1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
3 years ago
7

paano naging hamon sa komunikasyon ng pamilyang pilipino ang pagbabagong dala ng modernong panahon?​

Social Studies
1 answer:
Aloiza [94]3 years ago
5 0

Answer:

Hahavsvsbsjxjxh

Explanation:

Can you please give me the brainliest

You might be interested in
Which of the federalist papers defends the system of checks and balances?.
Sergeeva-Olga [200]

Answer:

51, titled: "The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments"

Explanation:

It is an essay by James Madison, the fifty-first of The Federalist Papers.

5 0
2 years ago
A constitutional amendmentthat outlawed slavery and indentured servitude
vovangra [49]
The fifteenth amendment
4 0
2 years ago
Assume that in December 2006, the Environmental Protection Agency (EPA) filed an administrative complaint against Marlin Firearm
timofeeve [1]

Answer:

<u>Option-</u> C

  • The losing party has a right to appeal is the correct statement concerning the administrative agency adjudication.                                                                                                                                        

7 0
3 years ago
A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested against the coun
stira [4]

Answer:

cyberterrorism

Explanation:

Cyberterrorism -

It is the act by which internet is used to perform any harmful activity , which can lead to loss of life and property , is referred to as a cyberterrorism .

This is done at higher platform with many people being affected by it .

Certain tools like , phishing, computer worms and virus , malicious software are involved in this case .

Hence, the example given in the question , showcase , cyberterrorism .

3 0
2 years ago
Kant called freedom the afterlife and god the of
zimovet [89]
God symbolizes immortality
5 0
2 years ago
Other questions:
  • Which is the BEST reason why the United States sent ships led by Commodore Perry to Japan in 1868?
    9·1 answer
  • When it was published in 1872, the expression of the emotions in man and animals became a bestseller. who was the author?
    5·1 answer
  • One of the main reasons for water scarcity in the developing world is that fresh water is being diverted to agriculture to feed
    15·2 answers
  • The job or career someone eventually holds may not even exist right now<br><br>true or false
    5·2 answers
  • What riverin egypthad christan areas by 400?
    5·2 answers
  • What is the difference between socialism and communism?
    14·2 answers
  • How would you describe the Cherokee Tribes contribution to South Carolina ?
    6·1 answer
  • During medieval times, what was widely believed to control the health and well being of different parts of the body?
    10·1 answer
  • The central location of India at the head of the Indian Ocean is considered of
    7·1 answer
  • Where is the lowest elevation point in california?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!