1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
10

2. What is Auntie Reed’s style of speaking? How does her appearance explain aspects of her character? Does the reader know what

Auntie Reed is thinking about? How do other characters in the story perceive Auntie Reed? In what way does Auntie Reed’s actions tell us about her personality.
Social Studies
1 answer:
Crazy boy [7]3 years ago
7 0
<h3><u>Auntie Reed's style: </u></h3>
  • It is noted from her wording that she uses the evangelical word set or jargon as she calls Langston a so called ‘Lamb of God’.
  • Her appearance depicts that she is a clear devotee of the god and has adopted the general Christian appearance.
  • The reader doesn’t completely know but he can only guess that auntie Reed wants the best for the main character by accepting Jesus into his life, through the ways of Christianity.
  • The other characters know of her being a devotee and perceive her as a good character that just wants the best for everybody, even though they may not agree with her methods sometimes.
  • Auntie Reed’s actions tell us that she tries her best and thinks she has an authority over youngsters and they should agree to what she says without questioning, just because she is older.
You might be interested in
Probable cause was defined by the U.S. Supreme Court in ________ as existing when ""the facts and circumstances within the offic
fenix001 [56]

Answer: The probable cause was defined by the U.S supreme Court in "BRINEGAR V. UNITED STATE".

Explanation: The probable cause is a law in the United States criminal law. This law was argued by the supreme Court on the 18th to 19 of October 1948, and was decided of the 27th of June 1929. Under this law the police obtains power for a search warrant or issuing of arrest. The probable cause is only used at the crime scene or when an evidence of a crime is produced.

BRINEGAR V. UNITED STATE. Is a case where Brinegar was charged of transporting intoxicated liquor into Oklahoma, which was contrary to the laws of the state. upon this charge brinegar was convicted by a federal district court, for violation of the liquor enforcement Act of 1936. Brinegar challengeed the charge, by claiming that his conviction is not valid, because they was no search warrant by the police to search his automobile, which is the violation of the fourth amendment.

Explanation:

7 0
3 years ago
What type of controversial laws permit the use of any degree of force against intruders who might use any physical force against
julia-pushkina [17]
The answer took that question is made my day laws
5 0
3 years ago
To examine a cloud environment, you must have the latest knowledge on cloud encryption. Conduct online research, and write a two
Rudik [331]

Answer:

Cloud encryption is a help offered by distributed storage suppliers whereby information, or content, is changed utilizing encryption calculations and is then put on a capacity cloud.  

Cloud encryption is the change of a cloud administration client's information into ciphertext. Cloud encryption is practically indistinguishable from in-house encryption with one significant contrast - the cloud client must set aside some effort to find out about the supplier's strategies and methods for encryption and encryption key administration. The cloud encryption abilities of the specialist co-op need to coordinate the degree of affectability of the information being facilitated.  

Since encryption devours more processor overhead, many cloud suppliers will just offer essential encryption on a couple of database fields, for example, passwords and record numbers. Right now, having the supplier encode a client's whole database can turn out to be costly to the point that it might bode well to store the information in-house or scramble the information before sending it to the cloud. To minimize expenses, some cloud suppliers have been offering options in contrast to encryption that don't require as a lot of preparing power. These procedures incorporate redacting or muddling information that necessities to stay secret or the utilization of exclusive encryption calculations made by the seller.  

Before, numerous organizations felt happy with permitting the cloud supplier to oversee encryption keys, accepting that security dangers could be overseen through agreements, controls and reviews. After some time it has gotten obvious, notwithstanding, that cloud suppliers can't respect such responsibilities when reacting to government demands for data.  

Stage as an assistance (PaaS) is a distributed computing model in which an outsider supplier conveys equipment and programming apparatuses - as a rule those required for application advancement - to clients over the web. A PaaS supplier has the equipment and programming on its own foundation. Accordingly, PaaS liberates clients from introducing in-house equipment and programming to create or run another application.  

PaaS engineering and how it functions  

PaaS doesn't ordinarily supplant a business' whole IT framework. Rather, a business depends on PaaS suppliers for key administrations, for example, application facilitating or Javadevelopment.  

A PaaS supplier constructs and supplies a versatile and advanced condition on which clients can introduce applications and informational collections. Clients can concentrate on making and running applications instead of developing and keeping up the basic framework and administrations.  

Numerous PaaS items are designed for programming advancement. These stages offer register and capacity foundation, just as word processing, rendition the executives, ordering and testing administrations that assist designers with making new programming all the more rapidly and proficiently. A PaaS item can likewise empower improvement groups to team up and cooperate, paying little mind to their physical area.  

PaaS upsides and downsides  

The chief advantage of PaaS is straightforwardness and comfort for clients - the PaaS supplier supplies a significant part of the framework and other IT administrations, which clients can get to anyplace by means of an internet browser. PaaS suppliers at that point charge for that entrance on a for every utilization premise - a model that numerous endeavors like, as it kills the capital costs they generally have for on-premises equipment and programming. Some PaaS suppliers charge a level month to month expense to get to their administration, just as the applications facilitated inside it.  

Framework as an assistance (IaaS) is a type of distributed computing that gives virtualized processing assets over the web. IaaS is one of the three primary classifications of distributed computing administrations, close by programming as a help (SaaS) and stage as an assistance (PaaS).  

IaaS engineering and how it functions  

In an IaaS model, a cloud supplier has the foundation segments generally present in an on-premises server farm, including servers, stockpiling and systems administration equipment, just as the virtualization or hypervisor layer.  

7 0
4 years ago
Ames travels for business and is always worried that his laptop will be taken from his room.Which type of device will ensure tha
rjkz [21]

The correct answer would be, Cable Locks.

Ames travels for business and is always worried that his laptop will be taken from his room. Cable locks will ensure that James's laptop will not be stolen while he travels.

Explanation:

Universal Notebook Security Cable is called as the Cable Lock. This cable has two ends, one is attached to a non movable object in the room, while the locking slot of the cable is built in many notebook computers, where the other side of the cable is being attached.

In this way the device is secured while traveling and living in different hotel rooms. The device is locked with an object in the room, which make the device secure and hard to steal.

So if James wants to make his laptop safe while traveling, he must use Cable locks during traveling.

Learn more about Security of Devices at:

brainly.com/question/12480592

#LearnWithBrainly

5 0
3 years ago
A physical map primarily shows:
Verizon [17]
It primarily shows boundaries and landforms
6 0
3 years ago
Other questions:
  • Supervisor: last year at this time, we had 250 employees, due to attrition, we lost 12% of our workforce. representative: i din'
    5·1 answer
  • Kristy and her friends come up with several options of things to do on Friday night, and ultimately decide to go to a new movie
    11·1 answer
  • A therapist is interested in helping her client get a clearer understanding of his motives and actions. this therapist is most l
    11·2 answers
  • How did women help Rome during its wars
    15·1 answer
  • What did Europeans do to establish their authority in the places they took over in the New World? Please help, google wont tell
    5·1 answer
  • Women, African Americans, and Native Americans did not take part in the Constitutional Convention because they
    12·1 answer
  • Barlow owns the surface rights for Canyon Ranch, but does not own the subsurface rights. Dusty owns the subsurface rights. Canyo
    13·2 answers
  • FILL IN THE BLANKS
    13·1 answer
  • I need help i mark brain
    14·2 answers
  • Why do organisms reproduce?​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!