1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
3 years ago
6

3. Analyze Why does the writer include Freeman's

Social Studies
1 answer:
Maurinko [17]3 years ago
3 0

Answer:

Explain: the author includeds alexanders reaction to titus's death to show the ups and down of her challenge in becoming a free african american. the author does this to show how it was not easy but she was still able to push through it. for example in the text he states "and it was then you nearly gave up the gamble". which shows alexander almost lost faith throughout her journey. referring to "gamble" as her future. in the beginning of the text she says she likes gambling because it makes her feel as if her future had something bright in it that couldnt be stopped or taken away by white people.

You might be interested in
(PLS HELP ASAP)Which of the following describes a political lobby?
Inga [223]

Answer:

C

Explanation:

Political lobbies are individuals or more usually by lobby groups trying to influence decisions made by elected officials to support the lobbies cause.

8 0
2 years ago
.
mihalych1998 [28]

the plants in the garden hung upside-down from the roof

3 0
2 years ago
Read 2 more answers
Defination of the NBT
Masja [62]

Answer:

not too bad

Explanation:

hope this helps

8 0
2 years ago
Read 2 more answers
What is a significant characteristic of virus malware? Once installed on a host system, a virus will automatically propagate its
Aleksandr [31]

Answer: A virus is triggered by an event on the host system.

Explanation: Virus malware is the defined as the malicious software that carries a virus like Trojan, etc.This is the event that takes place in the operating system as malware infection to steal the confidential data or attacking the system.

The virus gets invoked through some activity occurring in the host of the system.The virus can spread in the system if the malware program is executed.Thus, the source for the virus triggering is from the host.

5 0
3 years ago
How are the danes tortured for 12 years? a they are at war with the geats. b the warriors are not able to use their weapons agai
Rudik [331]
Grendel continues killing each night keeping them out of the hall.
7 0
3 years ago
Read 2 more answers
Other questions:
  • What are Japan’s islands made of
    7·1 answer
  • Kamitani and tong's "orientation decoder" was able to correctly predict what orientation a person was looking at on ____% of the
    15·1 answer
  • Which president had to retake the oath of office?
    9·2 answers
  • A criminal released from prison struggles to remain law-abiding, but feels oddly disoriented and at loose ends in his new free l
    8·1 answer
  • Which of the following was the only case in which the Supreme Court ruled in favor of the students and not the school?
    6·1 answer
  • Part of the inventory of memory chips of a semiconductor company is obsolete because of the launch of more advanced products. Ho
    5·1 answer
  • *i do need this in 25 minutes!!*
    14·1 answer
  • What are the problems of land locked countries​
    5·2 answers
  • Five social reformers from Rajasthan​
    15·1 answer
  • Differences between two samples are more likely to be statistically significant if the samples are _____ and the standard deviat
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!