1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
8

WILL GIVE BRAINLIEST AND 25 POINTS! And Hektor knew the truth inside his heart, and spoke aloud: . . . . "Let me at least not di

e without a struggle, inglorious, but do some big thing first, that men to come shall know of it.” –The Iliad of Homer, Richard Lattimore What ancient Greek belief does this passage most clearly reflect? A. the power of fate B. the gods’ influence on human events C. the value of heroic traits D. the importance of funeral rites
English
2 answers:
Alex777 [14]3 years ago
3 0
I would say C definitely
Dahasolnce [82]3 years ago
3 0

Answer:

i agree, i think it is c

Explanation:

You might be interested in
A summary of a text dose not include ——- form the text. (Dialogue, details, characters)
tresset_1 [31]

Answer:

Dialogue is not needed in a summary text

7 0
3 years ago
Read 2 more answers
Asset,slouched,unfathomable,savvy vocab
grigory [225]

Answer:

Wow this is going to get deleted

Explanation:

7 0
3 years ago
Read the passage.
kotegsom [21]
B- is the main idea I bieleve
5 0
3 years ago
Read 2 more answers
What part of speech is the italicized word in the sentence below?
Phoenix [80]

Is the word "that" the italicized word?


7 0
3 years ago
Read 2 more answers
Elizabeth is responsible for security policies. she is trying to implement sound end user security policies. what would be most
nadya68 [22]

Elizabeth should block end users from;

  • installing software and or
  • changing system configurations on their own machine.

<h3>Who are end users in computer science?</h3>

End users in computer science refers to the people who use Information Technology products in an organization.

<h3>What is a security policy in computer science?</h3>

The objectives and components of a company's computer systems are specified in its computer security policy.

Both extremely formal and casual definitions are acceptable. Organizational rules or security measures are used to enforce security regulations.

How a computer system is implemented technically determines whether it is secure or not.

Learn more about security policies:
brainly.com/question/4996925
#SPJ1

8 0
2 years ago
Other questions:
  • Which word implies a joyous occasion? A. doleful B. festooned C. profuse D. zealous
    9·1 answer
  • What event most clearly suggests a character getting a new opportunity or second chance ?
    14·1 answer
  • What happened during the Holocaust?
    10·1 answer
  • Each major political party in American is organized by
    8·2 answers
  • Please !!! Help me !!!<br><br>Exercise 5 and 6.​
    9·2 answers
  • I need a 5 sentances for each word of these:
    13·1 answer
  • Do you think that when Postmodern Jukebox changed the style of the song "MMMbop" to a 1950's Doo Whop song it made it less of an
    11·1 answer
  • in the passage what choice does the author make when describing the meeting of pip and miss havisham ​
    13·2 answers
  • Between Historical fiction and Biography, what type is about someones life but adds more characters?
    9·2 answers
  • Is it yes or no and why?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!