1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
2 years ago
8

The trade networks described by the two sources were most strongly influenced by:

Advanced Placement (AP)
1 answer:
slega [8]2 years ago
8 0

The correct answer to this open question is the following.

Unfortunately, your question is incomplete. You did not include the description of the trade networks or the sources. Without that information, we do not know what you are talking about.

However, trying to help you with something, we can comment on the following example.

We can refer to the trade networks developed in the Trans-Saharan

trade. These traders were merchants of the African region -North and Western Africa- who traveled in caravans, using the camel to transport people and products across the deathly Sahara Desert.

They traded many products such as salt and gold, which were the most precious resources of the time. Gold was a valuable mineral with high value, and salt was as important to preserve food. But they also traded animal skins, ivory, silver,  sugar, pepper, and slaves, to important trade centers such as Timbuktu and Djenne.

You might be interested in
Gamitin ang salitang "yaman" sa pangungusap
harina [27]
Ang yaman nila ay hindi ma lalagpasan ng kahit na sino man sa kanilang bayan.
6 0
2 years ago
7. How did white communities deprive blacks the right to vote and how did that impact
Gennadij [26K]
This is flat out racist
4 0
3 years ago
What is the purpose of data encryption algorithm?
Over [174]

Answer:

security/protection

Explanation:

The main purpose of a data encryption algorithm is security/protection. These algorithms grab data and change it into indecipherable code. This code can only be decrypted using a key that has been uniquely created for that exact piece of data. Usually, when the encrypted data and key have been created the key is given to the select few that need to have access to the data. This process helps protect the data from being seen or manipulated by unwanted parties.

7 0
2 years ago
Between 1990–2013, the amount of foreign direct investment has increased by a factor of approximately
Tanya [424]

Answer:

100

Explanation:

cuz 100

cuz 100 cuz 100

7 0
2 years ago
Write a short speech that persuades students and parents to choose the bake-sale fundraiser instead of the car-wash fundraiser.
alexgriva [62]

Answer:

I think the bake sale would be better because, if one we're to do a car wash they may not know how to wash a car and selling baked goods is WAY easier than a car wash. A car wash can be bad depending on the weather and the bake sale. So I would chose the bake sale, it's easier, faster and much more.

Explanation:

want a short speech?

7 0
3 years ago
Read 2 more answers
Other questions:
  • The population of India of 2009 was about 1.155 billion. What percentage of the worlds population is this?
    11·1 answer
  • "She signaled us to the table. Almost tiptoeing across the office, I maneuvered myself to keep my mother between me and the grin
    8·2 answers
  • Which of the following is not true with respect to "places"?
    14·1 answer
  • Who is the presiding officer of the Senate whenever the Vice-President is not present? Speaker of the House Attorney General Sec
    11·2 answers
  • What can be added to a circuit to reduce electromagnetic
    11·1 answer
  • Please help !! i dont understand
    7·2 answers
  • Lets see how many people know dis<br><br> cos im ah ah in the stars tonight
    8·2 answers
  • Mamas needs help asap
    12·2 answers
  • this image most directly illustrates which of the following features of the political development of medieval europe
    9·2 answers
  • Which of the following areas run the risk of deindustrializing in the next 20 years? (4 points)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!