1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
2 years ago
14

PLEASE HELP ASAP!!

Social Studies
1 answer:
bearhunter [10]2 years ago
7 0

Answer:

Aight, I am so so so sorry if I get this wrong, normally I wouldn't answer a question I'm not 100% confident about, but it seems like nobody else is gonna answer soooo

William Hartsfield was the 49th and 51st mayor of Atlanta, Georgia. He served six terms, longer than any other person in the city's history. He is credited with developing Atlanta into an aviation powerhouse and with building its image as "A City Too Busy to Hate".

The boll weevil, introduced to the state in 1915, greatly reduced state cotton yields. Georgia's cotton acreage declined from 5.2 million acres in 1914 to 2.6 million in 1923. Overproduction in other parts of the country and foreign competition increased the supply of cotton and decreased the price.

The three governors controversy (governor race of 1946)  was a political crisis. Three men made claims to the governorship: Ellis Arnall, the outgoing governor, Melvin E. Thompson, the lieutenant governor-elect, and Herman Talmadge, Eugene Talmadge's son.

Though I'm sure you know this one, Pearl Harbor was a surprise aerial attack on the U.S. naval base at Pearl Harbor on Oahu Island, Hawaii, by the Japanese that precipitated the entry of the United States into World War II.

In conclusion, I'ma take a wild guess and say that the boll weevil and the bombing of pearl harbor seem like the most likely answers.  

Really hope this helps!

You might be interested in
Which one of meuer et al.'s (2002) nine stages of domestic violence is characterized by the beginning of excessive control throu
Trava [24]
The correct option is A.
Meurer et al., 2002 divided domestic violence into nine stages, with each of the stages having its own characteristic features. The author wrote that the stage four of the nine divisions is characterized by initiation of excessive control by means of physical and emotional abuse. Domestic violence has been defined as a type of coercive behavior that is targeted at gaining control over a particular related person by using intimidation, threat or harmful weapons. <span />
5 0
3 years ago
What did you notice teacher Mona Sanon doing to encourage and support family-teacher partnerships? Give three examples that show
Vika [28.1K]

Answer:

To encourage family- teacher partnership, she possess certain qualities and applied a good convincing technique which made parents believed in her as a good family teacher.

The examples includes;

1. She often asked the parents how they think their children are doing and got feedback.

2. She has a parent communication notebook which she check frequently for details.

3. She make sure that parents know they are welcome and invited into the classroom at all times.

6 0
3 years ago
What did feudalism replace
Nitella [24]
Feudalism was essentially a monarchy. It had social classes. It replaced the old courts of a land with ones controlled by the king.
6 0
3 years ago
Why is it difficult to conduct a security cost-benefit justification for controls before an attack occurs?.
kondor19780726 [428]

The impact of a phishing is difficult to predict, making it challenging to do a cost-benefit analysis of safeguards before an attack occurs.

<h3>What is phishing?</h3>

Phishing is a form of social engineering in which an attacker sends a message pretending to be someone else in order to mislead the recipient into giving the attacker access to their personal information or to install malicious software, such as ransomware, on their infrastructure. Phishing attempts are getting more and more complex, and they frequently transparently duplicate the site that is being targeted, giving the attacker complete access to the victim's computer and enabling them to breach any further security measures. With the FBI's Internet Crime Complaint Centre registering more than twice as many instances of phishing as any other type of computer crime as of 2020, phishing is by far the most frequent attack carried out by cybercriminals.

Learn more about phishing, here:

brainly.com/question/23021587

#SPJ4

4 0
11 months ago
How many people killed Julius Caesar?
svet-max [94.6K]
It cannot be ascertained how many people killed him but it was known that a group of liberators because of his dictatorial ways. He was stabbed 23 times near the statue of pompey. hope i could help :)
3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the relationship between the Senate's lawmaking function and committee work
    15·2 answers
  • Baby jimmy's parent places a brand new rattle in his crib, and jimmy immediately picks it up and tries to mouth the rattle. when
    5·1 answer
  • 1. Who are some of the first special education educators?
    12·1 answer
  • Robert feels lost in his biology class He wants to raise his hand and ask the teacher to explain 12 and behavior He doesn't rais
    6·2 answers
  • Why do some formal lawmakers go into lobbying?
    14·1 answer
  • The articles of confederation gave priority to.
    14·2 answers
  • Explain how the Georgia's military bases, the Bell Bomber Plant in Marietta, and the Savannah and Brunswick Shipyards contribute
    8·1 answer
  • Write your paper as if you are a college student
    11·2 answers
  • It is important to conduct a literature review to:
    10·1 answer
  • The cabling from the demarc into the wan service provider's central office is called the ________
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!