1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
9

What role did Abigail Adams play in the womens rights movement?

Social Studies
1 answer:
sineoko [7]3 years ago
5 0

Answer:

Abigail Adams was one of the first advocates of women's equal education and women's property rights.

Explanation:

Abigail Adams wrote to her husband, John Adams, in Philadelphia, urging him and other members of the Continental Congress to keep the interests of women in mind as they prepared to fight for American independence from Great Britain.

You might be interested in
HURRY YOU WILL GET BRAINLIST!!!!!!!!!!! 25 POINTS!
Lesechka [4]

Answer:

Increase

weary

reasonable

appearance

Explanation:

3 0
3 years ago
Read 2 more answers
15 points.
Gemiola [76]
I think your answer would be A.
5 0
3 years ago
Which of the following is NOT a Congressional power?
Alla [95]
B)The president commands the armed forces. Congress has the power of the purse and can coin money it also can make laws and override vetos.
7 0
3 years ago
In international trade, an exchange rate is
malfutka [58]

Answer:

B

Explanation:

I did it

3 0
3 years ago
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of m
Lemur [1.5K]

The following is missing for the question to be complete:

- Rootkit

- Backdoor

- Wrapper

- Shield

Answer:    Rootkit

Explanation: Rootkit is a set of software, such as malicious software, created by an attacker to allow access to a computer, that is, its software, and thus take malicious action against the attacked computer, while hiding the presence of malicious software. This is, of course, undertaken by one who does not have access to the computer he or she wants to attack, therefore is not authorised to access it. This malware contains a spectrum of different tools and is used by attackers to, say, neutralise antiviruses on an attacked computer and the like. Using a rootkit, an attacker gains access to a computer that is the same as an administrative one, and is installed using a hacked password or other hacking method without the knowledge of the victim.

5 0
3 years ago
Other questions:
  • Behavior that is generated through exposure to rules is known as ________.
    6·1 answer
  • Ethnic _____ is the enduring aspect of the self that includes a sense of membership in an ethnic group, along with the attitudes
    13·1 answer
  • Your text defines learning as the process of acquiring new and relatively enduring information or behaviors. why would a behavio
    6·1 answer
  • What is the answer for that? please can someone tell me
    12·2 answers
  • Which level of government decides when and how people vote for their Congressional representatives?
    6·1 answer
  • Read the excerpt from "Bluesman on the Move.”
    10·1 answer
  • Receptor sites for communication among neurons exist on ____.
    15·1 answer
  • What planet has the largest satellite
    12·1 answer
  • Most intelligence tests are normed such that the mean score is 100 and the standard deviation is 15. Therefore, the discovery of
    11·1 answer
  • The rationalist finally will be of dogmatic [rigid/arrogant] temper in his affirmations, while the empiricist may be more ______
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!