1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
7

Which group established the first Muslim dynasty?

Social Studies
1 answer:
xxMikexx [17]3 years ago
4 0
I believe the first was the Tahirid dynasty in Khorasan , which was founded during the caliph Al- Ma’mun’s reign.
You might be interested in
Which of the following is not an impact left by Medgar Evers?
oksian1 [2.3K]
A. Galvanized the civil rights movement and passing of the civil rights act of 1964
6 0
3 years ago
Read 2 more answers
What is self-examiation​
Ber [7]

Answer:

reflective examination (as of one's beliefs or motives) : introspection. 2 : examination of one's body especially for evidence of disease.

8 0
2 years ago
Why did some citizens of the united states want to annex texas?
Ivenika [448]

Answer:

Mexico wanted to keep Texas, and Van Buren feared it would cause war. He also didn't want to add a new state to the Union that allowed slavery. People who wanted to annex Texas said it was the manifest destiny of the United States to spread from the Atlantic to the Pacific Ocean. ... Congress voted to annex Texas.

6 0
3 years ago
During which phase of the kill chain framework does an intruder extract or destroy data?
Rainbow [258]

The stage of the kill chain framework that an intruder extract or destroy data is: <u>The extraction stage.</u>

<h3>What is extraction stage?</h3>

The extraction stage can be defined as the stage where an unauthorized person gain access to a sensitive or confidential information and then destroy the data or information after extracting it.

On the other hand an intruder can be defined as a unauthorized person who gain access to store data.

Therefore The stage of the kill chain framework that an intruder extract or destroy data is: <u>The extraction stage.</u>

Learn more about  extraction stage here:brainly.com/question/20491126

#SPJ1

4 0
1 year ago
For which purpose would a visual model of a food chain be most useful? (1 point)
marusya05 [52]

Answer:

To s and the flow of matter and energy between organisms

6 0
2 years ago
Other questions:
  • People who suffer from a heart attack often have an increased ratio
    13·1 answer
  • James refuses to complete his homework and insists that he be given a candy immediately. james's father tells him that he would
    12·2 answers
  • What is the term for a group that is systematically mistreated or oppressed?
    12·2 answers
  • Air strikes against Iraq were in response to Iraq's refusal to cooperate with what
    13·1 answer
  • The fact that god gave moral revelation to the leaders of world religions throughout history signifies that he loves all of his
    14·1 answer
  • Which statement is NOT true?
    14·2 answers
  • Ashish is always coming up with new ideas and seeking funding to explore them. He sees opportunities in the marketplace and want
    9·1 answer
  • Can someone help me pleas
    6·1 answer
  • 1. Why did America and the Soviet Union have missiles prepared for attack?
    15·1 answer
  • What was the "Christmas Truce" ... AND... why do you think commanders opposed it?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!