1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
11

Which epic characteristic is used in this excerpt from the Iliad by Homer?

English
2 answers:
AVprozaik [17]3 years ago
5 0

Answer: The answer is

A.  

epic simile

Explanation: I did it on plato and got it correct

Verizon [17]3 years ago
4 0
<span>#1) Which epic characteristic is used in this excerpt from the Iliad by Homer?

Answer: Out of all the options available the one that is used in this excerpt from the Iliad by Homer is an epic simile. The reason being that there is an simile used here: Great as thou art, and like a god in fight, Think not to rob me of a soldier's right.

<span>I hope it helps, Regards.</span></span>
You might be interested in
Before you leave for school, make sure to pack your textbook for Mr.Henson's math test. Choose the set of words that is an adver
Nikolay [14]
The answer is "Before you leave for school"
3 0
3 years ago
Should cameras be in the classroom
tekilochka [14]

Answer:

i would think yes

Explanation:

this way if a teacher harrases a student or the other wau around it can be caught on camera and used against them. on the other hand if ot were to be in a counciling office then no, they are meant for privacy so it wouldnt make others comfortable

5 0
3 years ago
Can someone please help me with this it’s urgent?
aksik [14]

Answer:

c

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following are correct
finlep [7]

Answer:

D to inform......

3 0
3 years ago
Read 2 more answers
Discuss cybersecurity in today's current situation​
ASHA 777 [7]

Answer:

<h3>Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. ... Application security focuses on keeping software and devices free of threats.</h3>
5 0
3 years ago
Read 2 more answers
Other questions:
  • After the announcer fumbles the bulletin and has to be replaced, Hazel says that he should still be given a raise because “he tr
    12·1 answer
  • in 'an inspector calls' what are all the characters like at the start of the play, after the inspectors questions and at the end
    8·1 answer
  • Write an essay in the form of a personal letter
    6·1 answer
  • Using the context clues in the following sentence, what would you
    13·1 answer
  • Which of these sentence contains a subordinate clause?
    15·1 answer
  • She ran across the grass like a cheetah chasing its prey Which kind of figurative language is used here? O A. Parallelism O B. T
    5·1 answer
  • It is important to grab the citation information for an article you are planning to use in support of your writing so that you c
    6·1 answer
  • Which BEST describes the way the author structures the analysis?
    11·1 answer
  • How could you describe Greta Thunbergs style
    13·1 answer
  • We should not let ourselves overlook the plight of the homeless.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!