1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dezoksy [38]
3 years ago
15

HELP NOW PLEASE ASAP URGENT

English
2 answers:
Semenov [28]3 years ago
8 0

The answer is option 1, Down he dove into the dreary, dismal dungeon.

Have a nice day.

And please mark brainliest. <3

GenaCL600 [577]3 years ago
5 0

Hi the first option is correct!

Alliteration is a creative way of writing where all the words sound similar, but kind of flow together!


Hope this helps!

May I be brainliest!

Have a great day!



~Courtney

You might be interested in
As we float on the boat, we row to show our strength.<br><br> a alliteration<br> b assonance
nekit [7.7K]

Answer:

b. assonance

Explanation:

5 0
3 years ago
Read 2 more answers
Use context clues to identify the best definition of the word harrow as used in the passage from Hamlet.
Dmitriy789 [7]
To cause distress, the deffinition of harrow in this passage, hope i can help!
5 0
3 years ago
Read 2 more answers
1. A requested task is subject to be reported when:
pantera1 [17]

Answer:

When it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, etc.

Explanation:

There are various tasks such as captcha authentication, surveys, article writing, product marketing, categorizing images, etc., that can be completed over the internet or websites by outsourcing it to third-party services or individuals.

Basically, this task are posted online or made available to specific experts (workers) who are saddled with the responsibility of completing the task at a specified period of time and for a particular fee depending on the arrangement between both parties.

However, a requested task is subject to be reported when it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, date of birth, etc.

Generally, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

3 0
3 years ago
Why do prople say that when we judge others, we are really judging ourselves?
Contact [7]
Because people don't follow their own advice
7 0
3 years ago
Read 2 more answers
What group of women was initially targeted to join the labor force?
Jobisdone [24]
A young unmarried womenb\

8 0
3 years ago
Other questions:
  • How friends and peers affect teenager's sexuality
    15·1 answer
  • Which of the following was NOT a concern of the Transcendentalists?
    12·2 answers
  • Speeding, peeling out or weaving through traffic are all examples of?
    15·1 answer
  • Which example contains alliteration?
    9·2 answers
  • If you read a speech by an individual in a book of great speeches published 75 years later, what date for the primary source (th
    8·1 answer
  • Which example most clearly describes part of the rhetorical situation?
    5·2 answers
  • Use the following wosiels as different parts of the speech
    13·1 answer
  • How do you feel when you take your interview?
    15·2 answers
  • Imagine the technology and telecommunications in 2030 <br><br> What do you expect to happen?
    9·1 answer
  • What is Bruno banned from doing at Out-With?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!