1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
3 years ago
12

I need a lot of help on this too

Social Studies
1 answer:
wel3 years ago
8 0
Um what is this about
You might be interested in
Katrice is 86 years old. She has never been married, has no children, and lives alone. She has only one or two friends whom she
ivolga24 [154]

Answer:

The answer is B) Despair

3 0
3 years ago
Which of the following cases ruled that segregation laws were acceptable and was later overturned through court decisions and le
nlexa [21]
Plessy vs. Ferguson was the case that ruled that segregation laws were acceptable specifically the public facilities under the Separate but Equal doctrine. It was later overturned through court decisions and legislation.
8 0
3 years ago
Read 2 more answers
In most modern climate classification schemes, five zones and their subtypes are delineated using which principal indicator? a)
MAXImum [283]

Answer:

E. Vegetation types

Explanation:

Vegetation is the general term for the plant life of a region. It refers to the ground cover by plant and is by far the most abundant biotic element of the biosphere and also helps modern climate classification.

6 0
3 years ago
What is one example of a cyber-attack within the United States?
Luden [163]

One example of a cyber-attack within the United States is:  A shortage of gasoline after an energy company is h.a.c.k.e.d.

<h3>What is cyber-attack?</h3>

Cyber-attack occur when a person h.a.c.k a website so as to steal  or destroy information or sensitive data.

When their is Cyber-attack on  a company or an organization website this tend to mean that a person has gain an unauthorized access to the company website or computer system so as to steal the store data.

Therefore One example of a cyber-attack within the United States is:  A shortage of gasoline after an energy company is h.a.c.k.e.d.

Learn more about Cyber-attack here:

#SPJ1

<h3 />

3 0
2 years ago
Explain specific features of social development.​
Marianna [84]

<em>Hey </em><em>mate</em><em>!</em><em>!</em>

<h2><em>Features </em><em>of </em><em>social </em><em>development</em><em>:</em></h2>
  • <em>Social </em><em>development</em><em> </em><em>is </em><em>a </em><em>dynamic </em><em>and </em><em>universal </em><em>process.</em>
  • <em>The </em><em>pace </em><em>and </em><em>limit </em><em>of </em><em>the </em><em>development</em><em> </em><em>of </em><em>society </em><em>is </em><em>unpredictable</em><em>.</em>
  • <em>It </em><em>brings </em><em>desired </em><em>changes </em><em>for </em><em>progress </em><em>and </em><em>prosperity</em><em> </em><em>of </em><em>the </em><em>society</em><em>.</em>
  • <em>It </em><em>is </em><em>the </em><em>outcome </em><em>of </em><em>the </em><em>planned </em><em>actions </em><em>and </em><em>visions.</em>
<h2><em>Hope </em><em>it</em><em> helps</em></h2>

<em>Good </em><em>luck</em><em> on</em><em> your</em><em> assignment</em>

3 0
3 years ago
Read 2 more answers
Other questions:
  • How many people in the world currently lack safe drinking water flashcard?
    9·1 answer
  • According to galileo, why is the search for truth important
    13·1 answer
  • Which group got blamed for the plague in some areas of Europe?
    13·1 answer
  • One example of ________ is the fact that a lawsuit filed by California against Nevada over river pollution goes directly before
    14·1 answer
  • Joan owns a dog walking business and read a blog post that explained search engines are a great place to generate ideas on what
    15·1 answer
  • How did USSR react to the rearming of West Germany?
    5·1 answer
  • Which government type is "for the people, by the people; have voting and the people have personal freedoms?
    13·2 answers
  • the graph below represents the liner equation y equals 1 and 1/2 x -3 A second linear equation is represented by data in the tab
    11·1 answer
  • Advantage of social movements​
    5·1 answer
  • The counselor must assess whether the client’s view of their _________ is healthy or unhealthy
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!