Answer:
Raft Survival : Ocean Nomad is a survival game
Explanation:
The raft survival ocean nomad is a survival video game that is developed by a Swedish developer, Redbeet Interactive. This game is published by Axolot Games.
In the game the player is moving in a raft in the middle of an ocean searching for his family. It is a survival and strategy game. The player needs to survive in the deserted ocean by whatever he finds and collect from the ocean and also protect himself from the attacks of the sharks.
The player moves by a small island which he can explore to eat something or collect other items to developed his raft.
In the context, if you can not enter the island or go back to the raft, then save the game at that point and press the escape button to start from the first.
In this way, you can refresh the game and start he game again to enter the island.
Software and technology that allow people to work together on a task are known as
Collaborative software or groupware.
Answer:
Collaborative software
Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to
Answer:
The program in Python is as follows:
#1
for i in range(10):
print("MrRoyal",end=" ")
print()
#2
for i in range(1,50,2):
print(i,end=" ")
print()
#3
for i in range(0,101,5):
print(i,end=" ")
print()
#4
i = 1
while i <=10:
print(i,end =" ")
i+=1
#5
myfile = open("People.txt", "r")
eachLine = myfile.readline()
while eachLine:
print(eachLine)
eachLine = myfile.readline()
myfile.close()
Explanation:
The program in Python is as follows:
Program #1
This iterates from 1 to 10
for i in range(10):
This prints the name for each iteration [modify to your name]
print("MrRoyal",end=" ")
This prints a new line
print()
Program #2
This iterates from 1 to 49 with an increment of 2
for i in range(1,50,2):
This prints the odd numbers in the above range
print(i,end=" ")
This prints a new line
print()
Program #3
This iterates from 0 to 100 with a step of 5
for i in range(0,101,5):
This prints every 5th number
print(i,end=" ")
Print a new line
print()
Program #4
This initializes the number to 1
i = 1
This opens the file in an append mode
f = open("myfile.txt", "a")
This loop is repeated from 1 to 10
while i <=10:
This writes each number to the file
f.write(str(i))
Increment the number by 1
i+=1
Close the file
f.close()
Program #5
This opens the file in a read mode
myfile = open("People.txt", "r")
This reads each line
eachLine = myfile.readline()
This loop is repeated for every line
while eachLine:
Print the content on the line
print(eachLine)
Read another line
eachLine = myfile.readline()
Close the file
myfile.close()
PLEASE READ ( if you want ) Before i used to have over 30 brainliest and i was just trying to earn points so i could get to ace, and people went through my profile and reported a ton of the things i answered so all of them got deleted. Now i only have 8 brainliest and i need 15. What am i supposed to do? It's causing me to lose points and brainliest. Ive lost 22 BRAINLIEST. its so annoying D: what do i do
Answer:
Rip! Do you have any idea why they're doing it? Are there things wrong with your answers or are people purposefully targeting you? And if so have you tried reaching out to staff?
PLEASE I NEED HELP FAST
Answer:
your answer will be src=
write an algorithm to find perimeter of circle
Answer:
Here’s one!
Given [math]R[/math], the radius of the circle.
Let [math]N,D\leftarrow 0[/math]
Repeat until [math]D[/math] is large enough (about 1,000,000)
[math]x,y\leftarrow U[0,1][/math]
If [math]x^2 + y^2\le 1[/math] then [math]N\leftarrow N+1[/math]
[math]D\leftarrow D+1[/math]
[math]P\leftarrow\frac{8NR}{D}[/math]
Return [math]P[/math]
[math]U[0,1][/math] is a uniform random number in the range [math][0,1][/math].
Explanation:
Here is a super challenge for you if you feel up for it. (You will need to work this out in Excel.) In 2017 the Islamic month of fasting, Ramadan, began on Friday, 26 May. What fraction of the year was this? (to 1 decimal place) Hint: Think carefully which start and end dates to use.
The date Friday 26, May 2017 represents 2/5 of the year 2017
From the question, we understand that Ramadan starts on Friday 26, May 2017.
Using Microsoft Office Excel, this date is the 146th day of the year in 2017.
Also, 2017 has 365 days.
This is so because 2017 is not a leap year.
So, the fraction of the year is:
[tex]\frac{146}{365}[/tex]
Multiply the fraction by 73/73
[tex]\frac{146}{365} = \frac{146}{365} \times \frac{73}{73}[/tex]
Simplify
[tex]\frac{146}{365} = \frac{2}{5}[/tex]
Hence, the fraction of the year is 2/5
Read more about fractions and proportions at:
https://brainly.com/question/21602143
The fraction of the year that corresponds to the Islamic month of fasting, Ramadan, beginning on May 26, 2017, is 2/5.
Find out how many days passed from January 1, 2017, to May 26, 2017.
January has 31 daysFebruary has 28 daysMarch has 31 daysApril has 30 daysMay has 26 daysTotal days = 31 + 28 + 31 + 30 + 26
Total days = 146 days.
The total days in regular year:
The total days = 31 + 28 + 31 + 30 + 31 + 30 + 31 + 31 + 30 + 31 + 30 + 31
The total days = 365 days.
The required fraction is calculated as:
Fraction = 146 days / 365 days
Fraction = 2 / 5
So, the fraction is 2 / 5.
Learn more about Fraction here:
https://brainly.com/question/10708469
#SPJ3
Review the HTML tags that we have gone over in this lesson. Research HTML tags on the web and identify two new tags. Use these tags along with the ones you have learned in the lesson and construct a simple web page in HTML.
Some suggestions of simple tags include those which:
create a simple line break;
another way to create bold text;
underline text;
make text within the tag bigger than the rest of the text (specifying the size of the text);
mark or highlight a word or parts of your text;
a short quotation;
subscript text;
and superscript text.
You will only submit your document with the html you have created. However, it is always a good idea to use an HTML test bed to check your work.
Tags we have gone over in this lesson will be in the picture
<html>
<body>
<h1>Hello, Welcome to this simple website</h1>
<br>
<u>This is a very good <strong>quote<strong></u>
<br>
<blockquote>"Sometimes silence is the best answer"</blockquote>
<br>
<p>This is our 16<sup>th</sup> anniversary<p><br>
<p>H<sub>2</sub>So<sub>4</sub>is highly reactive</p>
</html>
<body>
If a web address is written as http://www.mywebprescence.com/index.html: What part of this address is considered to be the webpage?
(http://www.) is considered
E) ¿Entiende usted que tendría repercusión legal un mal manejo de los datos del cliente por parte de la empresa? ¿Por qué?
Answer:
Efectivamente, un mal manejo de los datos del cliente por parte de la empresa tendría repercusiones legales que afectarían negativamente a la compañía. Esto es así porque un eventual mal manejo de los datos personales de los clientes implicaría una filtración de dichos datos hacia el resto del público, con lo cual los datos personales y privados de cada cliente se verían expuestos en forma pública, generando así posibles daños a estos a través de la mala utilización de dicha información por parte de terceros malintencionados.
four categories of installer apps
Answer:
I find 5 categories
Explanation:
1 Overview
2 Necessity
3 Types
4 Attended installation
4.1 Silent installation
4.2 Unattended installation
4.3 Headless installation
4.4 Scheduled or automated installation
4.5 Clean installation
4.6 Network installation
5 Installer
5.1 Bootstrapper
5.2 Common types
5.3 System installer
You are planning a program to find the maximum heart rate recommended for patrons of a gym where you have a part-time job. One formula for calculating the maximum heart rate is the difference between 220 and the patron’s age. Some of the steps in your plan are below.
Put them in order of which occurs first. Some steps are not listed.
Answer:
Age = int(input(Enter your age? "))
print(f"Your maximum heart rate is {220 - age}.")
Explanation:
The programs will be as follows
Age = int(input(Enter your age? "))
print(f"Your maximum heart rate is {220 - age}.")
Answer:
got 100 on the quiz
Explanation:
¿Cómo sobrevivirían las personas, sin gas, agua, luz, teléfono, ni internet?
Eles nao tinham Condiçoes de vida e sem a agua nao consiguem Sobreviver porque agua é tudo e a agua é metade da nossa vida
1
Which is not an effective way to search for a file that is located in an unknown folder
location?
(A) entering the name of the file in the space for Search Programs and Files in
Windows
(B) pressing Windows key and entering the file name into the search box
(C) selecting Control Panel, then
selecting Indexing Options in Windows
(D) pressing Windows Key and [F] to open the universal search menu and set it to
search files
Answer:
(C) selecting Control Panel, then selecting Indexing Options in Windows
In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.
Solution :
The value of the K2 cell is filled by IF and OR functions with structured references as :
[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]
Now if the syntax of the formula is not provided, then we can use :
[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]
The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :
--- staff member should served for more than 3 years
--- staff members should be college graduate
Choose the term that matches each description.
_____________ allows users to interact with computer hardware and application software.
______________allows users to complete specific tasks, such as creating a document.
______________allows programmers to create new applications.
Answer:
operating systems, word software, computer concepts for end users
Explanation:
operating systems allow users to interact with computer hardware and application software.
word software allows users to complete specific tasks, such as creating a document.
computer concepts for end users allows programmers to create new applications.
The answer is "operating systems, word software, and end-user computer concepts", and its further explanation can be defined as follows:
The OS includes and administers all applications and software which a computer or mobile device could indeed execute, meaning the governance of the device software or hardware.The software for word processing is used for manipulating texts like a resume or report these text documents. Usually, you type in text and the software offers copy, delete, and numerous page layout devices.Study tools and coding areas allow finished to tailor apps to their needs and understanding instead of expert developers.Thus, the answer is "operating systems, word software, and end-user computer concepts".
Learn more:
brainly.com/question/17798901
A sum of money is shared between 2 friends in the ratio 2 : 3. If the larger
share is $450. What is the total sum shared?
(101101+10110) /110
101101-11001/101 please I need help
Answer:
000000000000000000000000000001111111111111111111
can you help me here please
Explanation:
because Anna is a music lover she had download lots of songs.When downloading songs a virus should have gone from the websites to her computer.
to avoid this problems she should not have gone through the different websites
Write a qbasic program to supply first , middle and last name of a person and print the output as given below :
If input is Sam Christopher Robert output should be Robert Christopher Sam.
Answer:
The QBasic program is as follows:
10 INPUT "First name: " fName$
20 INPUT "Middle name: " mName$
30 INPUT "Last name: " lName$
40 PRINT lName$," ",mName$," ",fName$
50 END
Explanation:
This prompts the user and gets input for first name
10 INPUT "First name: " fName$
This prompts the user and gets input for middle name
20 INPUT "Middle name: " mName$
This prompts the user and gets input for last name
30 INPUT "Last name: " lName$
This prints the output in the required format
40 PRINT lName$," ",mName$," ",fName$
This ends the program
50 END
Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.
Answer:
They are inappropriate
fallouts: Access denial and data theft
Explanation:
Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.
Access denial and data theft are the fallouts associated with DOS and DDos attacks
Harry makes pizzas to sell in his café. He buys packets of grated cheese and boxes of mushrooms and then uses them for the pizza toppings. For example, a bag of grated cheese is divided into 4 portions and used to top 4 pizzas. What formula is in cell D3?
Answer:
=B3 / 4
Explanation:
The price of a packet of grated cheese is $2.60. To make pizza, this packet of cheese is divided into four to make 1 pizza. Therefore, the price of the grated cheese used to make 1 pizza = price of packet of cheese / 4 = $2.60 / 4 = $0.65
This price is the price inserted in cell D3. The price for each packet of grated cheese is inserted in cell B3.
Therefore the formula used in cell D3 to find the price of each grated cheese required for one pizza is:
Formula for D3 is "=B3 / 4"
Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I really need correct answer ASAP
What kinds of people do you think are susceptible to being duped by "phishing" attacks?
Answer:
Find answers below.
Explanation:
Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.
Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.
Phishing is simply a form of cyber attack which typically involves making an attempt to obtain sensitive user informations such as usernames, passwords and credit card details or bank account details by disguising one's self as a trustworthy entity in an electronic communication usually over the internet.
Generally, the type of people who are susceptible to being duped by "phishing" attacks are those who post or share their email address or contact informations on public forums and don't scrutinize and examine a message before acting on it.
In conclusion, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.
Answer:
what do you look like?
MAN on metropolitan area network is a network spanning a large distances of a few kilometre like a city true or false
Answer:
True
Explanation:
It is True
this bar is located at the top of your computer school in.Its functions allow you to navigate the web
Answer:
idu
Explanation:
Two uses of mortise chisel
Answer:
Two uses of the mortise chisel are;
1) Mortise chisel are used for cutting across the grain of the wood directly and also
2) To lever waste materials out of the cut area and smoothen the cut area
Explanation:
A mortice is a recessed hole created in a part that is meant to accommodate a complementary projection part, which will enable the fastening of the two parts together
A mortise chisel are chisels used for the chopping out mortise joints, and are designed such that the heavy impact of a mallet
Steeler corporation is planning to sell 100,000 units for 2.00 per unit and will break even at this level of sales fixed expenses will be 75,000 what are the company's variable expenses per unit
Answer:
1.25 per unit
Explanation:
Number of units to sell = 100,000
Price per unit = 2
Fixed expense = 75000
At break even point :
Revenue = total expenses
Total expenses = fixed cost + variable cost
Let variable cost = x
Revenue = units to sell * price per unit
Revenue = 100,000 * 2 = 200,000
Hence,
Fixed cost + variable cost = Revenue
75000 + x = 200,000
x = 200, 000 - 75000
x = 125,000
Variable cost = 125,000
The variable expense per unit is thus :
Variable expense / number of units
125,000 / 100,000 = 1.25 per unit
Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user handles software maintenance and upgrading features. The user controls software deployment and configuration settings. The user can create an application using tools and libraries from the provider. The user does not need to purchase and install additional hardware to provide increased capacity.
Answer:
The user does not need to purchase and install additional hardware to provide increased capacity.
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Platform as a Service (PaaS).
2. Infrastructure as a Service (IaaS).
3. Software as a Service (SaaS).
Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it. Some examples of SaaS are Go-ogle apps, Bigcommerce, Salesforce, Slack, Dropbox, DocuSign, Microsoft Office 365, etc.
An advantage of the software as a service (SaaS) approach in public cloud computing is that the user do not have to purchase and install additional hardware to provide increased capacity because the software provider makes all of the necessary features for smooth operations and proper functioning available to the user.
list the steps involved in cutting and pasting in a different document
To cut or copy, hold down Ctrl and press X or C. Choose Paste from the menu bar when you right-click the item's destination. You can right-click almost anywhere, including inside a document or folder. To paste, hold down Ctrl and press V on the keyboard.
Define the terms data and information ??
Answer:
Data is an individual unit that contains raw materials which do not carry any specific meaning. Information is a group of data that collectively carries a logical meaning. Data doesn't depend on information. Information depends on data. It is measured in bits and bytes.
An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this.
What is the mostly likely way the attacker has been able to modify the price?
A. By using SQL injection
B. By changing hidden form values in a local copy of the web page
C. By using cross site scripting
D. There is no way the attacker could do this without directly compromising either the web server or the database