1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sauron [17]
3 years ago
15

The English (or Shakespearean) sonnet form includes three quatrains and a couplet two quatrains and a couplet two quatrains and

two couplets an octave and a sestet
Computers and Technology
1 answer:
san4es73 [151]3 years ago
4 0
<span>Three quatrains and a couplet</span>
You might be interested in
In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North Amer
Virty [35]

Answer: The Boston Tea party was when American colonists dumped tea into the Boston Harbor because they were mad at the British for taxing their tea.

Explanation: This started the Revolutionary War because it was the first big act of wanting a revolution from the American colonists.

4 0
2 years ago
Which button will allow you to insert quotes and notes into text into a document​
oksano4ka [1.4K]

Answer:

You copy and paste it

Explanation:

right click on the mouse then it will say copy, you right click on the mouse and click paste voila! it works! (If you're using word there are 3 options for pasting, Keep source formatting, Merge formatting and keep text only)

8 0
3 years ago
What term describes what an actor breaks when he addresses the audience directly from stage, like in Hamlet’s “to be or not to b
Dmitriy789 [7]
Breaking of the third wall.
if you were to be an actor on a stage and directly ask the audience a question, or making a statement that you as a character acknowledge that the character knows it is a play.
5 0
3 years ago
Read 2 more answers
4. Who developed the first design technology program which had a
HACTEHA [7]

Answer:

Macintosh.

Explanation:

Macintosh refers to a set of computers designed, developed and manufactured by Apple Inc. Apple officially began the sales of Macintosh on the 24th of January, 1984. The first designs of Macintosh are considered to be personal computers and had a mouse, in-built screen with a graphical user interface (GUI).

Macintosh developed the first design technology program which had a mouse and allowed for photo manipulation. This technology or software program used for photo manipulation is known as MacPaint, it was a raster graphics editor which was originally coded by Bill Atkinson using a Pascal programming language while its graphical user interface was designed by Susan Kare.

5 0
3 years ago
The___ allows you quickly access features such as formatting, charting, tables, and totals
cricket20 [7]

Answer:

Quick Analysis toolbar

Explanation:

it appears with the options formatting, chart, total, table, sparklines

7 0
3 years ago
Other questions:
  • A custom date format set for a date/time field that contains the symbols mmm/dd/yy would display the date as ____.
    12·1 answer
  • Presentation software allows business professionals to _____.
    14·2 answers
  • If I put a short clip from a copyrighted video to Facebook and make it only viewable to friends, is that illegal?
    12·1 answer
  • Any parameter that receives a value and also sends a value outside the function must be declared as a reference parameter.
    8·1 answer
  • For your new sporting goods store, you originally planned to only sell Nike shoes. Therefore, you only had enough shoe displays
    11·2 answers
  • Describe an application or a situation in which it is not convenient to use a linked list to store the data of the application
    12·1 answer
  • Which online article citation is correctly formatted according to MLA standards?
    15·2 answers
  • 1. Which one of the following is true about screening interviews?
    7·1 answer
  • I think you have been doing a great job but you haven’t been signing many people up for our new service feature I want you to se
    8·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!