1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
3 years ago
11

On which body of water is the city of Dar es Salaam located?

Social Studies
2 answers:
Musya8 [376]3 years ago
5 0
Is located in the Indian Ocean
diamong [38]3 years ago
5 0

Answer: Dar es Salaam is located at 6°48' South, 39°17' East (−6.8000, 39.2833), in the indian ocean near the coast of East Africa, with sandy beaches in some areas.

You might be interested in
Anyone wanna be my gf.<br><br>​
Lilit [14]

Answer:

yes you are mostly mad person in the

6 0
3 years ago
Read 4 more answers
Who is Janet Walker and why is she concerned about Hong Kong’s Pink Dolphins?
GrogVix [38]

Answer: Janet walker is a author. janet walker is concerned about Hong Kong’s pink dolohines because they are possibly about to disappear.

Explanation:

8 0
3 years ago
Discrimination against any client Question 25 options: a) is ethical if there is a good reason to discriminate b) is usually a b
Westkost [7]

Answer:

b :)

Explanation:

4 0
3 years ago
Which cyberspace operational task is to permanently, completely, and irreparably deny access to, or operation of, a targeted fun
LuckyWell [14K]

Traditional cyberspace operational task is to permanently, completely, and irreparably deny access to, or operation of, a targeted function for the foreseeable scope of the conflict.

Cyberspace, according to the Department of Defense, is the fictitious space in which digital information is transmitted over computer networks. The DOD's regular business operations in and through cyberspace are made up of its military, intelligence, and intelligence-related activities. Military operations in cyberspace employ cyberspace capabilities to produce effects that aid operations in both the physical and cyberspace domains. In order to carry out national security duties, cyberspace operations are carried out under the jurisdiction of the judicial branch. Traditional threats typically come from states using well-known military tactics and recognized military forces. Non-intelligence activities make up cyberspace OPE and serve as the foundation for subsequent operations.

More about cybersecurity brainly.com/question/26260220

#SPJ4

8 0
2 years ago
Can someone help me answer this question please?
Thepotemich [5.8K]

Answer:

i cant really see the text, do you mind taking a better picture so i can answer it?

Explanation:

5 0
3 years ago
Other questions:
  • What war happen in 1914
    13·2 answers
  • When a balloon is filled with air, we say it inflates. What does the word inflation mean when it is applied to money?
    11·1 answer
  • What was used as a warning system in the old north church
    5·2 answers
  • Explain how the use of technology in agriculture can improve productivity and employment in 300 words
    13·1 answer
  • Christina accepts as true a claim that orange juice consumption triggers hyperactivity in children. She simply assumes that it w
    12·1 answer
  • Which of these amendments is a ratified and current amendment?
    15·1 answer
  • What type of ideology favors religion and tradition
    8·1 answer
  • Which term references the approach sociologists use as a road map for how to view the world
    15·2 answers
  • A state in which severe restrictions are placed on the activities of individuals and groups desiring to influence the allocation
    14·2 answers
  • These headlines show that the federal government can
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!