1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
3 years ago
8

Please help asap

Social Studies
2 answers:
lys-0071 [83]3 years ago
6 0

Answer:

1. C  It was the first college to allow both Native Americans and African Americans to attend.

2. B  The first textbook used in America.

3. D  He extended the school year to six months.

Explanation:

Correct on my test!

Alexxandr [17]3 years ago
5 0
1. It was the first college to allow African Americans and women to attend
2. The first text book used in America
3. He created a sales tax to fund schools.
Hope this helps!!
You might be interested in
Noticing that his heart was pounding and that his palms were sweaty while he was taking a difficult test, harley concluded that
hammer [34]
The answer that best fits the given blank above is the TWO-FACTOR THEORY. The two-factor theory is also known as the <span>Herzberg's motivation-hygiene </span>theory<span> and dual-</span><span>factor theory. In this theory, it states that there are two separate factors in the workplace: factors that offer job satisfaction and factors that would cause job dissatisfaction.</span>
4 0
3 years ago
Unauthorized disclosure of information classified as confidential reasonably be expected to cause.
Rina8888 [55]

Unauthorized disclosure of Confidential information could be expected to jeopardise national security. Unauthorized disclosure of Secret information could have serious consequences for national security.

Tests for confidentiality determine whether unauthorised disclosure is possible. When performing confidentiality tests, you are attempting to determine whether data is being disclosed to people for whom it was not intended. Confidentiality testing ensures that authentication and encryption mechanisms function in accordance with security requirements. Proper authentication ensures that only authorised users can access the system and view the data.

To know more about Unauthorized disclosure here-

brainly.com/question/17198718

#SPJ4

4 0
1 year ago
What sentencing guidelines require a judge to provide an explanation for any deviation?​?
Yakvenalex [24]
<span>a. presumptive sentencing guidelines</span>
8 0
3 years ago
What took place off the coast of Brazil that would lead to Ferdinand Magellan’s fleet of five ships being reduced to four ships?
Alexandra [31]

Answer:Victoria, one of the original five ships, circumnavigated the globe, finishing three years after setting out. In 1519, Portuguese explorer Ferdinand Magellan led a Spanish expedition with a fleet known ... The fleet initially consisted of about 270 men and five ships: four carracks and one caravel. The expedition faced numerous ..

Explanation:One of Ferdinand Magellan's five ships—the Victoria—arrives at Sanlúcar de ... 1519, Magellan set sail from Spain in an effort to find a western sea route to the rich ... where he searched the South American coast for a strait that would take him to ... they dropped anchor at the Philippine island of Cebu–they were only about .

4 0
3 years ago
Which authentication protocol uses a locally stored shared secret that is encrypted?
alukav5142 [94]

MS-CHAP authentication protocol uses a locally stored shared secret that is encrypted.

<h3>What is MS-CHAP used for?</h3>

The Challenge-Handshake Authentication Protocol (MS-CHAP) is the Microsoft version of CHAP. The unencrypted password is not sent over the network with the CHAP encrypted authentication mechanism.

In PPTP-based (Point-to-Point Tunneling Protocol) VPNs, the password-based Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) authentication protocol is frequently employed.

CHAP was developed to boost this authentication process's security. To transfer these credentials across the network, CHAP, or the Challenge Handshake Authentication Protocol, uses an encrypted challenge. CHAP can authenticate using a three-way handshake.

In order to increase security in hotspot public access networks and corporate networks, numerous authentication techniques have recently been developed for wireless local area networks (WLANs), and some have even been proposed for integrated 3G-WLAN networks.

To know more about MS-CHAP, visit: brainly.com/question/14283168

#SPJ4

4 0
1 year ago
Other questions:
  • Emily feels that she and her partner Luke spend too much time together, and she wants more time for her individual interests and
    12·1 answer
  • Look at the map below. How many of the American colonies had seaports on the Atlantic Ocean by 1776?
    8·2 answers
  • According to research, _____ account(s) for a large proportion (24%) of variance in job satisfaction and will likely be a focus
    11·1 answer
  • Huang river is almost miles long
    13·1 answer
  • Based on where the neutral countries are located in Europe, what geographic factors might have encouraged their neutrality?
    7·1 answer
  • What are the agents of socialization. which one do you think is most important and why​
    6·1 answer
  • The President Proposes and the Senate Dispopses what principles does this show Judicial Review? Limited government? Checks and B
    8·1 answer
  • Which event can cause slumps,landslides,and mudflows to occur
    11·2 answers
  • What contributed to the development of tensions between the Creek and Georgians in the late eighteenth and early nineteenth cent
    5·1 answer
  • How did the Roman Catholic Church improve medieval society? HURRY 20 MINUTES
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!