1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
2 years ago
7

What was the bold, carefree women of the 1920’s called?

Social Studies
2 answers:
anyanavicka [17]2 years ago
4 0

Answer:

Explanation:

Flappers were a generation of young Western women in the 1920s who wore short skirts, bobbed their hair, listened to jazz, and flaunted their disdain for what was then considered acceptable behavior.

DENIUS [597]2 years ago
3 0
Flappers

Many people saw the bold, boyish look and shocking behavior of flappers as a sign of changing morals. Though hardly typical of American women, the flapper image reinforced the idea that women now had more freedom.
You might be interested in
What river runs across the state of Idaho?
klasskru [66]
Snake river is the most known river to run through idaho
6 0
3 years ago
Which statement best describes on-the-job training?
Nimfa-mama [501]

Answer:

Afterjob training

Explanation:

It sounds right and I no it is

5 0
3 years ago
Pax Romana was
Dominik [7]

Answer:

The Time of Chaos during the collapse of Rome

3 0
3 years ago
Read 2 more answers
Where are the most fertile farmlands in South Asia located?
Amanda [17]
Burma, Thailand, Vietnam, Laos, Cambodia, Singapore, and Peninsular Malaysia
7 0
4 years ago
Which cyberspace operational task is to permanently, completely, and irreparably deny access to, or operation of, a targeted fun
LuckyWell [14K]

Traditional cyberspace operational task is to permanently, completely, and irreparably deny access to, or operation of, a targeted function for the foreseeable scope of the conflict.

Cyberspace, according to the Department of Defense, is the fictitious space in which digital information is transmitted over computer networks. The DOD's regular business operations in and through cyberspace are made up of its military, intelligence, and intelligence-related activities. Military operations in cyberspace employ cyberspace capabilities to produce effects that aid operations in both the physical and cyberspace domains. In order to carry out national security duties, cyberspace operations are carried out under the jurisdiction of the judicial branch. Traditional threats typically come from states using well-known military tactics and recognized military forces. Non-intelligence activities make up cyberspace OPE and serve as the foundation for subsequent operations.

More about cybersecurity brainly.com/question/26260220

#SPJ4

8 0
2 years ago
Other questions:
  • Pergamum and Alexandria were both __________________.
    10·2 answers
  • The Privilege of the Write of Habeas Corpus shall not be suspended, unless when in Cases of Rebellion or Invasion the public Saf
    6·1 answer
  • What is the difference between a college and a university?
    8·1 answer
  • A nurse informed john that she was about to take blood from his any cubicle region what part of the body
    10·1 answer
  • What is sentence for midden
    6·1 answer
  • How did the U.S. Constitution solve a problem created by the Articles of Confederation?
    10·2 answers
  • Understanding why the fear of darkness may have contributed the the survival of our human ancestors is most relevant to the ___
    5·1 answer
  • How did the establishment of Parliament strengthen the rights of English citizens? Text to speech
    6·1 answer
  • What is nkrumaism ideology​
    11·1 answer
  • Based on the bandura studies, what would explain why girls are less likely to act out aggressively than boys after watching viol
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!