1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dsp73
3 years ago
5

Which of the following was not something colonial children had to do? WILL GIVE BRANLEST ///////////////////////////////////////

////////////////////////////////////////////////////////////
Have their parents permission whenever they went outside.
Never argue with their siblings.
Never eat in the presence of adults.
Bow when they approached their parents.
Computers and Technology
1 answer:
Ksenya-84 [330]3 years ago
5 0

Answer:

i beleive it is bow when they approach their parents

You might be interested in
Which types of computers are used by large businesses
aniked [119]

answer:

Mainframe computers are used by large companies and organisations to perform critical tasks that involve bulk data processing like transaction processing, census information, statistical data and so on. They consist of extensive input and output facilities, are very stable and dependable and handle millions of transactions every day

Explanation:

4 0
3 years ago
Que se encarga de notar lo que pasa alrededor
Angelina_Jolie [31]

Answer: Es nuestro cerebro. Los ojos son las estructuras capaces de transformar las señales luminosas en impulsos eléctricos, los cuales viajan al cerebro y, una vez ahí, él se encarga de transformar estas señales eléctricas en lo que vemos realmente. Y lo mismo pasa con todos los otros sentidos.

Explanation:

7 0
3 years ago
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
4 years ago
Please help me with this
Masteriza [31]

Answer:

Explanation:

what?

6 0
3 years ago
Which term refers to an interface between HTML elements and JavaScript program code that allows JavaScript code to manipulate HT
vfiekz [6]

I believe the answer is D, document object model. Conditional Statements deal with if statements, iterative structures are while and for loops, HTML tags are the tags which help to format and define a webpage, and src attribute deal with specifying external sources for certain tags.

4 0
3 years ago
Other questions:
  • You took a fantastic photograph that you want to use in the report you're writing using DTP software. To import the photo into y
    6·2 answers
  • What should you do before cleaning the top of a storage battery and rinsing it with fresh water?
    12·1 answer
  • Microsoft's
    8·1 answer
  • During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdroppin
    14·1 answer
  • If a small monster collector:- Has 16 small monster containment devices and intends to use all of them.
    10·1 answer
  • Drag the right word to it’s definition
    13·1 answer
  • Write an application that determines whether the first two files are located in the same folder as the third one. The program sh
    6·1 answer
  • Please complete the following questions. It is important that you use complete sentences and present the questions and answers w
    6·1 answer
  • HELP FAST PLEASE
    6·1 answer
  • The equals method of the Object class returns true only if the two objects being compared:_________
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!