write aemail to brother for laptop for vitrual classes​

Answers

Answer 1

Answer:

If I were to ask my brother for a laptop, I would go:

Hey, can I have your laptop? I need it for online classes.

Sincerely, [my name]

Answer 2
Dear brother, I really need a lab top for my online classes (explain why you don’t have one) i would really appreciate it :)

Sincerely,
Your bro/ Sis

Related Questions

server.
10. The Domain Name refers to the
a) Mail
b) Google
c) Internet
d) Local

Answers

Answer:

C.

Explanation:

Which of the following emergencies are weather-related? A. Ice storm B. Hurricane C. Earthquake D. A and B

Answers

Answer:

The answer is D. A and B

Explanation:

I think the answer is D because Ice storms are caused by freezing rain and Hurricanes are formed near the equator over warm ocean waters. both of them are weather-related.

Answer: The answer is D. A and B

Explanation: I took this test 5 mins ago and it was right.

describe at least five ways in which information technology can help studying subjects other than computing​

Answers

Answer:

I'd that IT can help in a great many different fields like

Mathematics, in a manner of solving complex math equations

Statistics, in a manner of creating complex graphs with millions of points

Modeling, in a manner of creating models from scratch, either for cars, personal projects or characters for video games and entertainment

Advertising, in a manner of using IT to create not only the advertisements themselves but also, spreading that advertisement to millions in a single click

Music/Audio, in a manner of creating new sounds and music that wouldn't be able to work in any practical manner

Explanation:

A Protocol for networked information​

Answers

Answer:

Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level; and. additional network protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each of which has defined sets of rules to exchange and display information.

Explanation:

could i plz have brainliest so close to next rank

answer 1 question and get 10 points in return

Answers

Answer:

3

Explanation:

sorry if I'm wrong...it's been a while since I took a coding class.

3 I think... hope this helps!

Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).

Answers

In python:

if 8 < user_grade < 13:

   print("in high school")

You would just need to supply the value of the user_grade variable.

4. Word Separator:Write a program that accepts as input a sentence in which all of thewords are run together but the first character of each word is uppercase. Convert the sentence to a string in which the words are separated by spaces and only the first word starts with an uppercase letter. For example the string “StopAndSmellTheRoses.” would be converted to “Stop and smell the roses.”
*python coding

Answers

sent = input("")

count = 0

new_sent = ""

for i in sent:

   if count == 0:

       new_sent += i

       count += 1

   else:

       if i.isupper():

           new_sent += " "+i.lower()

       else:

           new_sent += i

print(new_sent)

The above code works if the user enters the sentence.

def func(sentence):

   count = 0

   new_sent = ""

   for i in sentence:

       if count == 0:

           new_sent += i

           count += 1

       else:

           if i.isupper():

               new_sent += " " + i.lower()

           else:

               new_sent += i

   return new_sent

print(func("StopAndSmellTheRoses."))

The above code works if the sentence is entered via a function.

Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.

What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?

Answers

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

Which of the following server types is in the form of a single circuit board?
a. blade
b. tower
O c. rack
O d. dedicated
o

Answers

Answer:

A. Blade

Explanation:

Server Blade means a complete computer system on a single board which includes one or more CPUs, memory, operating system, network connections, and typically includes access to hard drives or other mass storage devices. A Server Blade is designed to be inserted into a space-saving rack, and each rack may contain a number of Server Blades served by one or more power supplies.

If this is multiple choice, a dedicated server can be too.

Write a program that creates an integer array with 40 elements in it. Use a for loop to assign values to each element of the array so that each element has a value that is triple its index. For example, the element with index 0 should have a value of 0, the element with index 1 should have a value of 3, the element with index 2 should have a value of 6, and so on.

Answers

Answer:

public class Main

{

public static void main(String[] args) {

 int[] numbers = new int[40];

 for (int i=0; i<40; i++){

     numbers[i] = i * 3;

 }

 for (int i=0; i<40; i++){

     System.out.println(numbers[i]);

 }

}

}

Explanation:

*The code is in Java.

Initialize an integer array with size 40

Create a for loop that iterates 40 times. Inside the loop, set the number at index i as i*3

i = 0, numbers[0] = 0 * 3 = 0

i = 1, numbers[1] = 1 * 3 = 3

i = 2, numbers[2] = 2 * 3 = 6

.

.

i = 39, numbers[39] = 39 * 3 = 117

Create another for loop that iterates 40 times and prints the values in the numbers array

What is the best prediction she could make about this
semester's text?
Natalia's class read Shakespeare's Romeo and Juliet
last semester and took a field trip to see it performed
live in a community theater. Today, Natalia learned that
her class will read another work by Shakespeare this
semester
It is a play.
It is an adventure.
It is a fairy tale.
It is a fable.

Answers

Answer:its a play

Explanation:

Answer:

A. It is a play

Explanation:

Got the answer correct on the quiz

Dance dance1 = new Dance("Tango","Hernandos Hideaway");
Dance dance2 = new Dance("Swing","Hound Dog");
System.out.println(dance1.toString());

System.out.println(dance2.toString());

class Dance
{
private String name;
private String song;

public Dance(String name, String s)
{
this.name = name;
song = s;
}

public String toString()
{
return name + " " + song;
}
}
What is printed when the program is executed?


a
null null

null null

b
Hernandos Hideaway null

Hound Dog null

c
null null

Swing Hound Dog

d
Tango Hernados Hideaway

Swing Hound Dog

e
null Hernandos Hideaway

null Hound Dog

Answers

Answer:

The output of the program is (d)

Tango Hernados Hideaway

Swing Hound Dog

Explanation:

Analyzing the given code segment

In class Dance,

A method named dance was defined with an instance of two string variables/values

which are name and song

public Dance(String name, String s)

In the main of the program,

The first line creates an instance of Dance as dance1

dance1 is initialized with the following string values: "Tango","Hernandos Hideaway"

- The first string value "Tango" will be passed into the name variable of the Dance method

- The second string value "Hernandos Hideaway" will be passed into the song variable of the Dance method

Next, another instance of Dance is initialized as dance2

dance2 is initialized with the following string values: "Swing","Hound Dog"

- The first string value "Swing" will be passed into the name variable of the Dance method

- The second string value "Hound Dog" will be passed into the song variable of the Dance method

On line 3 of the main: System.out.println(dance1.toString());

The values of dance1, which are "Tango","Hernandos Hideaway" are printed

On line 4 of the main: System.out.println(dance2.toString());

The values of dance1, which are "Swing","Hound Dog" are printed

Hence, option d answers the question

Write an application that counts the total number of spaces contained in a quote entered by the user.

Answers

Answer:

Explanation:

The following code is written in Java. It asks the user for an input and saves it in a String variable. Then it loops through all the characters in the string and counts the spaces. Finally, it prints the total number of spaces in the String.

public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Line Now:");

       String userInput = in.nextLine();

       int spaceCount = 0;

       for (int x = 0; x < userInput.length(); x++) {

           if (userInput.charAt(x) == ' ') {

               spaceCount++;

           }

       }

       System.out.println(spaceCount);

   }

Endnotes are indicated by

A. lowercase letters (a, b, c)

B. numbers (1, 2, 3)

C. Roman numerals (i, il, ill)

D. uppercase letters (A, B, C)
They

Answers

Answer:

The answer is D because u have the uppercase letter bold

Answer:

Endnotes are actually indicated by Roman Numerals so option C is correct.

Write a function named power that accepts two parameters containing integer values (x and n, in that order) and recursively calculates and returns the value of x to the nth power.

Answers

Answer:

Following are the code to the given question:

int power(int x, int n)//defining a method power that accepts two integer parameters

{

if (n == 0)//defining if block to check n equal to 0

{

return 1; //return value 1

}

else//defining else block

{

x = x * power(x, --n); //use x variable to call method recursively

}

return x; //return x value

}

Explanation:

In the above-given code, a method power is defined that accepts two integer variable in its parameter, in the method a conditional statement is used which can be defined as follows:

In the if block, it checks "n" value, which is equal to 0. if the condition is true it will return value 1.In the else block, an integer variable x is defined that calls the method recursively and return x value.

Ask the user how many numbers for which they want to calculate the sum. Using a for loop, prompt the user to enter that many numbers, one-by-one, keeping track of the sum. At the end, after the user entered all numbers, output the sum.

Answers

n = int(input("How many numbers do you want to sum? "))

total = 0

for x in range(n):

   total += int(input("Enter a number: "))

print("Sum: "+str(total))

I hope this helps!

Following are the program to the given question:

Program Explanation:

Defining a variable "Sum" that holds an integer value.In the next step, a variable "t" is defined that uses the input method to input a value from the user-end.After the input value, a for loop is declared that takes the range of the t variable.Inside the loop, another variable "n" is defined that inputs value from user-end and use the "Sum" variable to add its value.Outside the loop, a print method has been used that prints the sum variable in the string with the message.  

Program:

Sum = 0#defining a variable sum that hold an integer value

t= int(input("Enter the total number you want to add: "))#defining a t variable that input value from user-end

for i in range(t):#defining a loop that add inputs values from above user-input range

   n= int(input("Enter value "+str(i+1)+": "))#defining loop that inputs n value

   Sum += n; #defining sum variable that adds user-input value

print("Sum of entered number: "+str(Sum))#using print method that print added value

Output:

Please find the attached file.

Learn more:

brainly.com/question/16025032

What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control people. It was either on netflix or hulu

Answers

The Innocents on Hulu i think

Answer:Raising Dion?

Explanation:

Was it Raising Dion?

References inserted initially as footnotes can be converted to endnotes through an option in the software.

A. True

B. False

Answers

The answer is A. True

The answer is: A) True

describe PROM, EPROM and EEPROM memories​

Answers

Answer:

Explanation:

PROM is a Read Only Memory (ROM) that can be modified only once by a user while EPROM is a programmable ROM that can be erased and reused. EEPROM, on the other hand, is a user-modifiable ROM that can be erased and reprogrammed repeatedly through a normal electrical voltage.

Computer Architecture
1. Define what a "word" is in computer architecture:
A. The size (number of bits) of the address
B. The total number of bits of an instruction (e.g. 16 bits)
C. Word and width are synonymous.
D. A word is the contents of a memory register.
2. What is the difference between a register’s width and a register’s address? (choose all that apply - there may be more than one correct answer)
A. They are both the same!
B. Address is the same for all registers, width is unique for each register.
C. Width is the amount of data a single register holds, address is the location of the register within a larger chip.
D. The address bits of a register is a logarithm of its width.
3. Which of the following is NOT implemented by the Program Counter?
A. Set the counter to 0.
B. Increase the counter by 1.
C. Decrease the counter by 1.
D. Set the counter to any input value.
4. What is the relationship between the size of the address (number of bits) and the word size for memory registers?
A. address bits = 2^(word size)
B. address bits = word size ^ 2
C. address bits = word size
D. address bits = log2(word size)
E. address bits = (word size) / 2

Answers

Answer:

BADDA

Explanation:

BIIING

what do we use HTTP and HTML for?

Answers

HTTP is protocol while HTML is a language

HTML is a Language while HTTP is a Protocol.

HTML tags are used to help render web pages. The Hypertext Mark-up Language (or HTML) is the language used to create documents for the World Wide Web.

HTTP (Hypertext Transfer Protocol) is a protocol for transferring the hypertext pages from Web Server to Web Browser. HTTP is a generic and stateless protocol which can be used for other purposes as well using extensions of its request methods, error codes, and headers. Basically, HTTP is a TCP/IP based communication protocol, that is used to deliver data (HTML files, image files, query results, etc.) on the World Wide Web.

what is the CPU's role?

Answers

Answer:

The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program. The computer industry used the term "central processing unit" as early as 1955.

Answer:

The Cpu is like the brain of the computer it's responsible for everything from running a program to solving a complex math equation.

what program we write for nested if in c++ to print something after else part but before inner if else
if(condition){
}
else
//something we want to print
if(condition){
}
else{
}

Answers

Answer:

if(condition){

}

else  {

  // something we want to print

  if(condition) {

     // ...

  }

  else {

     // ...

  }

}

Explanation:

Create code blocks using curly braces { ... }.

Use proper indentation to visibly make it clear where code blocks start and end.

Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).

Answers

Answer:

C#

if(user_grade >=9 && user_grade <=12)

{

   Console.WriteLine("In Highschool");

}

Python

if user_grade >= 9 & user_grade <= 12:

  print("In Highschool")

Java

if(user_grade >=9 && user_grade <=12)

{

   System.println("In Highschool");

}

Explanation:

What term refers to a sequence of statements in a language that both humans and computers can understand?

a
hexadecimal
b
program
c
binary
d
macro

Answers

Answer your answer is Macro

Explanation:

Macro shares language both the computer and the programmer can undestand.

Let f(w) = 2w^3 - 5. Let z = 2. What is f(z)?​

Answers

Answer:

Hence f(z)=11

*This is what i think*

Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote

Answers

Answer:

tyafana

Explan

ation:n umbers

What game is this? helpppppp

Answers

Answer:

the sims lol

Explanation:

Shelly recorded an audio composition for her presentation. Arrange the following steps that Shelly followed in the proper order.

She added effects to her audio composition.
She saved her audio composition on an optical drive.
She connected her microphone to her computer.
She saved the audio composition in an appropriate file format.
She selected the record option in her DAW.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Shelly recorded an audio composition for her presentation. She needs to follow the following proper orders to get composition done for her presentation.

She connected her microphone to her computer.She selected the record option in her DAW.She added effects to her audio composition.She saved the audio composition in an appropriate file format.She saved her audio composition on an optical drive.

Answer:

She connected her microphone to her computer.

She selected the record option in her DAW.

She added effects to her audio composition.

She saved the audio composition in an appropriate file format.

She saved her audio composition on an optical drive.

Consider an instruction within a certain instruction-set architecture (ISA): ADD R1, R2, R3. This instruction adds the value in Register R1 with the value in Register R2, and stores the result in Register R3. What is the maximum number of physical memory accesses that may be caused by this single instruction?
a) 1
b) 2
c) 3
d) 4

Answers

Answer:

C = 3

Explanation:

The maximum number of physical memory accesses that may be caused by this single instruction is ; 3

This is because In the case of loading two values into R2 and R3 there is need for their memories to be accessed and after execution R1 value there will be a write back into memory hence another memory is also accessed and that makes the number of Physical memories accessed to be three(3) in Total

Other Questions
Agricultural practices in eastern Oklahoma most closely resembled those practiced in __________. Based on the incidents described below, which of the following would happen last in this freedom of speech caseconcerning Cindy?The school tells Cindy to remove the banner.Cindy puts up a banner honoring Allah at a football game.Some people find it offensive and want the banner removed.The courts rule that it is Cindy's First Amendment right to put up the banner. What made economic recovery even harder for the Southern states compared to Northern states? Choose threecorrect answersSouthern agricultural lands were scorched and destroyed.Southern infrastructure was destroyed by total war.Southern states had too little currencySouthern states were not accepted back into the Union.Southern states like Mississippi had no pension systems. Hiking up a mountain, you notice that the air temperature drops 10C for every 1,000 meters increase in elevation. Write a multiplication expression to represent the decrease in temperature if you hike up the mountain 3,000 meters. Then evaluate the expression and explain its meaning. A tv costs 800 plus VAT at 20%.What is the total cost of the TV? Norman Triplett studied the effect of others on individual action, by observing people while they were Marissa knits caps that she supplies to several baby stores. She purchases five bundles of yarn for $62.50. Select thequantities that would best help determine how many bundles of yarn she will need per month to knit caps.. .amount of yarn needed for each cap and number of caps knitted in a monthOB. cost to produce each cap and price per bundle of yarnOC. number of caps knitted in a month and cost to ship the caps to each storeOD. price per bundle of yarn and amount of yarn needed for each cap This is the problem ...... PLEASE HELP WITH THE PIC please help me in this question ke...11. Table salt, NaCl, is a classic binary ionic compound. (4 points)a. What is the oxidation number of Na? Of Cl?ave... HELPPPPP Read the excerpt from The Riddle of the Rosetta Stone,He wrote to a friend: "You tell me that I shall astonish the world if I make out the demotic inscription on the RosettaStone. On the contrary, I think it astonishing that It should not have been made out already, and that I should find thetask so difficult."In this excerpt, the author includes Thomas Young's words to show that YoungO has very little confidence in the ability of others.places a great deal of pressure on himself.feels that figuring out the inscription is useless.O seeks public praise for his accomplishments. Help me due in 5 minutes HELP ASAP Attachment Lab:Conservation of Linear Momentum I need help pls !!!!! Read this sentence from "The Water Cycle." As water molecules heat up, water changes from a liquid to steam or vapor. One student guessed that vapor means "a gas, like steam." Which word or words in the sentence will best help the student verify the meaning? A liquid B steam C heat up D water molecules Read the selection below from the short story "The Pit and the Pendulum" by Edgar Allan Poe and answer thequestion that follows.Amid the thought of the fiery destruction that impended, the idea of the coolness of the well came over my soul likebalm. I rushed to its deadly brink. I threw my straining vision below. The glare from the enkindled roof illumined itsinmost recesses. Yet, for a wild moment, did my spirit refuse to comprehend the meaning of what I saw. At length itforcedit wrestled its way into my soulit burned itself in upon my shuddering reason. O for a voice to speak! -oh,horror!-oh, any horror but this! With a shriek I rushed from the margin and buried my face in my hands-weepingbitterly.Which word best describes the narrator in the passage above?humorousdeterminedO frightenedO insensitive Political parties influence public policy by creatingtask forces.platforms.panels of experts.interest groups. Analyze the graph of the function f(x) to complete the statement. Worth 75 points!! Need help with calculus