What do you use the Pygame library for?

Answers

Answer 1

Answer:

Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language.


Related Questions

How can you make a search phrase more effective?
O A. by framing it as a question
O B. by using more specific search terms
C. by using a different search engine
OD. by using all the search terms you can think of

Answers

Let's solve this together.

To make a search term more accurate, you must keep it simple and you must be able to use more specific terms. The more specific you are with what you are asking the engine about, the more friendlier it will respond.

The answer is Option B. I hope this answer helped you!

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

explain the verbal method of communication​

Answers

Answer:

verbal method of communication means using kaomji, emojis gifs and stickers although you know how to use the keyboard.

Answer:

The Verbal Communication is a type of oral communication wherein the message is transmitted through the spoken words. Explanation: Here the sender gives words to his feelings, thoughts, ideas and opinions and expresses them in the form of speeches, discussions, presentations, and conversations.

The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register

Answers

Answer:

b. Memory-Management Unit

Explanation:

The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.

Arrange the code so that the numbers are swapped.

Second part

savec

First part

C=D

Third part

D= save

Answers

Answer:

Following are the correct code for swapping:

save=C

C=D

D=save

Explanation:

Please find the attached file of the program with output.

In the above, we let that the three integer variable "save, C, and D" is declared that in which the variable "C and D" holds a value and "save" variable is used to hold "C" variable value.

At this the "C" variable is empty. so, it holds a "D" variable value and when it is empty it holds a save value. At this, we perform the swapping.

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.

Answers

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

We can draw crescent using ?

Answers

Answer:

I think it's B

hope this helps

have a good day :)

Explanation:

When using the “rule of thirds,” where should focal points be placed?

Answers

Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.

Have a nice day!

3. The art or technique of decorating wood or leather by burning a design on the surface
with a heated metallic point.
A. Pyrography
C. Wood Turning
B. Gilding
D. Hand Carving
4. Combines several techniques that involve inserting decorative pieces into a base
object to incorporate new designs on the original products.
A. Flocking Technique
C. Inlying
B.
Hand Carving
D. Gilding
5. Lines the interior of drawers and boxes with a soft velvety finish
A. Flocking Technique
C. Inlying
B. Hand Carving
D. Gilding
6. It is used to color wood to give an illusion of texture. This may come in two varieties.
A. Staining
C. Pigment-based
B. Dye-based
D. Inlaying
7. Stain will color small pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
8. Stain will color large pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
9. Decorative technique in which powder is applied on wood or other materials to give a
thin coating of gold from.
A. Inlaying
C. Gilding
B. Staining
D. Wood Carving
10. The simplest way of decorating wood since there are a variety of colors that you can choose from.
One may also add a lacquer finish to make, it shiny and glossy,
A. Flocking Technique
B. Staining
C. Gilding
D. Painting


due tomorrow pls help I'll make brainliest I promise unrelated answer will get reported​

Answers

Answer:

The answer of number three is pyrography.

639820- 2852478

425867- 369514​

Answers

Answer:

639,820 - 2,852,478 = -2,212,658

425,867 - 369,514 = 56,353

Have a nice day!

Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?

Answers

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems

2. Cloud9 Analytics - manages the warehouse separately from the solutions

3. CVM Solutions - Enables  users to "clean" supplier information and  to centralize and standardize information

4. Exoprise Systems - It avoid use of complex database and Web servers

5. GageIn - It uses Networking and social tools to connect users and facilitate communications

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

what is the correct way to write h1 tag

Answers

Answer:

[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]

Explanation:

The h1 tag in HTML is used to create title-like text.

HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.

Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.

h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.

Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.

<h1> Hello there! </h1>

The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.

Hope this helped!

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

Answers

Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”

Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard

Answers

maybe a sketchbook:))))

Answer:

Your answer is D Storyboard

Explanation:

Storyboarding is a process where you plan how things will look on your website just as described.

Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to

Answers

Answer:

She is referring to composite primary key

Explanation:

Composite primary key comprises of several columns with each having column having its own individual uniqueness.  

In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.  

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive

Answers

Answer:

microphone

Explanation:

when you are using a microphone once it stop it done

A microphone is not a storage medium.

Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?

budgeting
scientific analysis
creating presentations
number formatting
computer programming

Answers

Answer:

number formatting,

scientific analysis computer programming

Answer number formatting,

scientific analysis computer programming

Explanation: its right

What is a blank workbook?

Answers

A workbook is a file that contains one or more worksheets to help you organize data. You can create a new workbook from a blank workbook or a template

Match the elements used in web searches to their functions.

1. row
2. column
3. cell
4. worksheet

where data and formulas can be entered
a grid of rows and columns
a horizontal set of cells
a vertical set of cells

Answers

Row - horizontal
Column - vertical
Cell - where data and formulas can be entered
Worksheet - a grid of rows and columns

Answer:

where data and formulas can be entered - Cells

A grid of rows and columns - Worksheet

A horizontal set of cells - Row

A vertical set of cells - Column

Explanation:

I got it right on the Edmentum test.

____ feet is used when the width of the material is not a factor. (6 letters)

Answers

Answer:

footin dhhdhdn bsbsbdb

Express 42 as a product  of its prime factor​

Answers

The only way to write 42 as the product
of primes.

Except to change the order of the factors is
2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.
The only way to write 42 as the product of primes (except to change the order of the factors) is 2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.

pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE

Answers

Answer:

?

Explanation:

Match each code snippet to its appropriate markup language name

Answers

Answer:

Please find the complete solution in the attached file.

Explanation:

Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression

Answers

feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends

Fruits, stones and other organic pigments are examples of what?
O Natural materials
O Synthetic materials
O Cultural materials
O Modern art supplies

Answers

Natural materials
Hope this helps

RELIGION QUESTION

What is the meaning of prayers of adoration and thanksgiving:

Answers

Answer:

prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration

Explanation:

Q3.What are the hardware requirement of the multimedia system?

Answers

Answer:

• The processing unit

• The memory

• Universal Serial Bus (USB) Device

• Graphics Card and Graphical Processing Unit (GPU)

• Hard drive

• Monitor

• External storage and optical device

A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices

Answers

Answer:

Private.

Explanation:

The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.

Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.

Thus, a private cloud is a correct answer.

Other Questions
An organism made up of only one cell is called...A. multicellularB. unicellular A farmer sells 6.8 kilograms of apples and pears at the farmer's market. 4 5 of this weight is apples, and the rest is pears. How many kilograms of pears did she sell at the farmer's market? An archaeologist finds 14C in a sample of material to be decaying at 20 Geiger Counter clicks per second. A modern equivalent sample of the same material decays at 160 clicks per second. The half-life of 14C is 5,730 years. How old is the sample Whats -7 and 2/3 plus -5 and 1/2 PLEASE HELP- Which step in developing abalanced ration involvesdetermining what feedstuffs areavailable in your location? Given that z is a standard normal random variable, what is the value of z if the area to the right of z is .9370? a. .8264 b. 1.53 c. 1.50 d. 1.96 Sydney says that altogether they have placed 2/3 of the eggs into Tanks A and B. Is Sydney correct? -1/6 of the eggs into Tank A -4/9 of the eggs into Tank B Qui peut m'crire un petit texte au pass compos svp!! Astronomers use the light year to describe the relationship between objects in space, for example, the andromAda galaxy is 2.5 million light years from earth which of the following units is most similar to the light yearA. GramB. SecondC. Kilometer D. Degrees Celsius 9c+1 = 10What is c? help me plsssssssssssss Given m || n, find the value of x and y.(5x+16)m(y+6)(7x+4)n Question 38Two cuboids are congruent. Which statement about their properties a.Each face has the same areab.One is larger than the otherc.They have the same volumed.The sum of the angles is 360 When an intranet is extended outside the corporate walls to include suppliers, customers, or other external agents, it becomes a(n The function f(x) is graphed below. what is f(1)? What are changes in America that you have heard about or read about after the events of9/11? Help need this for today please !!!!!!!!!!!!!!!! Read the passage, then do as requiredMost of us have formed an unrealistic picture of life on a desert island. We sometimes imagine a desert island to be a sort of paradise where the sun always shines. Life there is simple and good. Ripe fruit falls from the trees and you never have to work. The other side of the picture is quite the opposite. Life on a desert island is wretched. You either starve to death or live like 'Robinson Crusoe', waiting for a boat which never comes. Perhaps there is an element of truth in both these pictures, but few of us have had the opportunity to find out. Two men who recently spent five days on a coral island wished they had stayed there longer. They were taking a badly damaged boat from the Virgin Island to Miami to have it repaired. During the journey, their boat began to sink. They quickly located a small rubber dinghy with food, matches, water and rowed for a few miles across the Caribbean until they arrived at a tiny coral island. There were hardly any trees on the island and there was no water, but this did not prove to be a problem. The men collected rain- water in the rubber dinghy. As they had brought a spear gun with them, they had plenty to eat.They caught lobsters and fish every day, and , as one of them put it ' ate like kings' ! When a passing tanker rescued them five days later, both men were genuinely sorry that they had to leave.Questions:1-Choose a suitable title for this passage. 2-According to the information given In the text, how the two men came to the desert island? And what did they do there ?3-If you were stuck on a desert island, and you have the chance to bring ( 3 items / things ) to help you survive in this island. What will you bring with you? And why?4-What would you change / or add in this text, if you are the author ?5-Can you summarize the text in two or three sentences?6-Think of another Ending for this story.7-If you got the chance to ask the author of this passage, one question, what would it be? A pie chart is being made with four sectors. Each sector will be a certain percentage of the total area. The table below shows the size of each sector as a percentage of the total area. Sector 1 = 5% Sector 2 =30% Sector 3 = 50% Sector 4 = 15% What will be the measure of the central angle of sector 4? A. 27 B. 54 C. 5.4 D. 57 what is the power of a student that has done a work of 10 joules in 10 seconds