1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
3 years ago
6

When the slaves first came to America from Africa, what happened to them?

Social Studies
1 answer:
Evgen [1.6K]3 years ago
8 0

Answer:

it's C) They were sold at auctions, like animals.

Explanation:

Because before that had owner they had to be bought off and before they became free that had to escape from their owners.

You might be interested in
Is there a limit on your streak for brainly? I checked in yesterday for day 7, then it became day 1 today
cestrela7 [59]

Answer:

umm, no, im currently on my 29 day streak

Explanation:

no limit

4 0
3 years ago
What was nepal called in olden times​
Usimov [2.4K]

Answer:

Experts are of the opinion that some or all of the inhabitants of Nepal in the ancient period were likely called 'Nepals', which meant that the word 'Nepal' was used to refer to both the land and its population. These Nepals are considered the progenitors of modern-day Newars.

8 0
3 years ago
Why does the language approved in both the house and senate have to be the same?
d1i1m1o1n [39]

Answer:

SO both can work together and communicate effectively

Explanation:

mark me brainiest

3 0
2 years ago
Franchesca read about Mrazek et al.'s study in which students scored higher on the GRE after completing a 2-week mindfulness tra
il63 [147K]

Answer:

The peer-review process

Explanation:

The peer-review process, also known as refereeing deals with the subjection of the scholarly work of an author, ideas or research to evaluation and scrutiny by some group of experts in the same field, before the paper is then submitted for publication in a journal, as a book, or conference proceedings. This is the same example as stated in the scenario portrayed in the question, and it is a necessary step to get your work published.

7 0
3 years ago
The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central m
satela [25.4K]

host agent module

All processes, modules, and libraries that are packaged with the host agent fall under its border. The Host Agent can, but is not necessary to, run on the platform as a daemon or service. Although having a local or remote Graphical Interface (GUI) for management is not anticipated for the Host Agent, this PP-Module does not forbid it. It is anticipated that the linked ESM server or the underpinning platform would administer the host agents. The communication path with other Host Agents, a Smtp server, or a public cloud is included in the TOE border. A host agent assessment does not cover the platform operating system or execution environment in which the host agent is running.

To know more about Host Agent refer to brainly.com/question/20556615

#SPJ4

5 0
2 years ago
Other questions:
  • Which of the following is a true statement about seats in the House of Representatives?
    14·2 answers
  • True or false: your vehicle will not be impounded or immobilized if a dui conviction is your first.
    12·2 answers
  • Which best describes why some people such as James Madison thought that the Bill of Rights was unnecessary?
    5·2 answers
  • 1. Describe three ways in which work influences lifestyle?
    7·1 answer
  • Please need help on this one
    11·1 answer
  • What are the fifty states and capitals?
    13·1 answer
  • Fiona has very vivid memories of a car accident she witnessed 3 years ago. If she closes her eyes and thinks about it, she feels
    7·1 answer
  • HYV seeds are associated with which research technology?​
    10·1 answer
  • Meslin argues that most people do care and want to become involved. Do you agree or disagree with him?
    13·1 answer
  • Which level of classified information could cause damage to national security if compromised
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!