1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
8

Where was gettysburg located relative to the rest of the fighting?

Social Studies
1 answer:
STALIN [3.7K]3 years ago
4 0

Answer:766

Explanation:

Guy

You might be interested in
• small government
taurus [48]

the answer is D republicans ,most of them support these policies

7 0
3 years ago
Read 2 more answers
Four students in sociology class received a D on their final project and are required to rewrite and resubmit it. In their respo
lesya [120]

Answer:

Gina exemplifies the attribution style most prone to depression since <em>she feels like she won't have success on written assignments, feels she is not good at sociology and that she is not smart enough. </em>

Explanation:

Depression is a mental disorder characterized by a <em>persistent feeling of sadness and despair</em>, as well as a general loss of interest. It can be fueled if the individual has a negative view of him/herself and constantly puts him/herself down.

In this case, Gina is the most prone to depression since the grade created a negative response on her, on her persona and on her general aspirations. She feels like she won't have success anymore, that she isn't good and that she is not smart enough.

7 0
3 years ago
_________ is any danger to which a system may be exposed. Select one: a. Exposure b. Information security c. Security d. Threat
kow [346]

Answer:

The answer is D. Threat.

Explanation:

In computer security, a threat is defined as a possible danger through which vulnerability can be exploited to infringe security and in this way, provoke possible harm. A threat could be "intentional" or "accidental". It could be provoked by an event, a specific action, or any kind of circumstance.

A threat can exploit some vulnerabilities related to a resource. This can provoke many problems concerning some properties that belong to the resources. They include confidentiality, integrity or availability and it can also affect other involved parties. For example customers and suppliers.      

3 0
3 years ago
Which of the following would be most important to include in an essay about the invention of air conditioning?
omeli [17]

So what are the following?

4 0
3 years ago
Read 2 more answers
Why national committees are important the political process?​
Akimi4 [234]

Answer:

They are responsible for planning the nominating convention and also spend a lot to support of their party's nominee.

Explanation:

7 0
3 years ago
Other questions:
  • Which European country once controlled the land that makes up Florida and the southwestern United States?
    7·2 answers
  • Do most muslim countries have warm or cold weather climates
    9·1 answer
  • John has been gaining weight during middle adulthood. he feels fine and exercises, but still gains weight. john's weight gain is
    8·1 answer
  • What landforms would isolate a country
    5·1 answer
  • What change did the laundromat project hope to bring about?
    8·1 answer
  • Look at this cartoon about the Monroe Doctrine.
    15·1 answer
  • Driving skills are a basic qualification of
    6·1 answer
  • Behavioral techniques are often used to address communication problems that occur with autism. ______ involves rewarding the chi
    15·1 answer
  • Answer these questions of a culture about your choice
    14·1 answer
  • According to bracha et al. (2004), what is the sequence of responses in a potentially threatening situation?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!