1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena-2011 [213]
3 years ago
10

:3 Brainlsit included! =) 33 points!

Computers and Technology
1 answer:
IRISSAK [1]3 years ago
8 0

Answer:

What is means is that in order for what you are writing to be considered a paragraph your writing has to have five sentences.

An example:

I was so happy to see my family. My aunt is very fun to be around and she is always so excited for everything. My cousin can be crazy at time but he is also very funny. I love my grandma she can be stern sometimes but overall she is very caring. I love my whole family so much and I can't wait to see them soon!

Please mark as brianliest! If you need anymore help just ask! :D

You might be interested in
To rehearse giving a PowerPoint presentation, Hema would like to print out the presentation with all of the speaker notes. Hema
seraphim [82]

From the given case in the question, Hema would prefer having a handout document for the audience that does not include the slide dates, which are included in her printed notes for the presentation.

To do this, Hema would need to execute option (D) View → Notes and Handouts → Header & Footer → Date and time → Fixed.

This is because the option to modify dates for handouts and notes are in the View tab, not on the insert Tab.

8 0
4 years ago
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
TCP connections are established through sequence numbers. Someone can guess a client's next sequence number and then impersonate
solong [7]

Options: True or false

Answer: True

Explanation:TCP(TRANSMISSION CONTROL PROTOCOL) is is an internet control protocol that allows Communication between internet users or computers by collecting and compiling packets of data and then sending such collected packets of data to the desired user.

Before using a TCP one must first create a connection which will enable it to effectively communicate with the other user.

TCP are established using sequence numbers which can be predicted by another party for their own personal gain.

6 0
3 years ago
If a class contains more than one constructor, describe how the computer determines the appropriate constructor. provide an exam
notsponge [240]
If a class contains more than one constructor, computer determines the appropriate constructor by matching all the attributes, like the number, data type and position. Here's the example where the row public AirConditioner(){} is the default constructor that can use <span>default settings or initialize manually (sorry for tabulation, not my fault)</span>:
<span>class AirConditioner{   enum ConditionerMode{      Automatic,  }   public ConditionerMode Mode;   public int MinTemperature = 18;   public int MaxTemperature = 20;
   public AirConditioner(){    }
   public AirConditioner(ConditionerMode mode){       Mode = mode;   }     public AirConditioner(ConditionerMode mode, int MinTemp, int MaxTemp){      Mode = mode;      MinTemperature = MinTemp;      MaxTemperature = MaxTemp;   }}</span>
5 0
3 years ago
Create an ArrayList of Employees (contain id and name) and add 3 Employees to the ArrayList to start. Next, you want to sort the
Anna [14]

Answer:

Kindly note that, you're to replace "at" with shift 2 as the brainly text editor can't accept the symbol

Explanation:

Java code:

import java.util.*; public class Employees { // variables private int id; private String name; // getters public String getName() { return name; } public int getId() { return id; } // constructor public Employees(int id, String name) { this.id = id; this.name = name; } // comparator function based on the name static class compareByName implements Comparator<Employees> { "at"Override public int compare(Employees emp1, Employees emp2) { return emp1.getName().compareTo(emp2.getName()); } } // clone method for arraylist public static ArrayList<Employees> clone(ArrayList<Employees> arr) { ArrayList<Employees> temp = new ArrayList<Employees>(); for(int i=0;i<arr.size();i++) temp.add(arr.get(i)); return temp; } // main method public static void main(String[] args) { Scanner scan = new Scanner(System. in); // reading 3 employees details ArrayList<Employees> arr = new ArrayList<Employees>(); for(int i=0;i<3;i++) { System.out.print("Enter id: "); int id = scan. nextInt(); System.out.print("Enter name: "); scan. nextLine(); String name = scan. nextLine(); arr.add(new Employees(id,name)); } // cloning and sorting ArrayList<Employees> cloneArray = clone(arr); Collections. sort(arr, new compareByName()); // printing System. out. println("Array after cloning: "); for(int i=0;i<cloneArray. size();i++) { System.out.println(cloneArray. get(i). getId() + " " + cloneArray. get(i).getName()); } System. out. println("Array after sorting: "); for(int i=0;i<arr.size();i++) { System. out. println(arr.get(i). getId() + " " + arr.get(i). getName()); } } }  

Kindly check the attached images below for the code screenshot and code output.

3 0
3 years ago
Other questions:
  • The danger in using soy solvents is that they: A) Are not approved by the FDA B) Take paint off of surfaces where used C) Are no
    11·2 answers
  • Write the reverseO function recursively. This function takes a string and the length of the string as arguments and returns the
    15·2 answers
  • If you filmed a clip in 120fps, how many frames are in a seconds of video.
    13·1 answer
  • Which of the following is a windows feature that allows you to temporanily store text
    8·2 answers
  • Caroline’s personal laptop was attacked by malware. When she got it fixed from the service center, the computer technician advis
    10·1 answer
  • Employee names are stored using a maximum of 50 characters. This information is an example of which of the following?
    9·1 answer
  • The helping professions all involve_____.
    13·1 answer
  • Who knows my cousin better?
    14·1 answer
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!