1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
11

191 Составьте синквейн к слову подарок.​

Social Studies
1 answer:
DiKsa [7]3 years ago
3 0

Answer:

191 Make a syncwine for the word gift.

You might be interested in
How was 1977 and a important in the region
photoshop1234 [79]

Answer:

The Ogaden War

Explanation: The Ethio-Somali War or the Oganden war, was a military conflict fought between Somalia and Ethiopia from July 1977 to March 1978 over the Ethiopian region of Ogaden. The conflict began with the Somali invasion of Ethiopia.

7 0
2 years ago
What were the causes of the montgomery bus boycott?​
grin007 [14]

These laws were a cause of the bus boycott because the poor treatment, segregation and violence from them were the motivation for Rosa Parks to not move from her seat on 1st December 1955 and the motivation for the black population to boycott the buses in support of her.

7 0
3 years ago
1. The
aleksandrvk [35]

Answer:

The Cherokee had that language. Sequoyah, a Cherokee, invented it in 1821. He got the idea from seeing non-native soldiers reading what he called talking leaves (words on paper.)

Hope this helps :)

3 0
3 years ago
What is the dominant language family in sub-Saharan Africa?
cestrela7 [59]

A large majority of languages of this family are tonal such as Yoruba and Igbo, Ashanti and Ewe language. A major branch of Niger–Congo languages is the Bantu phylum, which has a wider speech area than the rest of the family (see Niger–Congo B (Bantu)

mark brainliest    :)

3 0
4 years ago
Read 2 more answers
The wifi standard known as privacy with message integrity can be described as follows:
Viefleur [7K]
<span>The MAC-level data sent out by the access point is encrypted to make sure that it is not tampered with by anyone other than the intended user. In addition, a message integrity code is sent along with this data as a second level of security. This makes sure that the identifiable data in the transmission is not stolen and used for unintended purposes.</span>
8 0
3 years ago
Other questions:
  • How did Chinese isolation affect trade for China and for the world?
    10·1 answer
  • Toward the end of his life, maslow began to develop _____ psychology that went beyond personal experience (mystical, ecstatic, s
    7·1 answer
  • What is the best description of the popular vote
    8·1 answer
  • Divorce is most likely in societies where bride price is customary. dowry is customary. it is customary for the couple to live i
    10·2 answers
  • Kwan is the leader of a team whose meetings are being disrupted by liz, who dominates the discussions with long, irrelevant comm
    10·1 answer
  • What organization did DuBois help form?
    10·1 answer
  • The Tutsi and Hutu tribes are in conflict in A. Rwanda. B. Ghana. C. Nigeria. D. Kenya.
    15·1 answer
  • One name for the french court musicians who were from the nobility, and who composed using a sophisticated form of poetry about
    5·1 answer
  • The teacher assigns you to work with the star football player for a group project. Because most athletes you know are not very s
    13·1 answer
  • 1. What is geography?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!