1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
3 years ago
15

Charles Montesquieu believed that the

Computers and Technology
2 answers:
inn [45]3 years ago
7 0
A. make laws ........ sorry for all the dots have to make it longer :/
kakasveta [241]3 years ago
6 0

Answer:

A. Make Laws

Explanation:

Montesquieu believed the ways to go about limiting the power of a monarch would be to split up power among 3 groups, Judicial, Legislative and Executive. The American Presidential system and Constitution used Montesquieu's writings as a foundation for their principles.

  1. Judicial Interprets laws
  2. Legislative Makes laws
  3. Executive Enforces Law

You might be interested in
You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha
Novosadov [1.4K]

Answer:

c. data mining

Explanation:

Data mining can be defined as the term which is used for knowing the user preferences by using their previous search queries.  

Nowadays Data mining is being used by many companies to predict and show them the appropriate ads in front of them on the basis of their previous search queries.

so, according to the scenario, the most appropriate answer is option C.

8 0
3 years ago
Which view allows you to make changes to the content of your presentation?
aleksandr82 [10.1K]
That would be editing probably.
6 0
3 years ago
Read 2 more answers
The limitations placed on employees in accordance with the company's policies and procedures
Anna71 [15]

Answer:

Answer is B!

Explanation:

I just took the quiz (:

5 0
4 years ago
g Tonya recognizes that one example of the impact of censorship on Internet service providers (ISPs) is that
frosja888 [35]
Law-enforcement agencies can force ISPs to identify customers who send emails using anonymous remaliers
8 0
3 years ago
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
Other questions:
  • What does the metric column in a routing table do?
    8·1 answer
  • Using-R,-create-a-linear-model-to-represent-the-coefficients-for-the-objects-fw2-and-fwe-data..
    10·1 answer
  • Effective character encoding requires:
    8·1 answer
  • A(n) _______ is a distributed networking architecture, residing on one or more computers, where one program requests a resource
    14·1 answer
  • Describe what skills are required by the helpdesk technician for each step in a typical incident process.
    9·1 answer
  • The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.
    6·1 answer
  • List out any five input and output devideos​
    5·1 answer
  • Let x = ["Red", 2.55,"Green", 3,"Black","false"], then solve the following:
    7·1 answer
  • Tom is trapped on the top floor of a department store. It’s just before Christmas
    13·2 answers
  • In your own view, how can social media be used in teaching and learning in higher education?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!