1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
2 years ago
5

Which of the following laws committed money for establishing additional American Indian reservations? the Indian Appropriations

Act of 1851 the Indian Appropriations Act of 1871 the Indian Appropriations Act of 1885 the Indian Appropriations Act of 1889
Social Studies
1 answer:
zysi [14]2 years ago
8 0

Answer:

The First Option. The Indian Appropriations Act of 1851.

Explanation:

Edge 2021

You might be interested in
Implrtance of constitution​
Otrada [13]

Answer:

Empowered with the sovereign authority of the people by the framers and the consent of the legislatures of the states, it is the source of all government powers, and also provides important limitations on the government that protect the fundamental rights of United States citizens.

6 0
3 years ago
After they had first agreed to display a 3-inch "Be a Safe Driver" sign, homeowners in one Seattle neighborhood were likely to p
allochka39001 [22]

Answer:

foot in the door phenomenon

Explanation:

Foot in the door phenomenon is a persuasion techniques that works/ relies on the size of the request being made. Experiments on this persuasion technique show that if you wish to make someone do a big favour for you, you only have to get them to do a small favour first. The above example illustrates the foot in the door phenomenon where homeowners agree to a large, ugly, unattractive installation of a sign board because they had started off agreeing to have a small one installed first.

4 0
3 years ago
The wifi standard known as privacy with message integrity can be described as follows:
Viefleur [7K]
<span>The MAC-level data sent out by the access point is encrypted to make sure that it is not tampered with by anyone other than the intended user. In addition, a message integrity code is sent along with this data as a second level of security. This makes sure that the identifiable data in the transmission is not stolen and used for unintended purposes.</span>
8 0
3 years ago
Help me please :D!!!!!!!!
Marysya12 [62]
I believe it’s C. Businesses can increase their opportunity costs
Hope this helps
3 0
3 years ago
Which river is the longest?
babunello [35]

Answer:

A. Missouri River

Explanation:

Missouri River=2,341 mi (the longest)

Red River =1,360 mi

Arkansas River=1,469 mi

Rio Grande River=1,885 mi

4 0
3 years ago
Other questions:
  • Declining Muslim empire in Middle East
    8·1 answer
  • Under which type of government would state or provincial governments have the most sovereignty?
    7·1 answer
  • Why do memebers of congress handle so much casework
    5·2 answers
  • Mitigation strategy for natural disasters like floods, earthquakes, landslides and Cyclones. plzzzzz u dont need to type it, giv
    5·1 answer
  • M is charged with sexual assault. Assume you are a defense lawyer for M. Will you ask for a preliminary examination for your cli
    7·1 answer
  • A GPS installation in a motor vehicle without a warrant violates the Fourth Amendment.a. trueb. false
    10·1 answer
  • What do alert and life skills training have in common, besides their effectiveness?
    5·1 answer
  • What is janies experience of joes funeral, as it is captured in this sentence, janie sent her face to joes funeral, and herself
    14·1 answer
  • Which statement best describes the bubonic plague?
    7·1 answer
  • ________________ are religious practitioners skilled in the practice of religious rituals which they carry out for the benefit o
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!