1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
3 years ago
10

WILL MARK BRAINLEST

English
2 answers:
rewona [7]3 years ago
8 0

Answer:"North Korea is using her diary, not to teach how Anne suffered at the hands of the German Nazis, but to warn the students

how they could suffer at the hands of those they call 'American Nazis.'

Explanation: Took the test and got it right.

ziro4ka [17]3 years ago
6 0

Answer:

will get started and dm

Explanation:

You might be interested in
Which of the following transitional words is LEAST likely to be used in an essay that uses the cause and effect organizing princ
Reil [10]
The woed least likely to be used is 'Hence'
5 0
4 years ago
Which sentence shows correct use of parallelism?
irinina [24]

Answer:

• James likes reading, writing, and watching movies.

Explanation:

3 0
2 years ago
What event is foreshadowed by Macbeth's aside in this scene?
stellarik [79]
The answer is the king's murder
5 0
3 years ago
Differentiate between cyberbullying,cyber wellness and cyber cyber safety​
soldier1979 [14.2K]
Cyberbullying is done with the use of the internet or texting, which can be done in-person or not. Non-cyberbullying is done without the use of the internet or texting and can also be done in-person or not. Either can involve speaking directly to the victim or targeting him/her through others. It’s essentially a more technological way of doing what some have been doing for decades. Instead of targeting him/her verbally or on paper, the perpetrator does it with a computer or phone. Instead of getting a rumor going throughout the school that so-and-so said/did such-and-such, the perpetrator posts it online or sends it by phone, whether under his/her own name or through a fake page under the victim’s name.
4.8K viewsView upvotes

1




Related Questions (More Answers Below)
6 0
3 years ago
Which of the following is an example of a well-developed thesis statement?
Crazy boy [7]

Answer:

C: Dogs are better pets than cats because canine companions are more reliable, friendly, and sociable than feline companions.

:))

6 0
3 years ago
Read 2 more answers
Other questions:
  • Thus my optimism is grounded in two worlds, myself and what is about me When we wrestle with evil, we feel its chilling effect o
    10·1 answer
  • ead the excerpt from The Canterbury Tales. "To start with, I declare where I’ve come from, And then produce my certificates, one
    5·2 answers
  • I'll give the most <br>Pleating on already ​
    11·2 answers
  • Martha Washington's statements in "excerpt from Incident at Valley
    7·1 answer
  • Using the information in the table, write definitions for the following words. Then, write one sentence that correctly uses two
    11·2 answers
  • WILL MARK AS BRAINLIEST. PLS HELP
    13·1 answer
  • Relationship between Doro and Anyanwu
    13·1 answer
  • Adam doesn't believe fred's spell worked because
    5·2 answers
  • Read this assignment. What is an effective hook for this assignment? Abc Write an announcement encouraging students to participa
    6·2 answers
  • Does Anyone Have an essay that they need to be done?<br> I will do them!
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!