1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zubka84 [21]
3 years ago
10

Who had the most power in a town meeting in colonial New England?

Social Studies
1 answer:
Vsevolod [243]3 years ago
7 0
I would say the male church members since they were the only ones allowed to vote on things.
You might be interested in
What action will an ids take upon detection of malicious traffic?
Zigmanuir [339]

<span>create a network alert and log the detection</span>

An intrusion detection system (IDS) is a device that can scan packets and compare them against a set of rules or attack signatures. If the packets match attack signatures, then the IDS should alert the network administrator and log the intrusion.

7 0
3 years ago
Which cyberspace operational task is to permanently, completely, and irreparably deny access to, or operation of, a targeted fun
LuckyWell [14K]

Traditional cyberspace operational task is to permanently, completely, and irreparably deny access to, or operation of, a targeted function for the foreseeable scope of the conflict.

Cyberspace, according to the Department of Defense, is the fictitious space in which digital information is transmitted over computer networks. The DOD's regular business operations in and through cyberspace are made up of its military, intelligence, and intelligence-related activities. Military operations in cyberspace employ cyberspace capabilities to produce effects that aid operations in both the physical and cyberspace domains. In order to carry out national security duties, cyberspace operations are carried out under the jurisdiction of the judicial branch. Traditional threats typically come from states using well-known military tactics and recognized military forces. Non-intelligence activities make up cyberspace OPE and serve as the foundation for subsequent operations.

More about cybersecurity brainly.com/question/26260220

#SPJ4

8 0
2 years ago
Which communication style is most typical of women?
svlad2 [7]
Hey You! 

Women typically use indirect speech.

6 0
3 years ago
Memories of a Memory
Ostrovityanka [42]

Answer:

i think its B

Explanation:

7 0
3 years ago
Read 2 more answers
What word best describes the choice Lee made in joining the south?
Troyanec [42]
The best word to describe him is Loyal
7 0
3 years ago
Other questions:
  • PLlLlLlLlLll HeLp AsAp plzzz help quickly im very sleepy
    15·2 answers
  • Mr. Matthews plans his lesson on amphibians for the next day. He plans on first identifying the key features of amphibians, answ
    14·1 answer
  • Why do some groups have an easier time overcoming collective action problems?
    15·1 answer
  • Swing voters tend to _______________ vote democratic and _______________ vote republican.
    14·1 answer
  • You come upon a person who has a flushed face and is claiming to hear noises that you cannot hear. the person initially is calm
    6·1 answer
  • Becky wants to buy a new cell phone. She asks her friends who are technologically savvy to recommend a good, lightweight phone t
    8·2 answers
  • What foods are staples in thailand? What is a popular dish?
    9·1 answer
  • Ancient cultures were much more likely than modern cultures to view dreams as __________.
    11·2 answers
  • How would NOT having slaves anymore affect the former ruling group?
    12·1 answer
  • if you were the minister of culture , what programmes would you bring to hight light Nepal sculpture in world community? write y
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!