1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
11

Who led the American revolutionaries to victory at Kettle Creek?

Social Studies
1 answer:
TiliK225 [7]3 years ago
3 0

b hope it helps dude


You might be interested in
HELP I WILL GIVE BRAINLEST IF YOU GIVE CORRECT ANSWER
Gennadij [26K]

Answer:

5. b, c, d

6. federal

7. state

8. federal

9. they might want to stop using the electoral college because its "undemocratic". saying that it permits the election of a candidate who does not win the most votes. Its a winner-takes-all approach canceling the votes of the losing candidates in each state.

6 0
3 years ago
Which of the following activities below best describe "community involvement"t? a. Volunteering at a local homeless shelter b. C
Zolol [24]
<span>a. Volunteering at a local homeless shelter

Helping the homeless people in the community is already an activity under "community involvement."


</span>
3 0
3 years ago
Read 2 more answers
What did it mean to say that the people’s natural rights are “inalienable”?
Verizon [17]

Answer:

"Inalienable" means it cannot be taken away

Explanation:

peoples natural rights cannot be taken away it is theirs to keep

3 0
3 years ago
During which phase of the kill chain framework does an intruder extract or destroy data?
Rainbow [258]

The stage of the kill chain framework that an intruder extract or destroy data is: <u>The extraction stage.</u>

<h3>What is extraction stage?</h3>

The extraction stage can be defined as the stage where an unauthorized person gain access to a sensitive or confidential information and then destroy the data or information after extracting it.

On the other hand an intruder can be defined as a unauthorized person who gain access to store data.

Therefore The stage of the kill chain framework that an intruder extract or destroy data is: <u>The extraction stage.</u>

Learn more about  extraction stage here:brainly.com/question/20491126

#SPJ1

4 0
1 year ago
What were king george the thirds views on aboriginal peoples​
lapo4ka [179]

Answer:

What are the three goals of the Proclamation of 1763? Settlers were not to go west of the appalachian mountains. further purchases from indians of land to the east of that line were prohibited. the indian territories west of the proclamation line would be underthe authority of the military.

Explanation:

i am right

3 0
3 years ago
Other questions:
  • The earliest community service program was set up in which state?
    9·2 answers
  • Brian grazer​ found, good communication makes organizations successful. communication is​ powerful: no group or organization can
    9·1 answer
  • Baseball is a popular sport in various Latin American and Caribbean nations. Which country produces more Major League baseball p
    10·2 answers
  • 4 How were the Crusades connected to European voyages of exploration? A They spurred a European desire for Asian goods. B They l
    14·1 answer
  • How does financial resources affect the development of a country​
    15·1 answer
  • Fill in the blank. Remember to spell correctly.
    14·2 answers
  • Why was Executive Order 9981 issued in 1948?
    5·1 answer
  • Miranda's grades have slowly been getting worse this school year. While she passes all her classes at the end of the year, her p
    12·1 answer
  • A(n) _____ overrides other statuses and forms an important part of a person's social identity
    8·1 answer
  • The median age of first time marriage in the u.s. is now _____ for men and _____ for women.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!