1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WITCHER [35]
3 years ago
13

What type of figurative language does this sentence contain "the cheerful lion set under the cactus tree and practice growling s

o he could impress his friends: Grr-agh, Grr-agh, Grr-agh."
A. Idiom
b. Hyperbole
c. Simile
d. Personification
English
1 answer:
inna [77]3 years ago
7 0
It’s Personification .
You might be interested in
Are angels male or female?<br> When did God create the angels
asambeis [7]

Answer

Most references in the bible describes them as male

Explanation:

6 0
4 years ago
8. We have had a lot more experience than<br> (they, them)
marishachu [46]

Answer:

them I think

Explanation:

hope this helps you

7 0
3 years ago
you should ask all of the following questions as you listen to a speaker except. a. what is this speech about? b. what is the pu
Alinara [238K]
E. you should definitely ask all these if your a listener of a spaeker
 <span />
6 0
3 years ago
Read the following: Two friends are walking down a road after a rainstorm. One friend trips and falls in a mud puddle. The other
fgiga [73]
It is verbal irony where one says the opposite of what they mean hence sounding sarcastic.
8 0
3 years ago
1. A requested task is subject to be reported when:
pantera1 [17]

Answer:

When it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, etc.

Explanation:

There are various tasks such as captcha authentication, surveys, article writing, product marketing, categorizing images, etc., that can be completed over the internet or websites by outsourcing it to third-party services or individuals.

Basically, this task are posted online or made available to specific experts (workers) who are saddled with the responsibility of completing the task at a specified period of time and for a particular fee depending on the arrangement between both parties.

However, a requested task is subject to be reported when it ask for workers' financial or personal information such as password, social security number, credit card details, one-time-password (OTP) code, date of birth, etc.

Generally, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

3 0
3 years ago
Other questions:
  • How does the Pygmalion myth end?
    13·1 answer
  • What error in parallelism is made in the following sentence?
    6·2 answers
  • Common Lit The last generation
    10·1 answer
  • What is your favourite sport? Why? Use comparatives and superlatives.
    8·1 answer
  • Who was named as the general of the continental army
    8·1 answer
  • Everybody! Help me to writing a story with 1000 words see the instructions
    12·1 answer
  • What is the term for a three-leaf clover? *
    12·2 answers
  • Write a essay about my dream house​
    7·1 answer
  • i really really really need help with this! please, please help! just answer the question, and the best answer gets brainliest.
    7·1 answer
  • 1. In one of the opening scenes, we see Amir and Hassan returning home from a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!