1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
3 years ago
15

Questions

Social Studies
1 answer:
timama [110]3 years ago
4 0

Answer:

uooohjjjhvhhtyyhhgujhu

You might be interested in
Please Help Me! Please! Tell Me where The Other ones go i kinda got rlly confused
hodyreva [135]

Answer:

1. B

2. A

3. D

4. C

Explanation:

1. zionists wanted to help

2. nazis wanted jews gone

3. they didn't have a place go to

4. two people fighting = two solutions

5 0
2 years ago
Read 2 more answers
Dr. newsome is conducting a study to determine whether there is a relationship between birth order and shyness. before conductin
andrezito [222]
Dr. Newsome has to describe the operational definition of birth order and SHYNESS.
Before a scientist can carry out an experiment, he must identify all his variables and each of these variable must have an operational definition. Operational definition refers to the application of operations that will be used to define each variable.
6 0
3 years ago
What role did the Church play in improving education in Medieval europe
zysi [14]

Answer:

The medieval church added to its wealth by collecting a tithe, or tax . ... Church officials were often the only people who could read. As a result, they kept records for monarchs and became trusted advisors. At times, the church's power brought it into conflict with European monarchs.

3 0
3 years ago
Read 2 more answers
Academic integrity can be applied to all subject areas? 1 true 2 false
Jet001 [13]

Answer:

true

Explanation:

6 0
3 years ago
Read 2 more answers
Longer key lengths, often measures in the thousands of bits, are common for which family of modern cryptographic algorithms? Gro
Aleks04 [339]

Longer key lengths, often measures in the thousands of bits, are common for public keys/asymmetric algorithm of modern cryptographic algorithms.

Option: A

Explanation:

Asymmetric Encryption Algorithms  is an algorithm which is considered secure when the key size is large enough. DSA was originally proposed with a 512 bit key size but later on revised to support key sizes up to 1024 bits. AEA isn't an actual encryption algorithm. Its a key agreement protocol that enables users to exchange encryption keys of an insecure medium.

One time pad play fair algorithms is a type of encryption when it applied practically it works securely but theoretically it can't compromise. Algorithm is based on the prime numbers obtained from public and private keys.

8 0
3 years ago
Other questions:
  • Senators must be ______ years old to serve in office and serve _________ year terms, while Representatives must be ______ years
    5·1 answer
  • What does neutral nean in social studie​
    14·1 answer
  • What was Elizabeth Cady Stanton's dream for america?
    7·1 answer
  • A researcher studying the attitudes of college students on social norms posts a survey on her webpage. After receiving 150 respo
    6·1 answer
  • Which quote from the Declaration of Independence best shows that colonists felt the king would not listen to their wishes? (3 po
    15·2 answers
  • Golfer tiger woods has agreed to be the subject of a cover story for golf magazine, but he will only do the interview if the pub
    9·1 answer
  • Three facts about agricultural adjustment act
    7·1 answer
  • Please hurry and will also mark you brainiest
    8·1 answer
  • What's your daily life style?​
    12·1 answer
  • Which is NOT a reason why it is hard to get out of poverty? *
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!