1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zarrin [17]
4 years ago
14

What did you predict will happen? Check all that apply. The lioness will attack Thisbe. Thisbe will stay hidden in the cave to a

void the lioness. The lioness will find Thisbe, but Thisbe will fight the lioness and save herself. The lioness will find Thisbe, but someone will rescue her from harm.
Computers and Technology
2 answers:
wlad13 [49]4 years ago
8 0

Answer:

The lioness will attack Thisbe.

Explanation:

In Ovid's Metamorphoses the lioness discovers Thisbe and tries to attack her but fails. Thisbe is able to flee without being hurt but she drops her veil. When Pyramus arrives and sees the lioness's bloody jaws and Thisbe's veil, he thinks that it killed Thisbe. Then Pyramus commits kills himself with his own sword and when Thisbe returns, she finds him dead and also kills herself.

sesenic [268]4 years ago
5 0

Hi,


Everything applies. It is impossible to predict based on the current data. All scenarios are possible with equal possibility.


Hope this helps.

r3t40

You might be interested in
Which of the following works did mozart NOT write? A.the surprise symphony B. the magic flute C. eine kleine nachtmusik
alina1380 [7]

Answer:

The suprise Symphony

4 0
3 years ago
Read 2 more answers
Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
iren [92.7K]

Answer:

De-identification or data anonymization.

Explanation:

Privacy rights are fundamental right of individuals to privatise all personal information, when creating an account.

The de-identification and data anonymization technology is provided by the organisation to user, to prevent their information to be viewed by others. It commonly used in cloud computing, communication, internet, multimedia etc. Reidentification is the reversing of the de-identification effect on personal data.

4 0
4 years ago
The undo function allows the user to cancel up to _____ previous typing actions
valina [46]
It can cancel up to 40 times.
4 0
4 years ago
Read 2 more answers
Which type of software is primarily used to organize a collection of information for easy access?
lukranit [14]

Answer:

option B database management software

mark as brainliest answer

8 0
4 years ago
Readability is the level of vocabulary used on the page. True or false
konstantin123 [22]

Answer:

FALSE....john has no idea what hes talking about. i knew this was false yet i looked it up and got it wrong anyway because of john its freaking false

Explanation:

8 0
3 years ago
Other questions:
  • Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
    13·1 answer
  • An array created during the execution of a program is called a(n) ____ array.
    11·1 answer
  • Java languageThe cost to ship a package is a flat fee of 75 cents plus 25 cents per pound.1. Declare a constant named CENTS_PER_
    5·2 answers
  • Websites often request information about you. You have a choice as to whether or not you provide this to them. What aspect of PA
    12·1 answer
  • Common types of possessed objects are smart cards, rfid-encoded badges, magnetic cards, ____, and smartphones that are swiped th
    7·1 answer
  • What is built on integrated circuits and carries the electrical current? CPUs Data Software Transistors
    5·1 answer
  • Write a program that inputs a time from the console. The time should be in the format "HH:MM AM" or "HH:MM PM". Hours may be one
    6·1 answer
  • Retail products are identified by their Universal Product Codes (UPCs). The most commonform of a UPC has 12 decimal digits: The
    8·1 answer
  • A(n) ________ is a wonder of miniaturization combining a CPU, GPU, and sundry other support logic onto a single silicon die, sav
    9·1 answer
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!