essay regarding a magic cell phone that turns into robot

Answers

Answer 1

It should be noted that when writing an essay, it's important to effectively present the information to the readers.

Writing an essay.When writing the essay, the following steps are required:Create an essay outline.It's important to also develop a thesis statement.Introduce the topic.Then, write the body of the message The conclusion should be presented.

It should be noted that when writing the essay, it's also important to integrate the evidence clearly and ensure that the grammar used is correct.

Learn more about essays on:

https://brainly.com/question/25607827


Related Questions

A data science experiment you are conducting has retrieved two historical observations for the price of Bitcoin(BTC) on December 2, 2017 of 11234 and 12475. Create a Python script that stores these two historicalobservations in a list variable namedbtcdec1.Your data science experiment requires four additional data tasks. The first task is to use the listappend()method to add the BTC price of 14560 to the listbtcdec1. The second task is to create a new empty listnamedbtcdec2and append the BTC prices of 15630, 12475, and 14972. The third task required you to usethe listextend()method to add the contents ofbtcdec2into the listbtcdec1. The fourth and final taskrequires you to use the listsort()method of the listbtcdec1to sort the items in the newly extended list,then use theprintstatement to output the content of listbtcdec1to the Python console.Starter code:_______.

Answers

Answer:

Following are the code to this question:

btcdec1=[11234, 12475] #defining a list btcdec1 that holds two integer values  

btcdec1.append(14560)#using append method to add value in btcdec1 list

btcdec2=[]#defining an empty list btcdec2

btcdec2.append(15630)#using append method to add value in btcdec2 list

btcdec2.append(12475)#using append method to add value in btcdec2 list

btcdec2.append(14972)#using append method to add value in btcdec2 list

btcdec1.extend(btcdec2)#using the extend method to add value list into btcdec1

btcdec1.sort()#using sort method to arrange value in ascending order

print(btcdec1)#print list btcdec1

Output:

[11234, 12475, 12475, 14560, 14972, 15630]

Explanation:

In this code a list "btcdec1" is declared, which holds two integer variables, in the next step, it uses the append method to add another element into the list.

In the next step, another empty list "btcdec2" is declared, which uses the append method to hold the integer element, and uses the extend and sort method to add the second list into the first one and then sort the whole list and print its values.  

To close a window in Windows 10, you can _____. Select all that apply. A. right-click its button on the taskbar, then click Close window B. click the Close button in the upper-right corner of the window C. click the Close button in the window's thumbnail on the taskbar D. click the Start button and click the program name or icon

Answers

Answer:

A, B and C

Explanation:

A, B and C

(The following is unrelated to the answer just to fill the letters criteria)

For closing the window in Windows 10, the following steps should be considered:

The right-click should be done on the taskbar and then click on the close window.On the upper-right corner of the window, click on the close button.On the window thumbnail that shows on the taskbar, click on the close button.

Now if we click on the start button and then click the program icon so the particular program opens instead of closing it.

Therefore the above steps are considered for closing out the window in windows 10.

Learn more about windows 10 here: /brainly.com/question/19652025

What is wrong with the following circuit?




Nothing. This circuit has no mistakes.

The NOT gate should only two input.

There should be only one output from the OR gate.

The AND gate should have one input and two outputs.

Answers

Do you have a pic so i can answer it?

Question 11 (2.5 points)
A start-up company has hired you to implement an email strategy for its organization.
The company wants all of its employees to have an enterprise-level email client and
is considering Windows Live Essentials. They ask you if there are any limitations
about this email solution. Which of the following is a major limitation?

Answers

Answer:

the dot

Explanation:

the dot is a good day forecast for a bit

25 Points !! HELP ASAP . DUE TOMORROW MORNING .

Imagine you are scrolling through your social media and you see these two links, which one would you click on? Why? Explain answer 2-3 sentences long .

25 Points !! HELP ASAP . DUE TOMORROW MORNING . Imagine you are scrolling through your social media and

Answers

Answer:

The Associated Press

Explanation:

Out of the two options presented, The Associated Press caught my attention more due to its compelling content. The content displayed is visually appealing and likely to pique one's curiosity, motivating one to seek further information.

Characteristics of VR headsets​

Answers

Answer Believable Virtual Word. The believable virtual world is a key characteristic of Virtual Reality. ...
Immersive. ...
Feedback. ...
Interactive. ...
Virtual Reality Headset. ...
Computing Device (Commuter / Smart Phone) ...
Virtual Reality Input and Output Devices. ...
Fully Immersive Virtual Reality.

how has State-terrorism done for us and how we can prepare for it?

Answers

Answer:

Developing a plan that prepares not just one family but their whole community.

Explanation:

I think a great way to  prepare for  state-terrorism is by developing a disaster awareness plan. An event that hosts  first-responders, medics, policemen, etc. To speak over these circumstances in the event, there are many possibilities with a disaster awareness event, activities for the younger ages that teach kids to be "prepared not scared" this event can go a lot farther than state-terroism a step further would be to prepare people for natural disasters that can occur, and the ways to prepare for this.

Im being timed please help!!

Where might you find help if material becomes truly difficult?
a.
A teacher
c.
A study group
b.
A tutor
d.
All of these


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

ALL

Explanation:

Because if it was a test you can ask a teacher, if it was group projects you can ask the study group, if it was homework or 1 on 1  you can ask a tutor

Answer:

b

Explanation:

because a tutor deals with materials

disadvantages of using social network site Executive Summery

Answers

Answer:

Advantages of Social Media Sites. Networking without border. Instant News and Information. Great marketing channel for Business. Awareness and Activism. Exchange of ideas and Collaboration. Stay in touch.

Disadvantages of Social Media Sites. Addiction. Mental Illness. Frauds & Scams. Misleading Information. Cyberbullying. Hacking.

Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of statements in a program. Namely, given a program and a statement x in the program (line in the code), the tester should produce a sequence of inputs that demonstrates that the program can reach statement x, or declare that statement x is not reachable under any input sequence. What should we respond to the manager who assigned this task

Answers

Answer:

A. There is no algorithm to decide whether this can be done or not.

Explanation:

We should respond to the manager who assigned this task that there is no algorithm to decide whether this can be done or not. This is because there are many unknowns with the program that is provided. There are various programming languages and each one has its own structure and requirements in order to test them. Also, each function is created differently with different inputs that are necessary and different algorithms used. It is impossible to design a single algorithm that works to test every single provided program. That is why testers have to create custom test cases for each function.

which windows and network location enables network discovery and allows files and printers to be easily shared ​

Answers

The Private network location is the windows and network location enables network discovery and allows files and printers to be easily shared ​

How to determine the window

In Windows, the organized area that empowers organize disclosure and permits simple sharing of records and printers is the Private network location.

After you set your arrange association to the Private network location, it empowers different arrange highlights, counting organize revelation, record sharing, and printer sharing.

By default, Windows categorizes arrange associations into three sorts:

PublicPrivateDomain

The Private network location is the foremost prohibitive, constraining organize disclosure and impairing record and printer sharing for security reasons.

Learn more about windows at: https://brainly.com/question/27764853

#SPJ1

education is better than money give point​

Answers

Answer:

yes education is better than money

Explanation:

money isn't everything

What is a soulmate sketch

Answers

A picture of what you think you soulmate might look like

Write a program to read the the address of a person. The address consists of the following:

4 bytes street number

space

15 bytes street name

new line

11 bytes city

comma

space

2 bytes state

So the input could look like this:
Example: 1234 Los Angeles St.
Los Angeles, CA

Answers

This application presumes that the provided input format is precise (with a 4-digit street number, 15-byte street name, 11-byte city name, and 2-byte state abbreviation separated by spaces, new lines, and commas as specified).

How does BigQuery's Regexp replace work?

For instance, the result of SELECT REGEXP REPLACE("abc", "b(.)", "X1"); is aXc. Only non-overlapping matches are replaced using the REGEXP REPLACE function. As an illustration, substituting ana with banana only causes one replacement, not two. This function gives a false value if the regex parameter is an invalid regular expression. Additionally, it presumes that the input was typed accurately and without any mistakes or typos. You might want to add more validation and error-handling logic to a real-world application to make sure the input is accurate and complete.

# Read street address

street_address = input("Enter street address (4-digit street number, street name): ")

# Split the street address into street number and street name

street_number, street_name = street_address.split(' ', 1)

# Read city and state

city_state = input("Enter city and state (city, state abbreviation): ")

city, state = city_state.split(', ')

# Print the address

print(street_number)

print(street_name)

print(city)

print(state)

To know more about format visit:-

https://brainly.com/question/14725358

#SPJ1

How many ways can we write a list of 6 numbers from (1, 2, 3, 4, 5, 6, 7, 8) without repeating any?

Answers

Explanation:

\( \binom{n}{\\ k} = \binom{6}{8} = \frac{8 \times 7 \times 6 \times 5 \times 4 \times 3}{6 \times 5 \times 4 \times 3 \times 2} = 28\)

We divide by factorial of 6 (!6) what is 6×5×4×3×2×1 so that there is no repetition.

Answer:

Explanation:

Number of combinations:

\(C_{8}^6 = \frac{8!}{(8-6)!*6! } = \frac{6!*7*8}{2!*6! } = \frac{7*8}{1*2} = \frac{56}{2}=28\)

Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B?
a. Limit capabilities
b. Destination filter
c. Same origin
d. Sandboxing

Answers

Java script same origin defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B.

Defenses and Browser Vulnerabilities

Java script sandboxing defense JavaScript to run in a restricted environment ("sandbox") and limit the computer resources it can access or actions it can take.

Java script same origin defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B.

Java script limit capabilities restrict JavaScript to not support certain capabilities.

Find out more on browser vulnerability at: https://brainly.com/question/18088367

This project assumes that you have
completed Project 1. Place several
Student objects into a list and
shuffle it. Then run the sort
method with this list and display all of
the students' information. Print to the
console the unsorted list first of all
students followed by the sorted list of
all students

Answers

Answer:ty

Explanation:ty

The following code shown in the image can be utilized to implement the required functionality, assuming Project 1 entailed developing a class called "Student" with attributes like name, ID number, and GPA.

What is Coding?

The process of developing, writing, testing, and maintaining software programme is known as coding, commonly referred to as computer programming. It entails writing code or instructions that a computer can comprehend and use to carry out a certain operation or address an issue.

In the illustrative code, a class called "Student" is first created and given attributes for name, ID number, and GPA. After that, we make a list of some sample students. The student list is shuffled using the random.shuffle() technique.

The list of students is then sorted based on GPA in descending order using the sort() method in conjunction with a lambda function. Then the sorted list of students is printed, followed by the unsorted list.

Thus, the following code shown in the image can be utilized to implement the required functionality, assuming Project 1 entailed developing a class called "Student" with attributes like name, ID number, and GPA.

Learn more about Coding, here:

https://brainly.com/question/17204194

#SPJ2

This project assumes that you havecompleted Project 1. Place severalStudent objects into a list andshuffle

print_pattern() prints 5 characters. Call print_pattern() twice to print 10 characters. Example output: ***** ***** in python

Answers

Answer:

def print_pattern():

print("*****",end=" ")

print_pattern()

print_pattern()

40 examples of components found in the computer system unit​

Answers

Note that the examples of components found in the computer system unit are given as follows:

ProcessorMotherboardRAMHard DriveOptical DriveGraphics CardPower SupplyFan/HeatsinkSound CardNetwork CardBIOS/UEFIUSB portsPS/2 portsEthernet portHDMI portDisplayPortVGA portDVI portSATA portPATA portAGP portPCIe portPCI portRAM slotExpansion slotOptical Drive BayHard Drive BayFan/Heatsink connectorPower supply connectorFront panel audioReset buttonPower buttonLED indicatorsSATA cablePATA cablePower cordMonitor cableKeyboardMouseOperating System software.
What is a computer system unit​?

A computer case, often known as a computer chassis, is the casing that houses the majority of a personal computer's components.

Internal hardware refers to components placed within the casing, whilst peripherals relate to hardware located outside the case.

Learn more about computer system unit​:
https://brainly.com/question/25896117
#SPJ1

In order to use a data type, a variable must be _____________________ and _____________________.

memorized and initialized
declared and initialized
assigned and memorized
noted and declared

Answers

Answer:

declared and initialized

Explanation:

:))

3. Rearrange the mixed up process of logging into an email account in the right order.
a. Click on sign in
b. Type the website address of the email service provider.
c. Enter your ID and password
d. Open the web browser.
e. Click on the mail link.

Answers

To log into an email account, the following steps should be taken in order:

The Steps to be takenOpen the web browser.Type the website address of the email service provider.Click on the mail link.Click on sign in.Enter your ID and password.

First, open the web browser and type the website address of the email service provider into the address bar. Then, click on the mail link to go to the email login page.

Next, click on the sign-in button to access the login page. Finally, enter your ID and password in the respective fields to log in successfully.

Read more about emails here:

https://brainly.com/question/29515052

#SPJ1

The graphical user interface (GUI) was pioneered in the mid-1970s by researchers at:

A) Apple Computer

B) Microsoft

C) Xerox

D) IBM

Answers

Answer:

its C actually

Explanation:

C) Xerox plus i had a quiz

Answer:

xerox

Explanation:

I need help picture above

I need help picture above

Answers

Answer:

B. https at the very beggining of the URL

Explanation:

hoped I helped Im Eve btw Have a great day and consider marking this brainliest if you do thank you in advanced!

“https” at the very beginning of the URL

You just started your new position at a small doctor’s office. A nurse asks you to print out a report for a patient. The patient’s name is Tim Drake, but you find multiple files with that name. You discover that the files are named differently. Looking at the files for Mr. Drake, you find the following files:

01_DrakeTim

DrakeTim_A

TimDrake001

timdrake

2. Initial Post: Create a new thread and answer all three parts of the initial prompt below

What methods could you use to help you find the files you need?

Why is choosing a descriptive or detailed name for your files a useful practice?

What recommendations might you make to the office manager to better organize the office files?

Answers

To find the files for Tim Drake, who has multiple files with different naming conventions, you can use the following methods:

Search Function: Utilize the search function in the file management system or operating system. Enter the name "Tim Drake" or a variation of it to locate the relevant files. The search function will scan file names and contents, making it easier to find the specific files you need.

Sorting: Sort the files by name, date modified, or any other relevant criteria. This can help group similar files together and make it easier to identify the correct ones. For example, sorting the files alphabetically will cluster the files with similar names closer to each other.

File Metadata: Check the metadata or properties of the files. Some file systems allow you to add tags or keywords to files, making it easier to search for them based on specific attributes. Ensure that the files are properly tagged with relevant information like patient names, dates, or other identifying details.

Choosing descriptive or detailed names for files is a useful practice for several reasons:

Easy Identification: A descriptive file name provides clear information about the content or purpose of the file. When you or others need to locate a specific file, a well-named file can be easily identified among many others. It reduces confusion and saves time.

Organization: Descriptive file names help in organizing files within a system. By using meaningful names, files can be grouped or sorted based on their purpose, type, or relevance. This enhances overall file management and facilitates efficient retrieval of information.

Clarity and Consistency: A consistent naming convention ensures uniformity and clarity across files. It helps maintain a standardized structure and allows for easy understanding of file names by all users. This consistency improves collaboration and reduces errors.

To better organize the office files, the following recommendations can be made to the office manager:

Implement a File Naming Convention: Establish a standardized naming convention for files that includes relevant details such as patient names, dates, and file types. Ensure that all staff members adhere to this convention when creating or saving files. This will promote consistency and ease of file retrieval.

Folder Structure: Create a well-structured folder hierarchy based on categories, such as patient names, departments, or file types. This arrangement should be intuitive and reflect the needs of the office. Maintain consistency throughout the folder structure to facilitate easy navigation and organization of files.

Document Management System: Consider implementing a document management system (DMS) or electronic health record (EHR) system to centralize and streamline file management. These systems offer features like robust search capabilities, metadata tagging, version control, and secure access controls. They can greatly improve file organization and retrieval efficiency.

For more questions on conventions

https://brainly.com/question/31174724

#SPJ11

In Python what are the values passed into functions as input called?

Answers

formal parameter or actual parameter i think

this sql query can be used to identify the percentage of contributions from prospects compared to total donors:
SELECTevent_contributions,Total_donors, Total_prospects (Total_prospects/ Total_donors*100) AS Prospects_Precents FROM contributions_data
True
False

Answers

It is a true statement that section of a SQL query that will calculate the percentage of contributions from prospects is (Total prospects / Total donors * 100) AS Prospects Percent.

What is brief account on SQL?

For handling data stored in a relational database management system, the computer language known as Structured Query Language was developed. When dealing with structured data, which includes relationships between entities and variables, it is especially helpful.

Over read-write APIs like ISAM or VSAM, the SQL has two key advantages, which are proposed the concept of performing multiple records' access with a single command and it does away with the necessity to indicate whether or not an index is

To learn more about SQL refers to;

brainly.com/question/30037267

#SPJ4

The average of three numbers, value1, value2, and value3, is given by (value1 + value2 + value3)/ 3.0. Write a program that reads double variables value1, value2, and value3 from the input, respectively, and computes averageOfThree using the formula. Then, outputs "Average is " followed by the value of averageOfThree to four digits after the decimal point. End with a newline.


Ex: If the input is 2.25 2.0 1.75, then the output is:


Average is 2.0000
Please help!

Answers

Answer:

#include <stdio.h>

int main(void) {

  double value1, value2, value3;

  double averageOfThree;

  /* Read 3 double values */

  scanf("%lf %lf %lf", &value1, &value2, &value3);

  /* Compute the average */

  averageOfThree = (value1 + value2 + value3) / 3.0;

  /* Output the average */

  printf("Average is %.4lf\n", averageOfThree);

  return 0;

}

In Java, System is a:

Answers

Answer:

In Java, System is a:

one of the core classes

Name the malware which looks for security flaws in applications and systems.

Answers

Answer: Worm

Explanation: Worms are one of the most common forms of malware, as they spread easily by finding and expoliting secuirty flaws in operating systems.

Which of the following vendors offers the largest variety of editions for its operating system?

Answers

Answer:

Microsoft Windows offers the largest variety of editions for its operating system.

Other Questions
Divide: (12x4 + 9x3 10x2) 3x3 If you have a sample of a solid with a mass of 48.2 g and a density of 14.3 g/cm3, what would the volume be? (round you answer to the nearest hundredth) In the context of mcgregor's prescriptions for an enlightened workplace, mcgregor believed that:_______. Click-Clack the RattlebagHow does the line "We walked out of the warm and cosy kitcheninto the hallway of the big house, where it was chilly and draughtyand dark" (Paragraph 21) help develop suspense in the story?A It hints at how the author's tone changes.B It marks a change in the narrator's mood.C It confirms that danger is ahead of them.D it describes a change in the atmosphere. Wayne Company is considering a long-term investment project called ZIP. ZIP will require an investment of $143,130. It will have a useful life of 4 years and no salvage value. Annual cash inflows would increase by $80,800, and annual cash outflows would increase by $41,800. Compute the cash payback period. Conjugate the verb in parenthesis to the correct form. Mi hermano Alfredo [_____] (apagar) las luces del jardn.whats the answer Please help with math question if the objective of a test of details is to detect the overstatement of sales, the auditor should trace transactions from the: group of answer choices accounting records to the shipping documents. sales journal to the cash receipts journal. shipping documents to the accounting records. cash receipts journal to the sales journal. Which of the following statements about the relationships between the domestic and international economy is TRUE?a. Domestic sales of goods and services to a foreign nation are always equal to domestic purchases of goods and services from the same nation.b. Total goods and services produced and sold domestically by domestic firms plus imports are equal to the total domestic production plus exports.c. GDP = GNE + (exports - imports).d. Intermediate goods and services purchased by domestic firms from foreign firms are equal to international sales of intermediate goods to foreign firms. What is the best reason for changing the slide order in a presentation?to make it easier to add slidesto make it easier to delete slidesto change the logical structure of the presentationto change the character and paragraph formatting of slides Which sentence contains an example of a simile? The law requiring that toys and infant products be tested before sale is called the? What did Connecticut argue in Griswold v. Connecticut? 1). "In 'from The Diary of Samuel Pepys;' what conclusion can You draw about Samuel Pepys from his account of the Great Fire of London? point) a. He maintained relations with all social strata_ b.He became the spokesperson of the aristocracy: c.He felt responsible for organizing rescue missions.-------- 2). For which of the following types of writing would first-person point of view be least appropriate? point) a. Personal narrative b. Journal entry c. Research report ------- 3). Which of the following is not a characteristic of a diary? point) a. written in third-person point of view b. contains facts and opinions c.contains information about day-to-day events" Come up with 4 unjust Laws and 4 Just Laws Runchuan filled his 6-cup jar with honey. How many times could he fill his 2-fluid-ounce honey bearfrom the jar? Explain. Of(x) = x - 6x-1-Mark thic and return24-10-8-8-22--8-8-102B8 10 x What is the axis of symmetry Anyone know #3 for me Im stuck Whiplash Case Study The patient is a 52 -year-old white male retired RN height: 5'9" weight: 190lbs. who was diagnosed as having a hairline fracture of the right greater tuberosity of the humerus in 2006 which necessitated the use of a sling as well as rehabilitation. In 2014 the patient was in a car accident and was diagnosed with whiplash. The patient displayed an elevated and upwardly rotated right shoulder, both of which may indicate cervical dysfunction as several of the cervical structures have attachment sites along the clavicle, on the first rib, and the on the scapula.Please answer the following questions (1 sentence per item) after reading your case study and discussing it with your peers (clinical thinking):Area of the body affected (anatomy)Tissue involved (anatomy)Possible issues affecting the area of the body or organ system (physiology)Possible pathology (diagnosis)Medical approach required to manage the condition (treatment) What are liquidated damages the buyer must pay to the seller if the buyer wrongfully fails to sign a release of earnest money to the seller under paragraph 18 of the One to Four Family Residential Contract