state purposes.

Non-effective laws: state laws guarding genetic information of individuals might not be broad enough as to be effective.

Database hacking: company/private database might be a victim of computer hacking.

8 0
4 years ago
We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key
VladimirAG [237]

Answer: forwarding: move packets from router's input to appropriate router output

routing: determine route taken by packets from source to destination

Explanation:

The network layer refers to where connections take place in the internet communication process by sending packets of data between different networks.

The distinction between the forwarding function and the routing function performed in the network layer is that the forwarding function move packets from the input of the router to the appropriate router output while the routing function:m helps in knowing the routee taken by packets from the source to destination.

6 0
3 years ago
1. Which tool is used for hardware to stand on to prevent static
GalinKa [24]

Answer:

An anti-static mat tool.

Explanation:

To prevent, static electricity from building up an anti-static mat tool is used. This is the tool that is used to prevent static electricity from building up. However, if you don't have the anti-static mat, an antistatic wrist strap can be used.

5 0
2 years ago
Other questions:
  • A display or monitor with a larger number of ?
    12·1 answer
  • An employee who interacts with customers regarding the nature of their car problems, rather than actually working on the vehicle
    6·1 answer
  • _________ cards contain a chip that can store a large amount of information as well as on a magnetic stripe for backward compati
    12·1 answer
  • While these two approaches have similarities in terms of the topics they address, ________ will cover broad IT management topics
    7·1 answer
  • Malcolm Movers charges a base rate of $200 per move plus $150 per hour and $2 per mile. Write a program named MoveEstimator that
    5·1 answer
  • Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy with
    11·1 answer
  • List three things to be safer online.
    8·1 answer
  • Where to get industrial circuits far cry 6
    8·1 answer
  • Choose the algorithms below that are also programs.
    7·1 answer
  • What is the most used gaming keyboard in 2022?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!