1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
3 years ago
11

Plz help me first to answer well get brainliest!...

History
2 answers:
wariber [46]3 years ago
6 0
A it should be that !!
Nuetrik [128]3 years ago
3 0
I believe it should be A, if not I’m sorry!!!
You might be interested in
Which are true about the economic challenges the Russian Federation faced after the fall of the Soviet Union? Select all that ap
Llana [10]

Answer:

The Russian authorities were concerned for the following reasons :

1. They didn't know where to go when it came to using the money raised by the folk's heavy taxation.

2. The transformation from a socialist to a patriarchal system was tough.

3. Most of the similar kinds of companies sprang up, triggering supply problems.

4 0
3 years ago
What was accomplished by early farming societies but not by hunter-gatherer societies?
Oksanka [162]

Answer:

A. They creates metal items such as containers, weapons, and tools.

Explanation:

5 0
4 years ago
Which person or organization was a patron of the arts during the Renaissance?
Tresset [83]

Answer:

a. the catholic church i guess

6 0
3 years ago
Read 2 more answers
The alchemists, through their studies, did find out a lot about chemicals and developed new technology. Which ingredient did the
Pavlova-9 [17]

answer is option D arsenic

3 0
3 years ago
When the morris worm exploited the "finger" vulnerability, where did the shellcode reside when it executed?
eimsori [14]
<span>The Morris Worm was one of -- if not the -- first worms that used the Internet to travel, and it did so by being deposited in the buffer overflow. It used a network service finger vulnerability in Unix to spread from machine to machine: the finger program ran at the root (admin) level and was programmed to assume no username would exceed 100 characters. By creating longer names, the worm code was entered, copied, and passed on. Buffer overflow attacks occur when too much code or data is entered or created for the buffer to hold. This creates an error in which data is stored elsewhere, or in this case, the code entered using the username vulnerability.</span>
6 0
4 years ago
Other questions:
  • What are some effects that the Black Death had on the Renaissance?
    15·2 answers
  • Question 19 15 points)<br> Under the Patriot Act, the U.S. government could
    13·2 answers
  • What were some pros and cons of supporting the Vietnam War?
    12·1 answer
  • In the eyes of the British the colonies existed for what purpose
    10·1 answer
  • In 1947, The National Security Act was passed by Congress. It unified the army, navy, marines, and air force under the Departmen
    7·1 answer
  • List the seven roles that the president plays
    15·1 answer
  • What 1 word means doubtful 15 points in that thing
    14·1 answer
  • Why was the Battle of Inchon important?
    12·1 answer
  • Worlds first empire akkaidian or Babylonian
    13·1 answer
  • Which of the following best summarizes the way in which the development of the factory system and the development of new transpo
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!