1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
12

U GUYS I RLLY NEED THIS SHII CAN U EXPLAIN IT IF U CAN DO IT LET ME KNOW AND ILL GIVE 100 PTS

Advanced Placement (AP)
1 answer:
ArbitrLikvidat [17]3 years ago
7 0
He’s basically explaining that he’s confused because of how attractive Juliet is , he compares her to things that he defines as beauty , he’s describing how she looks , he’s gazing at her actions , I may be wrong but that’s how I perceive it :))
You might be interested in
Please answer!!!! How is Iran an example of a battle for national identity?
storchak [24]
Https://foreignpolicy.com/2015/10/05/irans-identity-crisis/
3 0
3 years ago
During the manic phase of a bipolar disorder, individuals are most likely to experience:
sattari [20]

Answer:

i beileve B

Explanation:

im reallyyyy sorry if this is wrong i tried my best hope this helps :))

5 0
2 years ago
How is tone in poetry defined?
Mnenie [13.5K]

Answer:

OB.

Explanation:

Tone is the writer or speaker's attitude toward the subject.

A. is theme

C. is syntax

D. is diction

6 0
3 years ago
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are
Elena-2011 [213]

Answer: a. Unauthorized individuals can use data mining and other techniques to guess a user’s password.

Explanation:

In a case whereby a weak password is used, devices and information can be susceptible to unauthorized access as the unauthorized individuals can use data mining and every other methods in order to guess the user's password.

Data mining has to do with finding patterns and anomalies, within large data sets in order to forecast outcomes. Once, the password of the user has been gotten, this can be used for either fraudulent activities or every other thing that the hacker intends to do.

6 0
3 years ago
8. Which of these helps you understand what people are saying to you?
Serga [27]
You are confusing me
be more specific
like actually adding options
8 0
3 years ago
Other questions:
  • From "My Parents Were Deported" by Diane Guerrero (Copyright © Diane Guerrero, 2014). Reprinted by kind permission of the author
    13·1 answer
  • What is 2 out of 7 in a fraction
    5·2 answers
  • Which of the following is considered information? a. A single keystroke b. All the characters on a keyboard c. An individual tes
    7·1 answer
  • Which of the following is not an example of homeostasis?
    14·1 answer
  • Over the past five hundred years, how many species are known to have gone extinct?
    10·1 answer
  • Refer to the passage.
    8·2 answers
  • Wyd????????????????????? :)
    14·2 answers
  • I’m asking no question just to get involved in nothing
    12·2 answers
  • Aristotle believed that the Earth is
    11·1 answer
  • How is everyone's day
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!