subject
English, 23.06.2019 18:10 robert7248

Abigail: and mark this. let either of you breathe a word, or the edge of a word, about the other things, and i will come to you in the black of some terrible night and i will bring a pointy reckoning that will shudder you. and you know i can do it; i saw indians smash my dear parents' heads on the pillow next to mine and i have seen some reddish work done at night, and i can make you wish you had never seen the sun go down! why does abigail threaten the other girls? to stop them from exposing her as a liar to make them afraid of native americans to scare them into confessing to witchcraft to convince them to accuse tituba of witchcraft

ansver
Answers: 1

Other questions on the subject: English

image
English, 21.06.2019 16:40, screamqueen
The verb in the sentence is in what voice
Answers: 1
image
English, 22.06.2019 08:50, azinanees
Ased on the context of the passage, what is a bunburyist? a. someone who creates an imaginary person b. a guardian who neglects his responsibilities c. a person whose health changes with their location d. a friend with whom you can share secrets
Answers: 2
image
English, 22.06.2019 12:00, Arealbot
What evidence in "helen grey" supports the idea that helen grey is an unpleasant person?
Answers: 1
image
English, 22.06.2019 15:50, anikalee
Read the sample student paragraph that addresses a counterclaim. some claim that the internet both invades and compromises one’s right to privacy. however, this is ridiculous. the internet is only as invasive as one allows it to be, particularly since there are laws to protect people’s privacy. exercising caution when supplying personal information online is the most vital step in protecting one’s privacy. any information you do not feel comfortable sharing online should not be shared, and sensitive information should only be provided to trusted organizations. additionally, some states have already enacted privacy laws that model the federal privacy act of 1974, ensuring that information collected for one purpose may not be used—or sold—for other purposes without first notifying the individual to whom the data belongs. the first and most important protector of an individual’s information is that individual. people whose personal information is not properly protected only have themselves to blame. what evidence weakens the counterclaim in this paragraph? the internet is only as invasive as one allows it to be. exercising caution is the best way to protect one’s privacy online. some states have already enacted online privacy laws. it is the individual’s fault when personal information is unprotected.
Answers: 3
You know the right answer?
Abigail: and mark this. let either of you breathe a word, or the edge of a word, about the other th...

Questions in other subjects:

Konu
Biology, 05.05.2021 17:20
Konu
Computers and Technology, 05.05.2021 17:20
Konu
Mathematics, 05.05.2021 17:20