1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
14

Explain the history of America ​

Computers and Technology
2 answers:
Tomtit [17]3 years ago
8 0

Explanation:

The history of the United States is what happened in the past in the United States, a country in North America. ... They won the Revolutionary War and started a new country. They signed the constitution in 1787 and the Bill of Rights in 1791.

Military conflict

erastovalidia [21]3 years ago
8 0

Answer: here are some random stuff (true facts) about america

Explanation:

The country began as 13 colonies of England, which were spread out along the central Atlantic Coast of North America. ... More than 40 years passed before the colonies joined together, rebelled against England, and declared themselves free, independent states on July 4, 1776, in the famous Declaration of Independence.

9, 1776. On Sept. 9, 1776, the Continental Congress formally changed the name of their new nation to the “United States of America,” rather than the “United Colonies,” which was in regular use at the time, according to History.com

Native Americans – The First Owners of America.

It is commonly said that "Columbus discovered America." It would be more accurate, perhaps, to say that he introduced the Americas to Western Europe during his four voyages to the region between 1492 and 1502

The United States emerged from the thirteen British colonies established along the East Coast. Disputes over taxation and political representation with Great Britain led to the American Revolutionary War (1775–1783), which established independence.

You might be interested in
Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
steposvetlana [31]

Answer:

Many network and communication protocols require bit stuffing for the following purposes: to avoid the interpretation of data as control information. For example, with six consecutive 1 bits, X.25 uses the bit stuffing,signal the beginning and end of a frame.

High-level Data link control (HDLC) is a bit-oriented protocol for point-to-point and multi-point communication.P/F bits are present in HDLC control field.

So,Yes bit stuffing is necessary in control field.

7 0
3 years ago
Bao bì chủ động active packaging và bao bì thông minh intelligent packaging khác biệt như thế nào
Zielflug [23.3K]

answer:

yes....................

3 0
3 years ago
The optional feature in a business letter is
slamgirl [31]

Answer:

Reference

Explanation:

i don't know how to explain it but that's the answer

5 0
3 years ago
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
4 years ago
DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with
In-s [12.5K]

Answer:

False

Explanation:

The DES encryption standard is believed to be weakened by the American government by containing shortened key lengths and 'S-boxes' of unknown origin.

5 0
2 years ago
Other questions:
  • How do forensic pathologist determine time of death
    13·1 answer
  • Prompt the user ‘Enter a row vector of any numbers’ in the command window, and enter an arbitrary row vector and store it to x.
    6·1 answer
  • When I try to invite someone to be my friend on brainly, for some people, it says, "Somethings up. Invitation wasn't sent". Can
    8·1 answer
  • In one to two sentences, explain why citizens pay taxes
    8·1 answer
  • Write a function to reverse a given string. The parameter to the function is a string. Function should store the reverse of the
    12·1 answer
  • What simple machine is most often used to lift the blinds on a window?
    8·2 answers
  • Explain the computer according to size​
    10·1 answer
  • EASY POINTS what favorate food<br> so easy
    7·2 answers
  • I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding
    8·2 answers
  • Multiple Select
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!