1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irinina [24]
3 years ago
9

Help my sister with social studies plssssss its about presidents!!

Computers and Technology
2 answers:
bija089 [108]3 years ago
4 0
George washington and James Maddison
PSYCHO15rus [73]3 years ago
3 0
George Washington

James Maddison

You might be interested in
Proponents of Internet freedom see its _____________ as providing protection for unpopular expression; proponents of greater Int
NeTakaya

Answer: The answer is anonymity

Explanation: i had the same question on my test.

8 0
3 years ago
Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
Alborosie

Answer:

D- Trojan Horse

Explanation:

Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.

Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.

3 0
3 years ago
How many acute angles are in a square​
babymother [125]
0, a square has 4 right angles
7 0
2 years ago
Read 2 more answers
What is one current method of detecting planets orbiting around other stars?
Gnoma [55]
C

D is the old way.

A they have not done yet

B not even a thing
5 0
3 years ago
How does the Lossy file format reduce the file size?
beks73 [17]

The answer is c. I just took it on apex n that’s what I got lol

3 0
3 years ago
Read 2 more answers
Other questions:
  • The groups_per_user function receives a dictionary, which contains group names with the list of users. Users can belong to multi
    11·1 answer
  • How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
    11·2 answers
  • It takes you 0.8 of a minute to read each page of your health book. It takes you 5.5 minutes to take the test at the end. How lo
    10·2 answers
  • PLEASE HELP ASAP!!!!
    14·1 answer
  • Which two statements about using leased lines for your wan infrastructure are true? (?
    14·1 answer
  • How do you adjust the shear of a shape?
    10·2 answers
  • The sum of the elements of an integer-valued array recursively calculated as follows: The sum of an array of size 0 is 0; Otherw
    15·1 answer
  • I created a brainly account and forgot everything I mean everything so I cannot log back on and my debit Card is currently about
    11·2 answers
  • Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, the
    9·1 answer
  • How to get to meters to kilometer
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!