1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Whitepunk [10]
3 years ago
11

It's worth 15 points, please help! (Not sure if A is right)

Social Studies
1 answer:
Vilka [71]3 years ago
6 0

Answer:

its b not a

Explanation:

You might be interested in
A writer of a call option will want the value of the underlying asset to __________ and a buyer of a put option will want the va
Sergeeva-Olga [200]

Answer:

Decrease, decrease          

Explanation:

A writer of a call option will want the value of the underlying asset to <u>decrease</u> and a buyer of a put option will want the value of the underlying asset to <u>decrease</u>. The writer of the call option who is also the seller of the put option will want the value of the underlying asset which is the financial assets upon which a derivative's price is based to decrease so as to make more profit while the buyer also wants it to decrease so he/she can pay less for the asset.

3 0
3 years ago
Why do graff and anderson questions ender seven days after his first battle?
pashok25 [27]

Graff and Anderson meet with Ender seven days before the battle because they want to decide if he is really ready to accelerate the attack and participate in a real confrontation. Both play opposite roles so that Ender can understand two different points of view, on the one hand the need to lead everyone and make unquestionable decisions and on the other the not to stop listening to their team and stay in tune with them.

8 0
4 years ago
Consider the observation that many school shootings have been perpetrated by people with a history of playing violent video game
Zielflug [23.3K]

Answer:

The right option is "the shooters history of being bullied"

Explanation:

People with a history of being bullied turns out to be bullies or portray a high level of violent behaviors. There have been studies that shows a correlation between playing violent video games and violence. There have also been studies that suggest that people who have a history of being bullied will grow up being bullies and displaying several violent conducts.

8 0
4 years ago
_____ is the process of adapting to the ways of life and beliefs that are common in one's new culture. acclamation emancipation
irakobra [83]
The correct answer is acculturation. Acculturation is being defined as a process that involves physiological, social, or even cultural change by which they are likely to be rooted from the blending among cultures and it could be evident in multiple levels.
4 0
4 years ago
Read 2 more answers
Chad signs dolly’s name, without her authorization, to the back of her paycheck, which was issued by eastside market. this is:__
olchik [2.2K]

Chad signs dolly’s call, without her authorization, to the return of her paycheck, which became issued through the eastside marketplace. this is ​a forgery.

Authorization is the system of giving a person the capability to get the right of entry to a useful resource. Of path, this definition may also sound obscure, but many situations in real existence can help illustrate what authorization approach so that you can follow those standards to pc structures. an excellent example is house ownership.

Authorization is a system by means in which a server determines if the consumer has permission to apply a resource or get admission to a file. Authorization is typically coupled with authentication in order that the server has a few concepts of who the patron is that is inquiring to get entry. authorization is a method thru which the running device determines that a procedure has the proper to execute in this gadget. The most commonplace form of this management is the user name, which we are all acquainted with when we go online to a computer. the second form of running gadget safety is authentication.

There are 4 varieties of Authorization – API keys, basic Auth, HMAC, and OAuth. web improvement, programming languages, software program trying out & others.

Authorization is required to deal with sensitive records and belongings. with none of them, you are keeping facts susceptible to data breaches and unauthorized get the right of entry.

Learn more about Authorization here:

brainly.com/question/7088084

#SPJ4

7 0
2 years ago
Other questions:
  • The NBAC looks at characteristics individuals might have that would prevent them from being able to provide voluntary informed c
    9·1 answer
  • What were the names of three of the early inhabitants of Latin America
    15·1 answer
  • The television talks to heidi. it tells her the police are out to get her. because heidi has schizophrenia, she is mostly experi
    11·1 answer
  • Which criterion is a requirement for naturalization as a US citizen?
    9·1 answer
  • In the context of the Rocket Model, a critical first step to building a high-performing team is to:______
    8·1 answer
  • How is the governor and luietentant elected?
    9·1 answer
  • Ambition must be made to counteract ambition meaning?
    15·1 answer
  • PLZ HELP!!!!!!
    6·1 answer
  • what was Shays’ most substantial (most important) grievance (issue/problem)? Was there anything else he could have done to obtai
    13·1 answer
  • If a company is interested in improving their human capital, which are they most likely to consider?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!