Device used for setting one story inside another a) dramatic monologue b) fabliau c) parable d) frame narrative

Answers

Answer 1
Answer:

Answer:

d) frame narrative

Explanation:

Answer 2
Answer:

Final answer:

A frame narrative is the literary device used for setting one story inside another, providing a broader context to the main story. It allows for different points of view, times, and places to be combined in a single narrative as seen in Mary Shelley's 'Frankenstein'.

Explanation:

In literature, the device used for setting one story inside another is the frame narrative. A frame narrative, or frame story, introduces the main plot and often sets the stage for the embedded story. This can be a useful tool for authors to provide a broader perspective or context for the main narrative.

For instance, in Mary Shelley's 'Frankenstein,' the frame narrative is presented through Captain Walton’s letters to his sister. Within his story, Victor Frankenstein tells his story, which in turn includes the creature's story. Through the use of the frame narrative, Shelley combines different points of view, times, and places to ultimately create a more intricate and rich narrative.

While the other options, such as dramatic monologue, fabliau, and parable are literary devices, they are not designed specifically for nesting one story within another as a frame narrative does.

Learn more about frame narrative here:

brainly.com/question/6506716

#SPJ11


Related Questions

What technology uses short-range radio signals to enable computers and devices to communicate with each other.
The computers in the administrative offices of the four schools throughout the district are networked to enable employees to access its files. Workers are able to query databases and update records efficiently as a result. The type of network most likely used by the workers is a _____. LAN MAN WAN
What is the name for PCs that receive services from server systems?a. Workstations c. IBM PCs b. Printer servers d. Clients
In the early days of photography, cameras were limited to professional photographers because of the knowledge needed to work the cameras and develop the images with various chemicals. true or false
What does the word spam mean?

When you select the Sort & Filter button, the options for sorting that you see depend on __________.A. the number of columns in the spreadsheet
B. the size of your worksheet
C. the type of data in the cell (alphabetic or numeric)
D. the number of rows currently selected

Answers

When you select the Sort & Filter button, the options for sorting that you see depend on the type of data in the cell (alphabetic or numeric). The correct option is c.

What is the Sort & Filter button?

Sorting and filtering are two methods for customizing the view of data in your spreadsheet. Because you can't do both at the same time, it's best to decide which option will benefit you the most ahead of time. Sorting allows you to arrange your data in ascending or descending order.

The filter tool allows you to isolate key components by filtering a column of data within a table. You can sort by date, number, alphabetic order, and other criteria using the sorting tool.

Therefore, the correct option is c. the type of data in the cell (alphabetic or numeric).

To learn more about Sort & Filter button, refer to the below link:

brainly.com/question/14363159

#SPJ2

HELP ASAP????? pleasea0 is a series of procedures that ensures a computer and its user are safe.

Answers

Answer:

Computer Security Protocol

Explanation:

A series of procedures that ensures a computer and its user are safe is a computer security protocol. A computer security protocol is a sequence of operations that is designed to ensure the protection of data. This is an important requirement for all computer users. Such a protocol ensures a secure delivery of data between two parties.

An malicious attempt to acquire sensitive data like usernames, passwords, and credit card information using email is called?a. Trojan
b. Virus
c. Phishing
d. Hopscotch

Answers

When someone wants to steal personal information like usernames, passwords, or even credit card information, that is called Phishing.

If you have four documents open and click the X button on the title bar, _____.a. only the current document will be closed
b. Word will close
c. all documents will be automatically saved
d. all documents will be closed, but Word will remain open

Answers

d. All documents will be closed but word will remain open

Describe how to manipulate artwork in a presentation.

Answers

Do you mean how to add clipart to a powerpoint ? If that's what you mean then open the powerpoint presentation you will add the clip art to. Click the "insert" tab and select clip art from the images group. A clip art pane will appear. Enter the keyword of the clip art you will insert in the search for field.

Create a flowchart that assigns a counselor to a student. You need to ask a student for the first letter of his/her last name. Assign a counselor based on the following criteria:• A through Mare assigned to Ms. Jones
• N through Z are assigned to Mr. Sanchez ​

Answers

Answer:

See attachment for flowchart

Explanation:

The explanation is as follows:

Start

Input first_letter (of student's name)

If first_letter is any of N through Z

     Assign student to Mr. Sanchez

Else

     Assign student to Ms. Jones

Print Counselor

Stop