1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
2 years ago
12

How did the government work in the city-state of Sparta?

Social Studies
2 answers:
andreyandreev [35.5K]2 years ago
7 0

Answer:

It is D

Explanation:

I just know

yanalaym [24]2 years ago
5 0

It Is Answer:A : priests decided...

You might be interested in
Students in mrs. evan's first grade class are given tokens for positive behavior. at the end of the school week, students are ab
horsena [70]
<span>The tokens act as secondary reinforcers. A secondary reinforcer is one that is associated with a primary reinforcer. In order for the reinforcer to achieve its objective, the person has to learn the association between the primary and the secondary reinforcer. For example, money is a secondary reinforcer, food is a primary reinforcer. When we see the money we are motivated by the association we make; <span>buy food with the money.

I hope my answer can help you.
</span></span>
3 0
2 years ago
What happened in Europe as a result of the misery caused by the Great Depression? (A.)
aivan3 [116]

The answer is C.) Dictators took advantage of the economic vulnerability to gain supporters. (Gradpoint)

6 0
2 years ago
Which economic system encourages entrepreneurship
xeze [42]

<span>Free Enterprise System is another name for market economy, also known as capitalism, where people are free to become entrepreneurs and own and operate an enterprise (business).</span>
6 0
3 years ago
Michelle pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering
Andrew [12]

Answer:

Impersonation

Explanation:

Impersonation - it is one form of social engineering that focuses is to gain access of the network in order to take advantage of the network for committing fraud or finding any theft. it is different from another form of engineering because it doesn't include phone or mail instead it depends on personal communication.

some form of social engineering is phishing, tailgating, pretexting, etc.

8 0
2 years ago
Four contributory factors for unemployment locally and globally?
Nady [450]
<h3><em>Answer:</em></h3><h3><em>Some Factors are as follows :</em></h3><h3><em>Explanation:</em></h3><h3><em>Lack of markets</em></h3><h3><em> Poor infrastructure</em></h3><h3><em> Poor leadership</em></h3><h3><em>Bad governance</em></h3><h3><em> Lack of skills</em></h3><h3><em>Lack of capital, and others.</em></h3>
7 0
3 years ago
Other questions:
  • Presenting evidence to an impartial person for a binding decision is called
    7·2 answers
  • What issues affected the western territories between 1775 and 1787
    7·1 answer
  • Which law required manufacturers to list ingredients they used in foods and drugs?
    9·1 answer
  • Talk to a parent or trusted adult about good citizenship. Use these terms when you talk ---Consent, Contract, laws, Taxes, Right
    8·1 answer
  • Which of the following is most likely to help us empathize with others?A) the bystander effectB) automatic mimicryC) mirror-imag
    10·1 answer
  • I need answers ASAP
    5·2 answers
  • The overlapping and interdependent system of advantage and disadvantage that positions people in society on the basis of race, c
    12·1 answer
  • How does poverty lead to unemployment, and in return unemployment lead to poverty?​
    14·2 answers
  • The nursery rhyme, "Ring Around the Rosie" is said to have its origins with the Black Death. A "rosy" rash would appear as a sym
    15·2 answers
  • Misleading advertising material created to look like regular news stories or social media is known as​ ________.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!