subject
Social Studies, 05.01.2021 16:10 jordanbyrd33

The enemy advanced and fired very hotly on the fort, and meeting with a warm reception, there was a very smart firing on both sides. After a considerable time, finding our ammunition was almost spent (gone), I commanded a cessation1 till the enemy advanced within thirty yards, when we gave them such a hot fire that they were obliged2 to retire3 nearly one hundred and fifty yards before they could rally and come up again to the attack. Our ammunition being nearly exhausted4, could keep up only a scattering fire. The enemy, being numerous, surrounded our little fort, began to mount5 our lines and enter the fort with their bayonets. We was obliged to retreat through them, while they kept up as hot a fire as it was possible for them to make. We, having very few bayonets (knives attached to the end of a soldier’s rifle), could make no resistance.” Based on Source 5, what does General Prescott’s letter prove about the battle at bunker hill?

A. The Patriots were easily defeated by the British.

B. The British were forced to retreat because of heavy losses suffered.

C. The Patriots were able to defend themselves despite lack of ammunition.

D. The British were outnumbered by the Patriots.

ansver
Answers: 3

Another question on Social Studies

question
Social Studies, 21.06.2019 19:00
How has the immigration of the 1990s affected the social and economic life of the united states?
Answers: 2
question
Social Studies, 22.06.2019 11:30
Which of the following methods could be considered a "best practice" in terms of informing respondents how their answers to an on-line survey about personal information will be protected? respondents are informed that investigators will try to keep their participation confidential; however, confidentiality cannot be assured.respondents are informed that a research assistant will transfer all the research data to a password-protected computer that is not connected to the internet, via a usb flashdrive. the computer is located in a research team member's office.the investigator uses the informed consent process to explain her institution's method for guaranteeing absolute confidentiality of research data.the investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents' ip addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed.the investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents' ip addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed
Answers: 2
question
Social Studies, 23.06.2019 05:30
Why would business leaders favor laissez faire capitalism and social darwinism
Answers: 2
question
Social Studies, 23.06.2019 09:30
Oil is a renewable resource can be used directly from the ground is the least polluting energy source must be removed from the earth using drills
Answers: 3
You know the right answer?
The enemy advanced and fired very hotly on the fort, and meeting with a warm reception, there was a...
Questions
question
History, 01.04.2021 07:10
question
Biology, 01.04.2021 07:10
question
Mathematics, 01.04.2021 07:10
Questions on the website: 13722363