1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna1 [17]
3 years ago
9

They begin beating it with a hose to find out what it really means. How does the figurative language in this excerpt reveal Coll

ins’s message?
Computers and Technology
2 answers:
a_sh-v [17]3 years ago
5 0

Answer:

A  

Explanation:

andreev551 [17]3 years ago
3 0
Collin criticizes the way some readers try to understand a poem, <span>that readers should be patient and open minded when reading poems in order to see the meaning, not to over-analyze it. To go with the flow and focus on the poem itself, to get inside the poem and see what it means.</span>
You might be interested in
Sharon is a skilled professional who operates logging equipment.
Viktor [21]
Natural resource systems hope this helps

7 0
3 years ago
Read 2 more answers
Are Microsoft an Apple more secure from malicious action because of their closed-source approach?
omeli [17]

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

7 0
3 years ago
All of these (except the ______) go unnoticed by the computer
astra-53 [7]
VIRUS I SERIOUSLY DONT KNOW THOUGH

5 0
3 years ago
ASAP help me I dont have enough time
umka21 [38]

Answer:third stage of parent-infant attachment

Explanation:

7 0
1 year ago
Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
inna [77]

Answer:

The answer to the following question is "inspecting packets in isolation from their context".

Explanation:

Static Packet Filtering a technique for implementing security of the firewalls. In this process, it checks each packet against a group of commands if commands allow the type of packet then it is passed otherwise, it is dropped. It controls access to a network by analyzing the sending and receiving packets based on the IP addresses of the source and destination.

7 0
3 years ago
Other questions:
  • What is an enterprise system
    14·2 answers
  • Write a function listLengthOfAllWords which takes in an array of words (strings), and returns an array of numbers representing t
    14·1 answer
  • You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o
    8·2 answers
  • ________________ occur when a system produces incorrect, inconsistent, or duplicate data.
    6·2 answers
  • Frank develops a questionnaire for his study on Internet dating. One of his questions asks, "How do you feel about Internet dati
    14·2 answers
  • When can we feel electricity?? Tell me the volt
    15·1 answer
  • The process of combining rows and columns in a table is called _____.
    8·1 answer
  • Which of these is an advantage of having multiple layers in a drawing and enables you to make changes to one part of an image wi
    14·1 answer
  • A VALENTINE
    5·2 answers
  • When a ____________ file is opened, it appears full-screen, in slideshow mode, rather than in edit mode.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!