subject
English, 09.10.2019 15:30 alyssacruz999

i had already known what to expect once we got there since i had read nathan
connor's book, exploring the mines several times growing up. in his book, he
compares the underground mines to a massive cave, waiting to be explored (connor
45). i must say, with my first visit to the coalmines, that's exactly the feeling i got as
the mine elevator slowly took us down into the dark, cool underground maze. i can
still remenfiber squinting to try to adjust to the darkness, and even feeling a little
scared inside as we went down that first time.

ansver
Answers: 2

Other questions on the subject: English

image
English, 21.06.2019 23:00, alina1939
Which literary device has emily dickinson used in these lines? how dreary to be somebody! how public, like a frog to tell your name the livelong day to an admiring bog! metaphor alliteration simile allusion
Answers: 1
image
English, 22.06.2019 03:00, adorsey846
Hey guys..what is the meanings of these word : 1 mazdoori2 rozznamccheplz answer fast
Answers: 2
image
English, 22.06.2019 12:30, Anabel818
Which line is an example of perfect iambic pentameter? a. "i have been worth the whistle." b. "whose reverence even the head-lugg'd bear would lick," c. "a man, a prince, by him so benefited! " d. "ere they have done their mischief. where's thy drum? " e. "marry, your manhood, mew! "
Answers: 3
image
English, 22.06.2019 15:50, raiindrxp
Read the sample student paragraph that addresses a counterclaim. some claim that the internet both invades and compromises one’s right to privacy. however, this is ridiculous. the internet is only as invasive as one allows it to be, particularly since there are laws to protect people’s privacy. exercising caution when supplying personal information online is the most vital step in protecting one’s privacy. any information you do not feel comfortable sharing online should not be shared, and sensitive information should only be provided to trusted organizations. additionally, some states have already enacted privacy laws that model the federal privacy act of 1974, ensuring that information collected for one purpose may not be used—or sold—for other purposes without first notifying the individual to whom the data belongs. the first and most important protector of an individual’s information is that individual. people whose personal information is not properly protected only have themselves to blame. what evidence weakens the counterclaim in this paragraph? the internet is only as invasive as one allows it to be. exercising caution is the best way to protect one’s privacy online. some states have already enacted online privacy laws. it is the individual’s fault when personal information is unprotected.
Answers: 2
You know the right answer?
i had already known what to expect once we got there since i had read nathan
connor's book, ex...

Questions in other subjects: