subject
English, 28.05.2020 16:59 tiffanyjadeb

Help


Helllllllllllllllllllllllllllppppppppppppppppppppp

ansver
Answers: 1

Another question on English

question
English, 22.06.2019 07:00
What types of details should a draft of a research-based essay contain? check all that apply. paraphrased information information from questionable sources facts that relate to the topic quotations that illustrate ideas to convey plagiarized information
Answers: 3
question
English, 22.06.2019 13:30
Need asap how does black hawk’s rhetoric in this excerpt advance his viewpoint that his cultural experience has fueled in him great animosity for white men? the white men despise the indians, and drive them from their homes. but the indians are not deceitful. the white men speak bad of the indian, and look at him spitefully. but the indian does not tell lies; indians do not steal. a-he creates an extended metaphor to suggest he has a thorough understanding of white men. b-he uses alliteration to emphasize the morals and values of the indians. c-he employs personification to capture the confusion he feels when dealing with white men. d-he contrasts the image of white men driving indians from their homes with examples of the admirable conduct of indians.
Answers: 2
question
English, 22.06.2019 14:30
What do you think about alexis`s strategy of surfing the web and looking at self- books at the book store
Answers: 2
question
English, 22.06.2019 15:50
Read the sample student paragraph that addresses a counterclaim. some claim that the internet both invades and compromises one’s right to privacy. however, this is ridiculous. the internet is only as invasive as one allows it to be, particularly since there are laws to protect people’s privacy. exercising caution when supplying personal information online is the most vital step in protecting one’s privacy. any information you do not feel comfortable sharing online should not be shared, and sensitive information should only be provided to trusted organizations. additionally, some states have already enacted privacy laws that model the federal privacy act of 1974, ensuring that information collected for one purpose may not be used—or sold—for other purposes without first notifying the individual to whom the data belongs. the first and most important protector of an individual’s information is that individual. people whose personal information is not properly protected only have themselves to blame. what evidence weakens the counterclaim in this paragraph? the internet is only as invasive as one allows it to be. exercising caution is the best way to protect one’s privacy online. some states have already enacted online privacy laws. it is the individual’s fault when personal information is unprotected.
Answers: 2
You know the right answer?
Help
...
Questions
question
Mathematics, 01.02.2021 14:00
question
Physics, 01.02.2021 14:00
question
Mathematics, 01.02.2021 14:00
question
Mathematics, 01.02.2021 14:00
Questions on the website: 13722363