1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
torisob [31]
3 years ago
8

Hand written on scrolls in Hebrew, this is the holy book of Judaism

Social Studies
1 answer:
nika2105 [10]3 years ago
8 0
Torah.

Explanation: Torah is the book for Judaism, Vedas is for Hindu, Bible is for Christianity, Qur’an is so Islam
You might be interested in
*giving brainliest to the person who’s answer is correct first*
Semmy [17]

Answer:

Explanation: response goes to last under goes to first the last one goes to the last one

3 0
3 years ago
Define a good in economics
masya89 [10]

Answer:

In economics, goods are items that satisfy human wants and provide utility, for example, to a consumer making a purchase of a satisfying product.

Explanation:

5 0
3 years ago
Which statement describes S waves?
Alexxx [7]

Answer:

They move side to side

Explanation:

yes they are produced through side by side motion of particles.

5 0
3 years ago
Read 2 more answers
Six symptoms of intrapersonal conflict
pychu [463]

stress, depression, mood symptoms, physical symptoms, increasing cardiovascular activity, and low self esteem
4 0
4 years ago
Read 2 more answers
What uses authentication header (ah) and encapsulating security payload (esp) to create secure data transmissions?
gtnhenbr [62]

AH is an important IPSec security protocol that provides packet authentication and anti-replay services. AH is defined in RFC 2402 and uses IP protocol security

The AH protocol only provides a mechanism for authentication. AH provides data integrity, data origin authentication, and optional replay protection services.

AH-style authentication authenticates the entire IP packet, including the outer IP header, while the ESP authentication mechanism only authenticates the IP datagram portion of the IP packet. Each protocol can be used alone to protect IP packets, or both protocols can be used together in the same IP packet.

Learn more about ESP at

brainly.com/question/27889683

#SPJ4

3 0
2 years ago
Other questions:
  • Which of the following is a benefit of free trade?
    8·1 answer
  • What do you call a grassland found in a tropical area with dry spells
    14·1 answer
  • How to improve interprofessional communication in the workplace?
    10·1 answer
  • What is not a combination of innate and learned behavior?
    6·1 answer
  • How did the caste system develop over time, and how did it go beyond the four original varnas.
    8·1 answer
  • College students who drink so much that it interferes with their lives, health, and academic careers are often not diagnosed as
    10·1 answer
  • Explain how civil liberties differ from civil rights and how each are protected in the United States. In your explanation,provid
    13·1 answer
  • Complete an analysis of the image.
    10·2 answers
  • Best conveys that vegetarianism is good for the environment
    8·1 answer
  • - beneficios de las instituciones económicas y políticas
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!