1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
7

Best answer gets BRAINLIST!

Social Studies
1 answer:
dybincka [34]3 years ago
8 0

Answer:

i9i9i999iExplanation:iikkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

You might be interested in
How does methane gas relate to conservation
saveliy_v [14]

carbon dioxide is more abundant and longer alive methane,the main component of natural gas ,is more effective at trapping heat while it lasts. the first two decades after its release, methane is more than 80 times more potent than carbon dioxide in terms of warming the climate system.

6 0
1 year ago
PLZZZZZ HELP.Short Answer
ratelena [41]

Answer:

<h3>Ok! hope i understood correctly </h3>

Explanation:

<h2>1: </h2><h2>Name three things Hammurabi’s laws tell us about the Babylonian Period.</h2><h2 /><h2>2:What does “specialization” refer to in Mesopotamian society?</h2><h2 /><h2>3: Name three important inventions that originated from Mesopotamia.</h2>
6 0
2 years ago
Can someone tell me which one came first pls??
Ymorist [56]

Answer:

Obviously

Explanation:

The A

4 0
3 years ago
Read 2 more answers
Can you help me with number 4,5,6,7
amm1812
7 is avoiding the topic.
6 means to focus on the essential details
5 means to meet the required standard
4 means that the outcome is unknown until the last minute.
7 0
3 years ago
The _________________________________ mechanism helps mitigate the malicious intermediary, insufficient authorization, and overl
Zolol [24]

Answer:

A. Encryption        

Explanation:

The <u>encryption</u> mechanism helps mitigate the malicious intermediary, insufficient authorization, and overlapping trust boundaries security threats, it also helps secure remote message exchanges between  consumers by protecting the privacy of message data thus making it inaccessible by hackers.

4 0
3 years ago
Other questions:
  • At which stage of lawrence kohlberg's theory of moral development does a person understand that values, rights, and principles u
    9·1 answer
  • Select the examples of how fragile sites can be responsible for phenotypic abnormalities
    5·1 answer
  • How has the Supreme Court influenced the process of incorporating the Bill of Rights? Explain how Palko and Duncan changed the S
    13·2 answers
  • Policymakers are discussing various proposals regarding how to deal with natural monopolies. Senator Huff wants to regulate natu
    6·1 answer
  • Dr. Blehert took 117 healthy bats into his laboratory. He exposed 83 of them to the fungus suspected of causing white-nose syndr
    11·2 answers
  • People with an _____ worldview are not just generally prejudiced or racist, but specifically view non-Europeans negatively.
    10·1 answer
  • Of the blocks listed below, which combination of materials will have the highest resistance to sliding? Block Weight Friction A
    15·1 answer
  • Plzzz Help I'll name the brainlist
    11·1 answer
  • Print or save the Temporal Words and Phrases List to use as a resource.
    8·1 answer
  • Which element of strategic thinking considers interrelationships and interdependence?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!