1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
9

What type of attacks did the Japanese use in battle? For WWII

Social Studies
1 answer:
Alenkasestr [34]3 years ago
4 0

Answer:

Pearl Harbor (atomic bomb in Hawaii (i think it was atomic))

Explanation:

I learned about this :)

You might be interested in
50 Points! Brainliest + 5 Stars! PLEASE HELP!
const2013 [10]

Answer:

YES BECAUSE HE VIOLATED AN ACT

The primary charge against Johnson was that he had violated the Tenure of Office Act, passed by Congress in March 1867 over Johnson's veto.

...

4 0
3 years ago
Read 2 more answers
What group of small islands forms the long tail or Alaska
IrinaVladis [17]
The Aleutian islands are the group of small islands that from the ling tail of Alaska.They are the reason that Alaska is considered the state farthest to the east of any state in the nation.Part of the Aleutian islands extends over the 180 degree meridian.
Hope this help:)
5 0
3 years ago
Which way to prioritize the team's efforts in responding to an incident looks to the nature of the business processes, objective
ruslelena [56]

Increase End User Awareness.

A business continuity plan. A summary of the tools, technologies, and physical resources that have got to be in situ. A mission critical system has been identified as having an administrative system account with attributes that prevent locking and altar of privilege and name.

One of the foremost important steps within the incident response process is the detection phase business or identified, containing its top priority. The main purpose of containment is to contain the damage and stop further damage from occurring (as noted in step number two, the sooner incidents are detected, the earlier they will be contained to reduce damage).

Prioritize known security issues or vulnerabilities that can't be immediately remediated – know your most respected business assets to be able to target critical security incidents against critical infrastructure and data.

learn more about business: brainly.com/question/25534066

#SPJ4

7 0
1 year ago
Is odysseus good at creating peace after the trojan war? why or why not?
Mamont248 [21]

Answer:

no because he was not able to come back home for ten years and a lot of things were going on after he was able to leave

Explanation:

4 0
3 years ago
What is Durkheim's theory of suicide?
Arlecino [84]
It was the first methodological study<span> of a social fact in the context of society.</span>
5 0
3 years ago
Other questions:
  • Ryan is accused of auto theft. ryan refuses to give information related to his alleged criminal activities because he suspects i
    11·1 answer
  • How does Earth's orbit influence climate
    12·1 answer
  • Jerry, who can't sit still for a minute, sees his classmate, Mike, getting a sticker for sitting quietly in his seat. Jerry deci
    8·1 answer
  • Which of the following is least suited to providing clear evidence about a causal relationship between the independent and depen
    11·1 answer
  • In the United States how many people live in poverty
    10·2 answers
  • What are two ways the federal government can manage broadcast media?
    13·2 answers
  • What does Trump's tax plan do and <br>effects ​
    12·1 answer
  • 1.Explain the structural difference between a Limerick and a Haiku and compare how they give meaning.
    15·1 answer
  • If I could save the Union without freeing any slave I would do it, and if I could save it by freeing all the slaves I would do i
    9·1 answer
  • Proctor and Gamble is centralizing twenty to thirty percent of its research efforts in a new corporate-level business creation a
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!