1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
6

Select L for the items that refer to General Lee, H for General Halleck, and M for General McClellan.

Computers and Technology
1 answer:
Naily [24]3 years ago
7 0

The letters that represent the names of the individuals associated with the various actions are; M, L, H, M, L

<h3>What were the Activities of Railroad Presidents?</h3>

1) The person that removed from command twice for being overly cautious was General McClellan.

2) The person that felt a victory in the North would turn public opinion against the war was General Lee.

3) The person that retreated to Washington, leaving the Confederates free to attack the North was General Halleck

4) The person that stopped the Confederate Army at Antietam was General McClellan.

5) The person that was offered command of Union Army after Fort Sumter was General Lee.

Read more about history of railroad Presidents at; brainly.com/question/25997960

You might be interested in
help i was building my pc and i pushed the cpu into the socket really hard until there was an audible crack and it went into the
Fed [463]
Try smashing it with a hammer, always helped me
4 0
3 years ago
FOR CALL OF DUTY MOBILE GAMERS PLS HELP!
statuscvo [17]

since the app are two different things its crucial to have a activision account, though the progress wont be reset unless you do have an activision account

8 0
3 years ago
3.
gulaghasi [49]

Explanation:

the process of displaying the information from the table is called query

<h2>hey friend </h2><h2>your answer is here </h2><h2>I hope it will be helpful you </h2><h2>please mark as brainiest answer </h2><h2>thank you </h2>
7 0
3 years ago
Write an expression that whose value is the fifth character of the string name.
Anuta_ua [19.1K]
Int j;
j="name"[4];
//   you   could  do
j=0;   //  since name   has four letters  the fifth  character is the terminating 0
now  if the string  name is  name
you   could do
j=name[4];  // or even    4[name] 

5 0
3 years ago
A _______ is a host that runs software to provide information, such as web content, to other hosts.
kolezko [41]

Answer:

The correct answer to the following question will be "Server".

Explanation:

  • Any device with a network connection is a host, but only hosts which accept other device connections (climates) are Servers.
  • All servers were hosts, but the servers aren't all hosts.
  • Each host network is a node, however not all network nodes are a host. Networking hardware such as modems, hubs, and network switches are not necessarily network addresses allocated (except for administrative purposes sometimes).
8 0
4 years ago
Other questions:
  • Write a php program that checks the elements of a string array named $passwords. use regular expressions to test whether each el
    8·1 answer
  • Define a function below, get_subset, which takes two arguments: a dictionary of strings (keys) to integers (values) and a list o
    8·1 answer
  • Given two variables , first_place_winner and second_place_winner, write some code that swaps their associated values. use any ad
    12·1 answer
  • A tablet computer is a low-cost, centrally managed computer with no internal or external attached drives for data storage.
    10·1 answer
  • A network administrator has configured ​VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask.
    7·1 answer
  • Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
    5·2 answers
  • What are possible penalties if a designer is caught breaking copyright laws?
    13·1 answer
  • B. What significant values have you learned while learning the tools and utensils?
    8·1 answer
  • Comment if u wanna text me on behance
    6·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!