1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
9

Review the map. How do you think the silk bought in Antioch got Rome?

Social Studies
1 answer:
DanielleElmas [232]3 years ago
6 0

Answer:

through the silk roads

Explanation:

You might be interested in
Do all cells have nucleus yes or no
nexus9112 [7]
No that’s what I go he is right
6 0
3 years ago
Discussion of the legislative department is in article ________ of the texas constitution
strojnjashka [21]

The 3rd article



(The executive is Article 4, and the judicial is Article 5)

8 0
3 years ago
*
erma4kov [3.2K]

Answer:

Pilgrimage

Explanation:

A mountain range that separates Southern Europe and Western Europe is the Alps.

Deciduous is a tree that loses its leaves in autumn.

<u>Pilgrimage</u> is a trip to visit the holy places of one's religion.

Industrial Revolution is a period when machines replace the work that was earlier done by hand.

Coniferous is a tree that has needle-shaped leaves during winter.

8 0
3 years ago
Pls help me <br><br> Do you think China is rich in natural resources? Explain your answer.
Fofino [41]

Answer:

yess

Explanation:

China has extensive deposits of coal, oil and natural gas. Besides these fossil fuels, China is a top producer of aluminum, magnesium, antimony, salt, talc, barite, cement, coal, fluorspar, gold, graphite, iron, steel, lead, mercury, molybdenum, phosphate rock, rare earths, tin, tungsten, bismuth and zinc.

5 0
3 years ago
You should always report all phishing attempts to your security poc if you are a member of what community?
Nady [450]
<span>If you are part of the government, all phishing attempts need to be taken very seriously and handled with the utmost of urgency. These attacks can disable large numbers of systems and lead to the misuse of large amounts of very sensitive data, and forwarding these attacks on to the next point of contact can make sure that they are handled properly.</span>
3 0
4 years ago
Other questions:
  • Individuals who suffer from social anxiety disorder are likely to
    6·1 answer
  • What is the setting in The Giver?
    14·1 answer
  • Richard has received many compliments from his boss about his hard work on the brochure for the medical practice because it has
    5·1 answer
  • Which of the following types of information may schools disclose without consent from the parent or student to a researcher at a
    7·1 answer
  • Jamal's brother often pretends to listen to what Jamal is saying when his brother is really focused elsewhere. When Jamal asks h
    8·2 answers
  • Who introduced the concept of laissez-faire? introduced the concept of laissez-faire, which means government interference in the
    14·2 answers
  • The clovis, Folsom and plan cultures were based on what?
    15·1 answer
  • the study of how people influence the behavior, attitudes, and beliefs of others is called __________.
    6·1 answer
  • In this section, you learned about the different tools and techniques companies use to provide consumers with information about
    13·2 answers
  • What percentage of the energy absorbed by the oak leaves is not passed on to the caterpillars?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!