subject
English, 14.07.2019 20:30 lashaydews12

Read the passage. once upon a midnight dreary, while i pondered, weak and weary, over many a quaint and curious volume of forgotten lore— while i nodded, nearly napping, suddenly there came a tapping, as of some one gently rapping, rapping at my chamber door. “’tis some visitor,” i muttered, “tapping at my chamber door— only this, and nothing more.” in this excerpt from “the raven” by edgar allan poe, what is the speaker doing when he hears a knock at the door? a. reading b. pacing c. weeping d. sleeping

ansver
Answers: 2

Another question on English

question
English, 21.06.2019 21:10
What is the direct object in the following sentence? jerry asked him a question. a. question b. jerry c. asked
Answers: 2
question
English, 22.06.2019 06:30
La 11 sem1 l 3.3.5 quiz: diary of a pioneer woman question 3 of 5 2 points what did some of the indians the frinks encountered do? o a. show the frinks a way across the river o b. threaten to kidnap margaret o c. take the frinks to their homes o d. strip the frinks' wagon submit
Answers: 3
question
English, 22.06.2019 14:00
Write row to three sentences explaining o e way that ovid creates suspense in pyramus and thisbe. support your response with details from this poem
Answers: 1
question
English, 22.06.2019 15:50
Read the sample student paragraph that addresses a counterclaim. some claim that the internet both invades and compromises one’s right to privacy. however, this is ridiculous. the internet is only as invasive as one allows it to be, particularly since there are laws to protect people’s privacy. exercising caution when supplying personal information online is the most vital step in protecting one’s privacy. any information you do not feel comfortable sharing online should not be shared, and sensitive information should only be provided to trusted organizations. additionally, some states have already enacted privacy laws that model the federal privacy act of 1974, ensuring that information collected for one purpose may not be used—or sold—for other purposes without first notifying the individual to whom the data belongs. the first and most important protector of an individual’s information is that individual. people whose personal information is not properly protected only have themselves to blame. what evidence weakens the counterclaim in this paragraph? the internet is only as invasive as one allows it to be. exercising caution is the best way to protect one’s privacy online. some states have already enacted online privacy laws. it is the individual’s fault when personal information is unprotected.
Answers: 3
You know the right answer?
Read the passage. once upon a midnight dreary, while i pondered, weak and weary, over many a quain...
Questions
question
Mathematics, 22.09.2019 10:30
question
History, 22.09.2019 10:30
Questions on the website: 13722361