<span>The answer is D. Each position in the state reflects the persons spiritual achievement, according to the Buddhist tradition. In the Early Buddhism, the women were allowed to participate in communal activities. In the traditional view of Buddhism, women are viewed as inferior. Even though Buddhism is relentlessly misogynist, it is open to multiplicity and contradiction. </span>
Radicals believed that the safest approach was for the North to be a sort of dictator to the South. They were afraid that unless southerners' treason was harshly punished, the nation could never unite in a trustful bond that would guarantee their loyalty.
Even though Johnson had been outspoken about a need to punish the South, he ended up <u>extending a pardon</u> to all former confederates who declared a promise to stand by the Union and obey laws against slavery. <u>In addition, he let former confederate officials to occupy positions in state congress after the elections.</u>
When President Johnson started vetoing all laws that protected former slaves and black people in the south, it was made clear that ultimately he was trying to preserve the status quo and white privilege, and wasn't as forward-thinking as radicals had thought.
Hope this helps!
The correct answer is Supported believed Alaska would provide valuable natural resources, while detractors felt it was too cold and too far away.
The annexation of Alaska was a controversial topic in Congress during the mid 1800's. The decision to add it to the United States as a territory was decided by one vote in Congress. The individuals who voted against the annexation felt it was a waste of time and money. They gave it nicknames like "Seward's Folly" (named after Secretary of State William Seward) and "Johnson's Polar Bear Garden" (After president Andrew Johnson who approved of the annexation).
answer: to better help your understanding or help you with this question i need a picture
<u>Explanation</u>:
Another method of encryption of messages is the Substitution cipher text which involves swapping each letter of a plaintext by a different symbol as programmed by the key.
One of the popular ways to <em>decrypt</em> substitution cipher is to <u>follow this steps</u>:
- Scan through the cipher, looking for single-letter words.
- Count how many times each word or letter appears in the puzzle.
- Write your guesses over the ciphertext.
- Look for apostrophes. ...
- Look for repeating letter patterns