What rules should we have about cell phone
the classroom/school?.

THIS IS AN 5 PARAGRAPH ESSAY HELP ME

Answers

Answer 1

Introduction: There are many rules schools should follow when it comes to cell phone use during school hours. Technology can be very distracting and durning school is when kids need to pay attention. Most people see cell phone rules un fair or bad, however it's not like that. The school just wants what's best for the students and so they can learn, which will ultimately help them on later in life.

Body paragraphs (wont write the rest of the paragraphs but heres some ideas) Only using the phone when needed like if it's an emergency, phones have to stay on silent to not disrupt others, during free period you can choose whether to be on your phone

then you write your conclusion based on what you wrote

Answer 2

Most of the Info you would need:

-If we don't allow cellphones many school issues would be solved.

-There is a mistake if they use cellphone, but its a great mistake if they misuse.

- Phones in classes just defeat the point of going to school- for learning.

- There are benefits, yes, but there is no doubt that the privilege will be abused.

-Cell phones are only good for distracting the students from the education that they are at school to obtain.

- we think it is one of the best ways to get distracted during class to use your cellphone.

-Cell phones create massive and on going classroom management issues for teachers.

-There is no need for allowing students to use mobile phones in schools. Ultimately they are not using mobiles for the calling purpose. Thus it is a perfect no from our side.

Please have a good day <3


Related Questions

A processor accesses main memory with an average access time of T2. A smaller cache memory is interposed between the processor and main memory. The cache has a significantly faster access time of T1

Answers

For any single memory access, the theoretical speedup to access a word stored in the cache rather than in main memory is given by:

[tex]Speedup=\frac{T_2}{T_1}[/tex]

Given the following data:

Access time = [tex]T_1 < T_2[/tex]

What is cache?

Cache can be defined as a random access memory (RAM) that is used by the central processing unit (CPU) of a computer system to minimize (reduce) the average time taken to access memory (AMAT).

For any single memory access, the theoretical speedup that would be used by the processor to access a word stored in the cache rather than in main memory is given by:

[tex]Speedup=\frac{T_2}{T_1}[/tex]

Where:

[tex]T_2[/tex] is the time to access in main memory.[tex]T_1[/tex] is the time to access in cache.

Read more on processor here: https://brainly.com/question/5430107

How many bit positions to borrow from the host address field to subnet the network address 169.67.0.0 exactly into 5 subnets

Answers

Answer:

send me the opportunity to work with you and your family and friends and family are doing well and that you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient

Write an application that reads the file created by the WriteCustomerList application and displays the records. Save the file as DisplaySavedCustomerList.java.

Answers

Answer:

hi

Explanation:

Which linux operating system would you suggest to install at my laptop.

Answers

Answer:

Arch Linux

Explanation:

Since it gives you full control over your desktop which is what Linux PCs do!

It is essential to make computer professional more responsible towards society and culture

Answers

Yes it is essential because Computers benefit the business and personal world by being able to do the following more efficiently: buying and selling products, communicating throughout the world, enhancing our knowledge, job influences, entertainment, research, and paying bills.


Hope this helps. ^v^


Write a program that asks the user to type 5 integers
and writes the average of the 5 integers. This
program can use only 2 variables.

Answers


import Java.util*

public class Average{
public static void main(String [] args){

int sum = 0;
int numbers = 0;

for(int i = 0; i < 5; i++){
Scanner sc = new Scanner(System.in);
System.out.println(“Please enter your integers: “);
numbers = sc.nextInt();

sum += numbers;
}
System.out.println(“The average is: “ + sum/5)”
}
}

Someone tell me the answer who thanks who ever who

Answers

Answer:

2. Trumpets,Guitar,Drums,Harp,Piano

3. The music notes and variety of colors and the melodies lines

4. 1 thing that needed change is maybe, it needed more intruments.

. What will be the output of the following program?

var =

if

100

(var =

100): bye!"

print

"Value

of expression

is 100"

print

"Good

Answers

Answer:

Similarly x % 100 yields the last two digits. 4.2. Boolean values and expressions¶. The Python type for storing true and false values is called bool

Is it possible to code your own game and if so then where should I go to learn and how to publish it?

Answers

Answer:

Yes there is

Explanation:

It is scratch a coding game to do almost anything you can also code flappybird

Hope this helps.

Have fun with scratch

Answer:

Explanation:

Yes, it is absolutely possible to code your own game. As a beginner, it will be easier to start with something simple like on R-o-b-l-o-x; instead of trying to write a full PC game. It runs Lua and its code is run as scripts which means you can put it anywhere.

write a program in python to input 3 sides of a triangle. check if the triangle is equilateral, isosceles or scalene. use logical operator as required​

Answers

Type of Triangle - Python

In Geometry, a triangle is a three-sided polygon with three edges and three vertices. A triangle with vertices A, B, and C denoted ∆ABC.

Equilateral Triangle

A triangle is said to be an EQUILATERAL TRIANGLE if all the sides are equal in measure.

Isosceles Triangle

A triangle is said to be an ISOSCELES TRIANGLE if any two sides are equal in measure.

Scalene Triangle

A triangle is said to be a SCALENE TRIANGLE if none of the sides are equal in measure.

Here's our program:-

a = float(input("Enter the length of the first side of a triangle: "))

b = float(input("Enter the length of the

second side of a triangle: "))

c = float(input("Enter the length of the third side of a triangle: "))

if (a == b and b == c and c == a):

print("Equilateral Triangle.")

elif (a == b or b = c or c == a):

print("Isosceles Triangle.")

elif (a != b and b !=c and c != a):

print("Scalene Triangle.")

else:

print("Invalid Input.")

Select the correct answer.
What should every HTML document begin with?
A. the element
B.the declaration
C. the element
D.the element

Answers

Answer:

B

Explanation:

Every HTML document must begin with a declaration of what the document is going to be about.

Windows 8 allows ______________ to be personalized.

Internet Explorer settings
social media profiles
backgrounds and user environment colors
usernames and passwords

Answers

Answer:

backgrounds and user environment colors

Explanation:

Windows 8 allows it since Windows 8 makes it easy to customize the look and feel of the Desktop view. In this lesson, you'll learn how to access the Personalization pane, which allows you to customize the theme, background image, and color of your Desktop. You'll also learn how to adjust your font size and text display..

In order to view a page break what should you do

Answers

Answer:

.

.

Explanation:

I do a order view page .

.

.

.

.

Which method might an attacker use to redirect login via information gained by implementing JavaScript on a webpage the user believes is legitimate

Answers

Answer:

It´s called Cross Site-Scripting/Clickjacking

Explanation:

Cross Site Scripting is a security exploit which allows an attacker to inject malicious client-side code onto a website.

Use Advanced Filtering to restrict the data to only display full-time employees with at least one dependent. Place the results in cell A37. Use the criteria in the range H24:M25 to complete the function.

Answers

Answer:

Click cell H10, and enter an AVERAGEIFS function to determine the average salary of full-time employees with at least one dependent. Format the results in Accounting Number Format. Step 1: Open the excel and go to Insurance worksheet

Which of the following single-phase motor will operate at high power factor? enjoy! electrical A. Split-phase motor B. Shaded pole motor C. Capacitor-start motor D. Capacitor-run motor​

Answers

Answer:

the answer is D capacitor run motor

Explanation:

Examples of ________, which is hosted on a web site, include e-mail, word processing, tax preparation, and game programs.

Answers

Answer:Web Application

Explanation:Web hosting is more or less like having an ordinary computer in the cloud in order share information and resources with others world wide.One cannot make effective use of a computer without software applications . Similarly hosting just normal html pages and documents on a server cannot help increase productivity,hence the creation of cloud computer applications also known as "Web Apps (Web Applications)" to aid boost productivity and information dissemination via quality task automations.

Write a C# program to Trim the Given String.
Write a C# program to Convert Upper case to Lower Case.
In C# programming

Answers

Answer:

Step by step explanation:

IM GIVING BRAINLIEST

A special type of goal that acts as a stepping stone for other goals is called

a) an inner-term goal
b) a mid-term goal
c) a part-term goal
b) a short-term goal

Answers

Answer:

The special type of goal that qcts as a stepping stone for other goals is a short-term goal

Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. calcPyramidVolume() calls the given calcBaseArea() method in the calculation.
In JAVA

Answers

The method calcPyramidVolume is an illustration of the java methods; where the methods are executed when called or evoked

The main program

The program written in Java, where comments are used to explain each action is as follows:

//This defines the calcPyramidVolume method

public static double calcPyramidVolume(double baseLength,double baseWidth, double pyramidHeight) {

//This calculates the volume of the pyramid

       double PyramidVolume = calcBaseArea(baseLength,baseWidth) * pyramidHeight;

//This returns the volume of the pyramid

       return PyramidVolume;

   }

Read more about java methods at:

https://brainly.com/question/19271625

why is it important to prepare the farm resources before you start working? explain​

Answers

The planning process helps to: Identify the goals of the farm business (what you want to accomplish); Identify the farm's inventory and resources (what you have to work with); Assess the farm business and the environment in which it operates (where you are and where you may want to go);

10. Write a function called replace_elem that takes an array and two values and uses the simple search
algorithm to replace all instances of the first value with the second value
Sample Run 1:
a = [7, 4, 10, 3, 7, 2, 4, 5]
print (replace_elem(a, 4, 6))
Should output:
[7, 6, 10, 3, 7, 2, 6, 5]
Sample Run 2
a = [7, 3, 10, 3, 7, 2, 9, 5]
print (replace elem(a, 4, 6))
Should output
[7, 3, 10, 3, 7, 2, 9, 5]

Answers

The function that replaces the values in an array is as follows:

def replace_elem(a, integer1, integer2):

    for i in range(len(a)):

         if a[i] == integer1:

              a[i] = integer2

    return a

print(replace_elem([7, 4, 10, 3, 7, 2, 4, 5], 4, 6))

Code explanation.

The code is written in python.

We defined a function named "replace_elem". The function accepts an array a, and integers integer1 and integer2.Then, we used a loop to loop the index of the array. If any of the index value is equals to the integer1, we replace it with integer2.Then return the new values of the array a.Finally, we call the function with its parameters.

learn more on function here: https://brainly.com/question/15691123

Use comparison operators to write a question that the database will understand. Which records are more than or the same as three thousand?

<=3000
<3000
>3000
>=3000

Answers

Answer:

D

Explanation:

≥ is the symbol for more or equal to but it is >= on computer

Answer:

>=3000

Explanation:

We are required to use the comparison operators, and they are like >  , <, <=, >=, != We need to use more than or same: And that is >=3000And this is the required answer

My computer has been running slow for a few days I’m sure it’s a virus

Answers

Answer:

You try to clean it, dipping it in water 2-3 times will be fine.

Explanation:

ha ha I'm indian boy F...

Answer:

Don't put some water on it it will be break just clean it and tell your parents to fix it if you have a money you can fix it

What is the output for the following line of code?
>>>int(2.8)
O 3
O '2.8
02
2.8

Answers

Answer:

2

Explanation:

The answer is 2 because the "int" drops any number after the decimal point, leaving 2

Answer:

2

Explanation:

I answered it on Edge and it's correct.

Which term refers to a contract specifically negotiated for the construction of an asset or a combination of assets that are closely interrelated or interdependent in terms of their design, technology and function or their ultimate purpose or use (GAAP)



A. Fixed price contract
B.Construction contact
C. Cost plus contract
D.None of these


I’m not accepting links or files.
Will mark brainliest for best explanation :)

Answers

Answer:

B. Construction contact

Explanation:

It is a contract specifically negotiated for the construction of an asset or a combination of assets that are closely interrelated or interdependent in terms of their design, technology and function or their ultimate purpose or use.

Please have a great day <3

When purchasing a security program, you must make sure that _____. Select 2 options.

it can be implemented quickly

it can be easily adopted

it hinders operational efficiency

the employees are not involved

it is complex and complicated

Answers

Answer:

1 ans 3

Explanation:

Answer:

- it can be implemented quickly

- it can be easily adopted

Explanation:

When selecting a security program to purchase, you should want to ensure its efficiency. Correct on Edge.

I hope this helped!

Good luck <3

Do you guys answer questions about cyber security?

Answers

Answer:

yes

Explanation:

let's hear your question first.

what is the blockchain?

Answers

Answer:

Blockchain is a cryptocurrency financial services company.

Answer: Blockchain is a decentralized and distributed digital ledger technology that records transactions across multiple computers in a secure and transparent manner. It was originally designed for use with the cryptocurrency Bitcoin, but its potential applications have expanded far beyond that.

Here are the key characteristics and components of blockchain:

Decentralization: Unlike traditional centralized systems, blockchain operates on a decentralized network of computers, often referred to as nodes. Each participant on the network has a copy of the entire blockchain, ensuring that no single entity has complete control.

Distributed Ledger: Transactions are grouped into blocks and linked together in chronological order, forming a chain. This chain of blocks is known as the blockchain. Each block contains a reference to the previous block (except the first block), creating a secure and tamper-resistant record of transactions.

Security: Blockchain uses advanced cryptographic techniques to secure transactions and ensure their integrity. Once a transaction is recorded in a block and added to the blockchain, it becomes extremely difficult to alter or delete.

Transparency: Transactions recorded on the blockchain are visible to all participants in the network. This transparency enhances accountability and trust, as every participant can verify the accuracy of transactions.

Consensus Mechanisms: Blockchain networks use consensus mechanisms to agree on the validity of transactions before adding them to the blockchain. This prevents malicious actors from manipulating the system. Common consensus mechanisms include Proof of Work (PoW) and Proof of Stake (PoS).

Smart Contracts: Smart contracts are self-executing contracts with the terms of the agreement directly written into code. They automatically execute when predetermined conditions are met, facilitating automated and secure transactions without intermediaries.

Immutable Record: Once data is added to the blockchain, it becomes very difficult to alter. This immutability ensures the integrity of historical records.

Cryptocurrencies: While blockchain technology can be used for various applications, it gained widespread attention through cryptocurrencies like Bitcoin. Cryptocurrencies are digital assets that operate on blockchain networks and use cryptography for security.

Blockchain technology has applications beyond cryptocurrencies, including supply chain management, identity verification, voting systems, healthcare record management, and more. It has the potential to revolutionize industries by enhancing security, transparency, and efficiency in various processes.

Explanation: www.coingabbar.com

13. For three control stations, there should be how many start buttons in parallel with the auxiliary contact?
A. six
B. three
C. one
D. nine

Answers

C only because i think the rest wrong
Other Questions
Express 9 2/3 out of 100 as a percent . URGENT! Why do government agencies and private industries set product standards? what are 2 of the characteristics of temporary physical change Please help! Refer to the image. 7. According to the passage, during Peru's World Cupqualifying match against Brazil, the narrator's family'semotions turned from:A. excitement into sadness.B. resentment into reconciliation.C. gloom into anger.D. pity into embarrassment. In countries with high Gross Domestic Products (GDP) per capita, women's rate of participation in the workforce tends to Write a paragraph explaining what Manifest Destiny is. Then explain and give one example on how Manifest Destiny plays a role in Oregon becoming part of the United States. Whom does Chavez blame for the problems faced by minorities? the US government the minorities countries of origin other workers. Find the mean, median, and mode of the following list of values. Round to the nearest tenth if necessary.30, 26, 25, 11, 34, 20, 26, 26a.Mean = 99Median = 26Mode = 26c.Mean = 24.8Median = 34Mode = 26b.Mean = 24.8Median = 26Mode = 25d.Mean = 24.8Median = 26Mode = 26Please select the best answer from the choices providedABCD Identify and describe an example to an adaptation and describe how the adaptation can help the organism survive in a changing environment.Like i dont know how to explain and what animal please help In 1992, South Dakota's population was 10 million. Since then, the population has grown by 1.4% each year. Based on this, when will the population reach 20 million? If f(x) = 5x^5 + 1, then what is the remainder when f(x) is divided by x + 1? Which of the following is a synonym for the word pioneer?engineerenablercreatorruler HELP!!! According to the article, why was Dr. Wu's success in proving the new theory important?A.It allowed her to undertake nuclear research at Columbia.B.It opened the doors to a teaching position at Princeton.C.It furthered physicists' understanding of the universe.D.It exposed the prejudice against Asians in California. Data in the form of digits is called what political role did women play in the transformation of sa from 1970s to the 1990s A scientist notes the bacteria count in a petrie dish is 40. Three hours later, she notes the count has increased to 75. Using an exponential model, how many hours will it take for the bacteria count to grow from 75 to 120? Express the answer to the nearest tenth of an hour. Hint: You are NOT looking for the total time to reach 120. You are looking for the elapsed time from 75 to 120. Andrew Carlson is a patient of Dr. Soto's at the Clearview Wellness Center. Andrew recently went camping with his friends in a remote wooded area. He was bit on the upper arm by an unidentified insect, and is now experiencing pain and tenderness of the involved skin. Andrew has complained of a headache for the past three days. As the clinical medical assistant takes Andrew's vital signs, she notices that the area is swollen and there are red streaks traveling down his arm from the affected area. Based on Andrew's symptoms, you would suspect __________ to be the physician's diagnosis.A. carbunclesB. lupusC. cellulitisD. folliculitis If a firm sells a prestige product, what kind of relationship between price and quantity demanded should it expect?. convert 36 inches to feet there are 12 inches in a footHELP ASAP PLEASE>:)