1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
3 years ago
7

HELP!!!! Urgent I need it right now

History
1 answer:
olganol [36]3 years ago
4 0

Answer:

D

Explanation:

You might be interested in
Under the Articles of Confederation, justice and law enforcement are left to __________. A. The nation B. The states C. The peop
Nuetrik [128]

The correct answer would be B. The states

5 0
3 years ago
Read 2 more answers
_____ is the process of making goods and services available to consumers and convincing them to buy these products.
madam [21]

Answer:

Marketing!

Explanation:

4 0
3 years ago
Indian Removal Quiz Active 1 2 3 5 6 o n Which best describes President Andrew Jackson's American Indian policy? President Jacks
Lostsunrise [7]

Answer:

President Jackson believed American Indians had to give up their territory to white settlers.

Explanation:

7 0
3 years ago
Is the following statement true or false? Quartering of soldiers refers to a government forcing citizens to join the military.
Dovator [93]
The answer is...False! Quartering is when citizens are forced to allow soldiers to occupy their homes for a certain time.
7 0
4 years ago
Read 2 more answers
In 1986, recognizing the growth and potential of cybercrime, the u.s. congress passed the _______.
jarptica [38.1K]

In 1986, recognizing the growth and potential of cybercrime, the u.s. congress passed the Computer Fraud and Abuse Act

Computer Fraud and Abuse Act of 1986 - Amends the Federal criminal code to change the scienter requirement from "knowingly" to "intentionally" for certain offenses regarding accessing the computer files of another.

The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.

Cyber laws have been put in place to keep users safe on the internet. This provides internet users with access, privacy, free expression, and jurisdiction.

To know more about  Cyber laws here

brainly.com/question/20768284

#SPJ4

3 0
2 years ago
Other questions:
  • What was George Washington's height?
    13·1 answer
  • How do party presidential nominees who go on to win the office in november elections often reward supporters and contributors?
    11·1 answer
  • List two factors that helped the US shift to an industrial economy during the Gilded Age.
    7·1 answer
  • Which statements correctly describe the Great Wall?<br> Select all correct answers.
    10·2 answers
  • Why did the Constitutional Convention need to happen in the United States?
    6·1 answer
  • The decision in marbury v madison was significant in the u.s history becuase it ​
    14·1 answer
  • How federalism reflects the distribution of power between national state governments been interpreted over time?
    5·2 answers
  • Why is Trump getting harassed?
    9·2 answers
  • How would you reacted if you lived during world war
    11·1 answer
  • Name the bird that is only found on nepal​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!