1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
3 years ago
5

Her sharp claws had torn some offending hand. Is some a pronoun?

English
1 answer:
g100num [7]3 years ago
7 0

Answer:

No

Explanation:

Some is usually a pronoun but here it is not acting as a pronoun.

You might be interested in
What does Macbeths use of paradox in the line 149-“ cannot be I’ll, cannot be good” -indicate about his frame of mind?
fredd [130]

Answer:

He is in a state of non belief. He cant get him mind together on what happened, what he did, or how things are playing out.

Explanation:

As happy prologues to the swelling act

Of the imperial theme. (to ROSS and ANGUS) I thank you, gentlemen.

(aside) This supernatural soliciting

<u>Cannot be ill, cannot be good.</u> If ill,

135Why hath it given me earnest of success,

Commencing in a truth? I am thane of Cawdor.

If good, why do I yield to that suggestion

Whose horrid image doth unfix my hair

And make my seated heart knock at my ribs,

140Against the use of nature? Present fears

Are less than horrible imaginings.

<h3><u>I just read this in class </u></h3><h2>If you need more help on this I will help you:)</h2><h2><em><u>:)Hope you enjoy this:)</u></em></h2>
4 0
2 years ago
Elizabeth is responsible for security policies. she is trying to implement sound end user security policies. what would be most
nadya68 [22]

Elizabeth should block end users from;

  • installing software and or
  • changing system configurations on their own machine.

<h3>Who are end users in computer science?</h3>

End users in computer science refers to the people who use Information Technology products in an organization.

<h3>What is a security policy in computer science?</h3>

The objectives and components of a company's computer systems are specified in its computer security policy.

Both extremely formal and casual definitions are acceptable. Organizational rules or security measures are used to enforce security regulations.

How a computer system is implemented technically determines whether it is secure or not.

Learn more about security policies:
brainly.com/question/4996925
#SPJ1

8 0
2 years ago
Respect your teacher make passive​
iVinArrow [24]

Answer:

yes we should respect our

teacher

3 0
2 years ago
Read 2 more answers
"Big bad bear" is an example of:
Lina20 [59]

Answer:

Alliteration

Explanation:

Alliteration is when several words next to each other start with the same letters. For example, big, bad and bear all start with b.

8 0
2 years ago
How does the change in rhythm in the fourth stanza of hunger contribute to the poems meaning
Andreyy89

Answer: it mimics the change from enjoying food to feeling ill

Explanation: just took it :)

5 0
3 years ago
Read 2 more answers
Other questions:
  • Helppp!!!!! 50 points !
    6·2 answers
  • Ten min grammar extra practice verb problems i need help pls​
    13·2 answers
  • 1. What can you tell about Beth's character from this story? Why was she dearly loved by family and friends
    14·1 answer
  • Can anyone think of a theme for the Giver book?
    15·1 answer
  • In what paragraphs, does the turning point occur?
    8·2 answers
  • Help again plz <br> I will give brainliest
    6·2 answers
  • 6.<br> How does the organization of this text help the reader understand the<br> argument?
    9·1 answer
  • HELPP ME AND PLEASE SHOW WORK 30 POINTS
    8·2 answers
  • Make a title about this short paragraph and write a statement that is your own opinion about this paragraph
    14·1 answer
  • According to the lecture, you should limit your speech to ____ to ____ main points.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!