1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sav [38]
3 years ago
6

Which economic activity is part of a government's fiscal policy?

Social Studies
2 answers:
Novay_Z [31]3 years ago
5 0

Answer: an alternative to this answer is spending tax revenues.

Explanation:

ad-work [718]3 years ago
3 0

Answer:

D. Lowering tax rates

Explanation:

You might be interested in
How did american farmers in 1790 feel about the government? please answer
artcher [175]
They were independent people who didn't government inferring with their daily lives
7 0
3 years ago
How did environmental characteristics shape the lives of people in South America?
arsen [322]

Explanation:


Human Environment Interaction. The people of Latin America have altered the land through agriculture, development of infrastructure, logging, mining, and urbanization. Natural disasters have impacted the lives of millions of people in Latin America

3 0
2 years ago
My measurement for wedding dress are bust 46 waist 45 hips 51 hollow hem 51 what size do i get
jenyasd209 [6]
All depends on the store you are getting it from, ask for their size guide/chart and check
6 0
3 years ago
How did the Edict of Milan contribute to the growth and longevity of the Roman Empire? (4 points)
Ivenika [448]

Answer:

D-It created a less rigid social class system.

Explanation:

Mark as brainliest :)

7 0
3 years ago
Read 2 more answers
Write down three ways that identities are stolen online, and three things people can do to protect themselves from cybercriminal
N76 [4]

Answer:

I can give you one way. Please do not copy the exact wordings of my answer. A data breach in a website you use such as Ins​​tagr​​am, T​wi​​tter, Sn​apc​hat, etc Could occur, and in those breaches can contain things such as your username, email, pa​​ssw​​ord, and more. Most of the time the ha​​ckers that perform these da​​ta br​​eaches will group the data they get from the breach into a large pile of text and sell it on the dar​​k w​​eb for cash. The people who then buy those lists of user em​​ails, use​rna​mes, pas​​sw​​ords will attempt to use the same em​​ail and pa​​ssw​ord on different websites in order to get into more of that persons ac​​co​​unt, to try to get more in​form​ation such as their b​anki​ng information, ad​​dress, and more. You could prevent further breaching of your data by using a different password on every website that you use. That way when a hacker gets one of your usernames and p​​a​​s​​​​​swords, they can't log into any others because you don't use the same pa​​ss​​word on other websites. Hope this helped!

Explanation:

4 0
3 years ago
Other questions:
  • Candy is washing the dishes and asks her brother to help by drying them. Her brother says that dishes are women's work, which ma
    10·1 answer
  • José is depressed. His therapist told him that reading a book each month would help. He should also visit friends, go bowling, d
    15·1 answer
  • On October 7, 1780, men from the mountains of North and South Carolina were able to ambush a group of Loyalist soldiers in which
    8·2 answers
  • Which gas is used in welding
    6·2 answers
  • HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! With question 6
    13·1 answer
  • Violent Violet, the main suspect in a brutal double homicide, is arrested and brought to the police station. Once there, Violet
    8·1 answer
  • What are three things that transport sediment after rock is weathered?
    6·1 answer
  • Can yall plz awnser this i need to pass
    7·1 answer
  • What type of goverment gives the citizens all of the power?
    7·1 answer
  • Men are more likely than women to engage in sexual harassment, just as most victims of this offense are women. This is true prim
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!