subject
English, 04.07.2019 23:30 erinleyanne

Identify the word in all caps in each of the following questions. 1. seeds for the trojan war were sown at the wedding feast of peleus. a) subject b) predicate c) compound subject 2. the angry goddess eris sent a golden apple inscribed "for the most beautiful." a) subject b) predicate c) compound subject 3. paris awarded the apple to the goddess aphrodite. a) subject b) predicate c) compound subject 4. menelaus and his brother assembled an army to fight troy, paris's home. a) subject b) predicate c) compound subject

ansver
Answers: 1

Another question on English

question
English, 21.06.2019 17:00
How can the passage best be revised to eliminate logical fallacies and improve clarity
Answers: 1
question
English, 22.06.2019 00:30
Outline (1) (2) i. (3) a. (4) 1. (5) 2. 3. choose the best answer from the choices below to match with (3) from the outline above. a. detail b. introduction c. subpoint 1 d. main point 1 select the best answer from the choices provided a b c d
Answers: 3
question
English, 22.06.2019 06:00
The following question asks about one or more selections from your literature textbook. you may use your textbook to answer this question. both “lob’s girl” and “jeremiah’s song” contain flashbacks. in a paragraph, explain what this plot technique adds to the stories. support your answer with one detail from each story.
Answers: 3
question
English, 22.06.2019 15:50
Read the sample student paragraph that addresses a counterclaim. some claim that the internet both invades and compromises one’s right to privacy. however, this is ridiculous. the internet is only as invasive as one allows it to be, particularly since there are laws to protect people’s privacy. exercising caution when supplying personal information online is the most vital step in protecting one’s privacy. any information you do not feel comfortable sharing online should not be shared, and sensitive information should only be provided to trusted organizations. additionally, some states have already enacted privacy laws that model the federal privacy act of 1974, ensuring that information collected for one purpose may not be used—or sold—for other purposes without first notifying the individual to whom the data belongs. the first and most important protector of an individual’s information is that individual. people whose personal information is not properly protected only have themselves to blame. what evidence weakens the counterclaim in this paragraph? the internet is only as invasive as one allows it to be. exercising caution is the best way to protect one’s privacy online. some states have already enacted online privacy laws. it is the individual’s fault when personal information is unprotected.
Answers: 3
You know the right answer?
Identify the word in all caps in each of the following questions. 1. seeds for the trojan war were s...
Questions
question
Mathematics, 17.12.2020 04:50
question
Mathematics, 17.12.2020 04:50
question
Mathematics, 17.12.2020 04:50
question
Mathematics, 17.12.2020 04:50
question
Mathematics, 17.12.2020 04:50
question
Mathematics, 17.12.2020 04:50
Questions on the website: 13722362