The Battle Of Britain - Weebly

The Battle Of Britain - Weebly

The Battle Of Britain Many Canadian pilots served in Britain's air force (RAF) and in the RCAF to provide crucial

air support for Britain, during the Battle of Britain. The Germans used blitz bombing tactics on British cities, during the summer of

1940. They were quick and effective but using an advanced radar system, the RAF fighter planes were able to shoot down German

aircrafts and keep control of Britain. By the end of the war, the RCAF was the 4th

biggest air force in the world. Royal Canadian Navy

Began the war with 13 vessels: 6 destroyers 3,500 personnel

At the end of the war the RCN was the third largest navy in the world.

373 fighting ships over 110,000 members, all of whom were volunteers

including 6,500 women who served in the Women's Royal Canadian Naval Services.

The main responsibility of the RCN was to escort of merchant ship convoys.

The first convoy sailed from Halifax on September 16, 1939 By mid-1942, the RCN, with support from the RCAF, was providing nearly half the convoy escorts, and afterwards carried out the main share of escort duty.

Approximately 2,000 members of the RCN died during the war, and 24 RCN vessels were sunk.

Canadian aircraft and ships, alone or in consort with other ships or aircraft, sank 50 U-boats.

Allied shipping sunk by U-Boat

Recently Viewed Presentations

  • La molecola dellacqua L'acqua  un liquido le cui

    La molecola dellacqua L'acqua un liquido le cui

    L'acqua risulta bluperché quando la luce del sole, che contiene tutti i colori, vi penetra, alcuni colori vengono assorbiti dalle sue molecole, in particolare esse assimilano maggiormente i colori arancione e rosso, quindi quando la luce arriva ai nostri occhi...
  • EFP Final Conference: Young Researchers Session on FLA

    EFP Final Conference: Young Researchers Session on FLA

    EFP Final Conference: Young Researcher's Session on FLA Related Research Vienna, 28 September 2012 SETTING PRIORITY R&D DIRECTIONS FOR THE STRATEGIC
  • Derivative of a Function - delriolong.org

    Derivative of a Function - delriolong.org

    Example 2: Applying the Alternate Definition. The result, ?′?=12? is the derivative at some point ?=?. We can now let ? be any number in the domain of ? (i.e., use ? in place of ?) at which the limit...
  • Diapositiva 1

    Diapositiva 1

    Berle y Means: La Sociedad anónima moderna y la propiedad privada (1932): Presentan cinco tipos de propiedades: Control mediante la propiedad casi completa. Control Mayoritario. Control Minoritario. Control mediante mecanismos legales (piramidal). Control por parte de la Dirección.
  • 莎劇賞析 之二:《奧賽羅》 Othello

    莎劇賞析 之二:《奧賽羅》 Othello

    III. The Story: 第五幕: Roderigo attacks Cassio from ambush. Cassio, however, wounds Roderigo and is himself stabbed in the legs by Iago lurking near by. Iago stabs the wounded Roderigo to death. Cassio is borne off. Othello hardens his heart...
  • Reflections: Progress made since 2018 CCM dialogue forum

    Reflections: Progress made since 2018 CCM dialogue forum

    short-term training and technical support in response to requests for capacity building or crises within CCMs; I,e CCM dialogue forums held annually, CCM Scorecards initiative in 2016, Structured, on-going financial and technical support designed to strengthen community sector and communications...
  • Advertising Appeals - California State University, Bakersfield

    Advertising Appeals - California State University, Bakersfield

    PROMOTION/IMC & ADVERTISING FRAMEWORKS ... and personal selling is the most effective tool. Print ads are also effective for conveying large amounts of information. Discussion/Team Activity: Consider recent purchases of routine and complex products. What promotion tool(s) were effective to...
  • Chapter 9

    Chapter 9

    Chapter 8 Objectives. Become familiar with the functions provided by operating systems, programming tools, database software, and transaction managers. Understand the role played by each software component in maintaining the integrity of a computer system and its data.