<span>1. Who is the protagonist of your novel or short story? Describe the protagonist.
The character's name is August Pullman. He lives in Manhatton, NY. He struggles with Treacher Collins' syndrome, and has been homeschooled his whole life. Now it is time for him to start 5th grade and he has been enrolled in a public school for the first time.
2. Provide a quotation from the text to support your answer.
"</span>I know I'm not an ordinary 10 year old kid. [...] I know ordinary kids don’t get stared at wherever they go." "My name is August, by the way. I won’t describe what I look like. Whatever you’re thinking, it’s probably worse" Next week I start fifth grade. Since I’ve never been to a real school before, I am pretty much totally and completely petrified."
<span>3. Who is the antagonist of your novel or short story? Describe the antagonist.
Julian. He is a passive aggressive bully, determined to make August's year horrible.
4. Provide a quotation from the text to support your answer. (Can't find this, sorry.)
5. Describe the main conflict in your novel or short story.
It revolves around August trying to get through his 5th grade year in public school.
6. Which of the four major types of conflict best describes the situation you described?
</span>Character v. Society, & Character v. Character.
August v. The School, and people's opinions of him, but also August v. Julian
The words that can be best used to describe academic writing are:
- Formal
- Impersonal
- Objective, etc.
<h3>What is an Academic Writing?</h3>
This refers to the type of text or writing that is intended for scholarly purposes and makes use of formal language.
The other answers are:
- Organized
- Unbiased language.
The equivalent of the informal words are:
- Cheap--> Inexpensive
- Kids--> Children
- Don't--> Do not
- Net--> Internet
Read more about academic writings here:
brainly.com/question/6187012
Answer:
technology in a way is beneficial, but in most ways causes more harm than good.
Explanation:
technology leads to cyber conflict and makes it easier for these perpetrators to hide their faces. unsuspecting users can be targeted ans personal information can be leaked by these hackers.
C. the ability to do something well without wasted time or effort