1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
quester [9]
3 years ago
9

During Biden's congress address on Wednesday April 28 2021 what all did he say that you liked and how do you think it was receiv

ed by congress?
Advanced Placement (AP)
1 answer:
ch4aika [34]3 years ago
5 0
I think people took it well, some may still say he “stole the election” but there just a bunch of dummies
You might be interested in
Question. Passage. When the accident happen Kofi was on his way to the shop. As soon as Kofi got to the spot where the accident
jasenka [17]
Nfdndndndndndndndndndndndndnddndndnnddndndndndndndndndndndndndndndndndndndndndndndndndndndndndndndndndndndndndndndnndnddndndndndnndnddndndndndndnndndndndnddnndndnddndndndndndndndndndndndndndndndnndnddnndndndndnddnndnddnndndndndnddndndndndndnndndnddnndndnddndnndndnddnnddndndndndndndndndndndndn
6 0
3 years ago
The table below shows the average monthly temperatures of a specific location:
Elina [12.6K]

Answer:

I believe the answer is B.) It is a coastal location.

Explanation:

3 0
3 years ago
Which of the following most accurately explains the emergence of a large
katen-ka-za [31]

Answer:

D

Explanation:

8 0
3 years ago
Read 2 more answers
according to florida's implied consent law if during a traffic stop you refuse to be tested for the presence of alcohol or drugs
serious [3.7K]
One year us your answer
Hope this helps:D
Have a great rest of a brainly day!
7 0
3 years ago
Read 2 more answers
What is the purpose of data encryption algorithm?
Over [174]

Answer:

security/protection

Explanation:

The main purpose of a data encryption algorithm is security/protection. These algorithms grab data and change it into indecipherable code. This code can only be decrypted using a key that has been uniquely created for that exact piece of data. Usually, when the encrypted data and key have been created the key is given to the select few that need to have access to the data. This process helps protect the data from being seen or manipulated by unwanted parties.

7 0
2 years ago
Other questions:
  • If f(1) = 5 and f prime of x equals the quotient of 6 and the quantity x squared plus 2, which of the following is the best appr
    15·1 answer
  • Dr. Sanchez is reading about a study on Albert Einstein's brain, in which researchers compared Einstein's brain to a control gro
    5·1 answer
  • Work that is not completed in school is called:
    11·1 answer
  • Fun a copra cereals, Pedro latiendo no se abre (haste /pronto ) las 8:00. Tuve que Esperanto media hora.
    13·1 answer
  • Which set of data has the same mode and median?
    8·1 answer
  • I WILL BRAINLIEST!!!
    5·1 answer
  • Which type of loan has the accrued (added) interest paid for by the Department of Education while you are enrolled at least half
    5·1 answer
  • 4/5 to 3/5 as a number
    9·1 answer
  • who is joe?? i know joe mama, but who really is joe,and it cant be sleepy joe biden either, so who is it??
    15·1 answer
  • State 10 importance of orderliness.<br>pls it's urgent.​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!