subject
English, 01.08.2021 14:00 richdakid26

10 Rewrite the following sentences as ind the brackets. 1 Rajesh loves the movie 2 (correct tags)​

ansver
Answers: 3

Another question on English

question
English, 22.06.2019 08:00
Which is these is an example of circular reasoning
Answers: 1
question
English, 22.06.2019 09:00
Lesson 10: crossing borders: unit test “borders” 1.what does the mother’s refusal to state her nationality as canadian or american signify? a)that she resents governmental interference with her life b)that she identifies with neither country c)that she comes from somewhere else d)that she is stubborn and proud 4.the author’s chosen visual images,sensory details, and dialogue all convey a particular feeling in “delfino ii: diez in the desert.” thus feeling is known as: a)tone b)mood c)pathos 5.compare and contrast the poem “mexicans begin jogging” and the story “delfino ii: diez in the desert.” a)both are written about similar themes (immigration), but the story has a more serious mood than the poem b)both focus on mexican immigrants, but the story has a lighter tone than the poem. c)both main characters are afraid: diez is afraid of being caught smuggling people over the border, and soto is afraid of being caught working illegally. d)the tone in both selections is similar, but the subject matter differs slightly. 15. the tone of the poem “ka’ba” versus the tone of the poem “harlem ii” might be described as a)grateful vs ungrateful b)certain vs doubtful c) hurtful vs defeated d)safe vs dangerous
Answers: 1
question
English, 22.06.2019 15:50
Read the sample student paragraph that addresses a counterclaim. some claim that the internet both invades and compromises one’s right to privacy. however, this is ridiculous. the internet is only as invasive as one allows it to be, particularly since there are laws to protect people’s privacy. exercising caution when supplying personal information online is the most vital step in protecting one’s privacy. any information you do not feel comfortable sharing online should not be shared, and sensitive information should only be provided to trusted organizations. additionally, some states have already enacted privacy laws that model the federal privacy act of 1974, ensuring that information collected for one purpose may not be used—or sold—for other purposes without first notifying the individual to whom the data belongs. the first and most important protector of an individual’s information is that individual. people whose personal information is not properly protected only have themselves to blame. what evidence weakens the counterclaim in this paragraph? the internet is only as invasive as one allows it to be. exercising caution is the best way to protect one’s privacy online. some states have already enacted online privacy laws. it is the individual’s fault when personal information is unprotected.
Answers: 3
question
English, 22.06.2019 16:00
What is paradoxical about thoreau’s observations of the night he spent in prison
Answers: 1
You know the right answer?
10 Rewrite the following sentences as ind the brackets. 1 Rajesh loves the movie 2 (correct tags)​...
Questions
question
Spanish, 02.12.2021 20:50
question
Physics, 02.12.2021 20:50
question
Arts, 02.12.2021 20:50
Questions on the website: 13722363