Who wants to play nitro type with me. My user is thievesGuildcuu

Answers

Answer 1

Answer:

I can

Explanation:

Answer 2

Answer:

Sure.

My user Name is: Queen Void.


Related Questions

Allison is writing a program in Java and keeps getting an error. Which line of code is causing the error?

A. Int a = 0, b = 3, c;
B. for(i = 0, i <= 13, i++) {
C. c = (a * 2) + i;
D. System.out.println(c);

}

Answers

B will cause an error.

Allison needs to declare a type for variable i and use semi-colons.

The for statement should be for(int i = 0; i <=13; i++){

Why would an information systems security practitioner want to see network traffic on both internal and external network traffic?

Answers

Answer:

To see who is accessing data and also where it is going

Explanation:

An information systems practitioner is a person who is involved in the planning and and also implementation of IT resources for any organization which he at she works.

The information systems practitioner would want to want to see network traffic on both internal and external network traffic so as to know who is accessing data and to also know where it is going.

Write a multi-way if statement that compares the double variable pH with 7.0 and makes the following assignments to the bool variables neutral, base, and acid:

Answers

Answer:

try:

   pH = float(input("Enter number between 0 to 14: "))

except ValueError:

   print("input must be a number")

if pH < 7:

   print("pH is Acidity")

elif pH == 7:

   print("pH is neutral")

else:

   print("pH is Base/alkaline")(

Explanation:

The try and except statement is used to check if the input is a number, if its not, the print statement is displayed. The nested if statement compares the pH input to know if it is an acid, base or neutral.

There is no danger of data collision with this topology.

bus
mesh
ring
star

Answers

Answer:

ring

Explanation:

The Answer


C.Ring

This is evident beacause I am your advisor and I made that test so

Using complete sentences post a detailed response to the following.

What are the advantages and disadvantages of top-down and bottom-up programming? How would you decide which one to use? Do you approach problems in your real life from a bottom-up or top-down approach?

Answers

Answer:

some advantages of top down is that you can start off from what you know and figure out what you need to complete it, advantages to bottom up is that you can make something new . if you are starting something from scratch and you dont know what the end goal might be you would use bottom up but if you already have an idea or the final product of what you want you would go the top down approach.

Explanation: just saying you shouldnt just copy and paste my response but rather pick out what you want to say and use this to complete what ever your working on. hope i helped :)

Answer:

the guy on top of me is super right follow him

Explanation:

PLzzzzzz help me!! I will mark brainiest to the one who answers it right!!
Answer it quickly!!

Write a pseudo code for an algorithm to center a title in a word processor.

Answers

Answer: abstract algebra

Explanation: start with the algorithm you are using, and phrase it using words that are easily transcribed into computer instructions.

Indent when you are enclosing instructions within a loop or a conditional clause. ...

Avoid words associated with a certain kind of computer language.

Answer:

(Answers may vary.)

Open the document using word processing software.

In the document, select the title that you want to center. The selected word is highlighted.

On the Menu bar, select the Format tab.

In the Format menu, select Paragraph.

The Paragraph dialog box opens with two sub tabs: Indents and Spacing, and Page and Line Breaks. The first tab is selected by default.

Adjust the indentation for the left and right side. Ensure that both sides are equal.

Preview the change at the bottom of the dialog box.

Click OK if correct, otherwise click Cancel to undo changes.

If you clicked OK, the title is now centered.

If you clicked Cancel, the title will remain as it is.

Explanation:

I took the unit activity

Why is it useful to teach Karl new commands

Answers

Answer:

It's important to teach karl more commands so karl can do more tasks and create more complex algorithms

Explanation:

it’s useful because they would know what to do when you say something . example of you say turn left they would not know what to do because they have not been taught . that’s why you should teach them new commands .

A user can view
and
in the Reading pane.

Answers

Answer:

sorry,but I can't understand your question.

Answer:

email messaging and attachments

Explanation:

2023 edg 100%

Which input value causes the loop body to execute a 2nd time, thus outputting "In loop" again? { String s = "Go"; while ((!s.equals("q"))&& (!s.equals("")) System.out.println("In loop"); 5 - scnr.nextO;
a) "Quit"
b) "q" only
c) "Q only
d) Either "q" or "Q"

Answers

Answer:

a) "Quit"  

c) "Q only

Explanation:

Given

String s = "Go";

while ((!s.equals("q"))&& (!s.equals("")))  {

System.out.println("In loop");

s = scnr.next();

}

Required

What input causes another execution

Analyzing the while condition

while ((!s.equals("q"))&& (!s.equals("")))  

This can be split into:

!s.equals("q")) && (!s.equals(""))

Meaning

When s is not equal to "q" and when s is not an empty string

In other words,

the loop will be executed when user input is not "q" and user input is not empty.

So, from the list of given options: The loop both will be executed when:

a) Input is "Quit"

c) Input is Q only

Input of q will terminate the loop, hence b and d are incorrect

Create a new program with a struct, Data, that contains: an int a char[80] Write a function newData(char[]), that takes char[] as a parameter

Answers

Answer:

#include <iostream>

#include <cstring>

using namespace std;

struct Data {

   int userId;

   char name[80];

}

void newData(string data char[]){

   int counts= 0;

   struct Data name;

   data.userId = ++counts;

   data.name = char[];

   cout<< data.userId << "\n"<< data.name ;

}

int main( ) {

   char myName;

   string mydata;

   cin>> myName;

   cin>> mydata;

   newData( myName, mydata);

}

Explanation:

The c++ source code above stores its data in a struct called "Data". The function newData dynamically creates new data from the struct defined.

Vector testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full credit is 100, so anything over 100 is extra credit.

Answers

Question:

Vector testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full credit is 100, so anything over 100 is extra credit. Ex: If testGrades = {101, 83, 107, 90}, then sumExtra = 8, because 1 + 0 + 7 + 0 is 8.

#include <iostream>

#include <vector>

using namespace std;  

int main() {

  const int NUM_VALS = 4;

  vector<int> testGrades(NUM_VALS);

  int i = 0;

  int sumExtra = -9999; // Assign sumExtra with 0 before your for loop  

  testGrades.at(0) = 101;

  testGrades.at(1) = 83;

  testGrades.at(2) = 107;

  testGrades.at(3) = 90;

   /* Your solution goes here  */

  cout << "sumExtra: " << sumExtra << endl;

  return 0;

}

Answer:

Replace /* Your solution goes here  */  with the following lines of code

sumExtra = 0;

do{

if(testGrades.at(i) > 100){

sumExtra = sumExtra + (testGrades.at(i) - 100);

}

i++;

}

while(i<NUM_VALS);

Explanation:

In the complete question posted,  the variables sumExtra and i have already been declared an initialized.

So, the first thing we do in the solution is:

set  sumExtra to 0 using sumExtra = 0;

Then iterate through vector testGrades using i as the iterating variable

Here, I made used of a do while loop and the explanation is as follows:

do{

This line checks if current element of the vector is greater than 100

if(testGrades.at(i) > 100){

If yes, the extra digits above 100 is added to the sumExtra

sumExtra = sumExtra + (testGrades.at(i) - 100);

}

The counter is increased, here

i++;

}

The loop is continued while the iterating variable i is less than NUM_VALS which is 4

while(i<NUM_VALS);

Which best explains the workplaces of employees in the Energy career cluster?

Employees work outdoors.
Employees can work in a wide variety of places.
Employees can work in a limited number of places.
Employees work indoors.

Answers

Answer: It’s Letter (B) the other ones just don’t fit.

Explanation:

Mark me as brainlest please?!!

Answer:

b

Explanation:

if you make homemade knitted garments and you sell them to individuals online, what e-commerce are you participating in?
is it B2B or B2C or C2C or SaaS

Answers

The Answer Of This Question Is C2C.

Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot.

Sample output with inputs: 5 8

Answers

I wrote my code in python 3.8:

def print_total_inches(num_feet, num_inches):

   return ((num_feet)*12) + num_inches

print("There are a total of {} inches".format(print_total_inches(5,8)))

I hope this helps!

g You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document

Answers

Answer:

It places the document in a buffer

Explanation:

Since the printer can only print a document at a time, the other document is going to be placed in a buffer.

The print buffer can be described as a location in memory that has the function of holding data that is going to be sent to a computers printer. A print job such as in this scenario may remain in the buffer because another document is to be printed first.

Sometimes a document could be put in the buffer because the computer is waiting for the printer to respond. This is just another reason why documents are placed in a buffer.

Write a script that inputs a line of plaintext and a distance value and outputs an encrypted text using a Caesar cipher.
The script should work for any printable characters. An example of the program input and output is shown below:
Enter a message: Hello world!
Enter the distance value: 4
Output: Lipps${svph%

Answers

Answer:

def encrypt_text(text,value):

   encoded = ""

   for i in range(len(text)):

       char = text[i]

       if (char.isupper()):

           encoded += chr"po"ord'po'char'pc' + value -65'pc' % 26 + 65'pc'

       else:

           encoded += chr'po'ord'po'char'pc' + value -97'pc' % 26 + 97'pc'

   return encoded

plaintext = input("Enter sentence of encrypt: ")

dist_value = int(input("Enter number: "))

encrypted = encrypt_text(plaintext, dist_value)

print(encrypted)

Explanation:

The python program above is a Ceasar cipher implementation. The encrypt_text function is defined to accept text input and a distance value, which is used to encrypt the plaintext.

The user can directly input text and the distance value from the prompt and get the encrypted text printed on the screen.

Lab9A: Warmup. Write a program that contains three methods: Method max (int x, int y, int z) returns the maximum value of three integer values. Method min (int X, int y, int z) returns the minimum value of three integer values. Method average (int x, int y, int z) returns the average of three integer values. Note: for Java and C#, these methods must be public and static. Prompt the user for three numbers, then call these methods from main to print out the minimum, maximum and average of numbers that the user entered. Your program should behave like the sample output below. Sample output #1 Enter number 1: 5 Enter number 2: 9 Enter number 3: 2 Min is 2 Max is 9 Average is 5.33333 Sample output 2 Enter number : 45 Enter number 2 : 11 Enter number 3: -3 Min is-3 Max is 45 Average is 17.6667

Answers

import java.util.Scanner;

import java.util.Arrays;

public class JavaApplication30 {

   public static int max(int x, int y, int z){

       int[] arr = {x, y, z};

       Arrays.sort(arr);

       return arr[2];

   }

   public static int min(int x, int y, int z){

       int[] arr = {x, y, z};

       Arrays.sort(arr);

       return arr[0];

   }

   public static double average(int x, int y, int z){

       return  (double) (x + y + z) / 3;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter your first number");

       int x = scan.nextInt();

       System.out.println("Enter your second number");

       int y = scan.nextInt();

       System.out.println("Enter your third number");

       int z = scan.nextInt();

       

       System.out.println("Min is "+min(x,y,z));

       System.out.println("Max is "+max(x,y,z));

       System.out.println("Average is "+average(x,y,z));

   }

   

}

I hope this helps! If you have any more questions, I'll try my best to answer them.

What is payload?
a block of data inside the packet
a block of data transmitted across a network
the maximum amount of data a network can transmit
a 32-bit numeric address

Answers

Answer:

a block of data inside the packet

Shrink-wrap, box-top, and click-wrap agreements are inherent to e-commerce. How you feel about them often depends on whether you are the vendor or purchaser. What are the best practices to assure shrink-wrap, box-top, and click-wrap agreements are legal? What are the best ethical practices that the e-commerce industry should adopt?

Answers

Answer:

Shrink-wrap, Box-top, and Click-wrap Agreements

a) The best practices to assure that shrink-wrap, box-top, and click-wrap agreements are legal include  

1) having e-commerce terms and conditions separate from the normal trade terms and conditions,  

2) ensuring that customers agree to the terms before entering into a transaction, and  

3) laying the code of conduct for all visitors interacting with your site or doing any business transaction on your site.

b) The best ethical practices that the e-commerce industry should adopt are:

1) Put additional layers of protection like a web application firewall to their websites.  

2) Ensure they always adhere to PCI (Payment Card Industry) compliance guidelines.

3) They should not store customers' data which they do not need.

4) Ensure privacy and security of customers' data.

5) Establish trust by safeguarding intellectual property rights.

6) Consider some environmental issues (customers care about them).

Explanation:

a) Websites' Terms and Conditions (T&C) establish some form of legal contract between the organization and its clients.  

b)To ensure that organizations that process, store, or transmit credit card information maintain secure online environment, they are required to comply with PCI DSS.  It is a set of Payment Card Industry requirements for all organizations involved in the use of online cards for payment for their goods and services.

a rectangle is 12 cm long and 9 cm wide.Its perimeter is doubled when each of its sides is increased by a fixed length.what is the length?​

Answers

Answer:

length = 12 cm

breadth = 9 cm.

perimeter of rectangle = 2( l+b)

= 2(12+9) = 2(21) = 42cm.

New length = (12+x) cm

New breath = (9+x) cm

2(12+x+9+x) = 42×2

2(21+x) = 84

21+ x = 84/2

21+x = 42

x= 42-21= 21

x= 21.

Therefore, length = (12+x)cm

=( 12+21) cm = 33cm.

Explanation:

Firstly we have written the length and breadth of the rectangle.

And the perimeter of rectangle i.e. 2(l+b)

Then, as it is in question we have doubled the perimeter

And at last, we have got the value of x.

and by putting the value in the new length we will get our answer.

hope you have got your answer dear.

20 pts, please write in JAVA. need this ASAP
In the Lesson Slides for this activity, we developed a method findChar for figuring out if a character was in a String.

The implementation was:

public boolean findChar(String string, String key)
{
for(int index = 0; index < string.length(); index++)
{
String character = string.substring(index,index+1);
if(character.equals(key))
{
return true;
}
}
return false;
}
However, there is a much more efficient and simple algorithm that we can use to determine if a character is in a String. Using the method signature public boolean findChar(String string, String key), figure out a more efficient method with a lower exection count.

Hint: We’ve learned a couple of methods that can tell us what index a character is at - can we use those to determine if the character is in a String?

Answers

public class JavaApplication78 {

   public boolean findChar(String string, String key){

       if (string.contains(key)){

           return true;

       }

      return false;

   }

   public static void main(String[] args) {

       JavaApplication78 java = new JavaApplication78();

       System.out.println(java.findChar("hello", "h"));

   }

   

}

First I created the findChar method using the contains method. It checks to see if a certain sequence of characters is in another string. We returned the result. In our main method, we had to create a new instance of our main class so we could call our findChar method.

Other Questions
Split 18 into the ratio 1:2 Choose the correct answer. Which sentence best expresses the central idea of the passage? A. The Cassini mission, funded by different space organizations, was launched in order to study the different moons of the planet Saturn to explore the ringed OB. The goal of the ambitious Cassini mission, funded by different space organizations, planet Saturn and study it in detail. OC. NASA launched the Cassini spacecraft with the intention of studying the planet Saturn and its moons. OD NASA, the European Space Agency (ESA), and the Italian space agency, Agenzia Spaziale Italiana (ASI) collaborated in order to launch the Cassini mission that would study the planet Saturn. Mt. Whitney in California is 14,494 feet above sea level.Write this number as an integer __________is an accurate way of drawing that shows an object'strue size and shape. Look at the chemical equation below. 2N2 + O2 2N2O How many Nitrogen molecules are present? ___________ How many Oxygen molecules are present? ___________ How many N2O molecules are present? ___________ PLEASE HELP !!!The following are the results of a cross between two pea plants where the dominant allele is round seeds and the recessive allele is wrinkled seeds: RR, RR, Rr, rrWhat is the probability that the offspring of this cross has two dominant alleles? 0% 25% 50% 75% 100% Alan spent $68 on fruit at the grocery store. He spent a total of $80 at the store. What percentage of the total did he spend on fruit? please actually look at the picture and do it correctly i need the correct answers i'll mark brainliest if you are correct An ant can travel at a constant speed of 780 inches every 5 minutes. How far can he travel in 9 minutes Jaylin has $50 in her fun account she deposit $ 10 per month into the account but $ 6 per month is deducted to pay for a streaming service How did king tut die and why You can tell if the value of a function for a certain interval is positive just by 2 points looking at its graph. If the value is positive that part of the graph will:a: be to the right of the y-axisb: be above the x-axisc: intersect the x-axisd: be below the x-axis The first four terms of a sequence are 16, 22, 28, 34, Which expression can be used to find the nth term of the sequence?A) 6 + 10nB)6 + 10(n - 1)C)10 + 6(n - 1)D)10 + 6n Students will be going to the zoo in a field trip entrance fee is $6.00 and you will be able to purchase drinks or food items for $2.00 each write an equation indicating the total cost of going to the zoo please help this is worth half of my grade! what letter represents the trough of the wave a,b,c,d,e Which letter indicates the route taken by Spanish explorer, Ponce de Len?A. B.C.D. Order all of the decimalsfrom least to greatest 0.34, 0.4, 0.98, 0.97, 0.46,0.309 A carbon ion with 10 electrons and 6 protons would have a charge of ? Political Geography of Latin America and the CaribbeanOnline ContentActiveClick to review the online content. Then answer the question(s) below, using complee sentences. Scroll down to viewadditional questions,Online Content Site 1Read the article titled "Castro Resigns." Why did the US impose trade sanctions against Cuba in 1962?BIUS22BarT How did the Battle of Saratoga affect the American Revolution?A. French Troops Joined the war on behalf of the colonists.B. The Hessian mercenaries were eliminated from the war.C. Continental soldiers were bribed to compromise the war.D. Washington withdrew from the war after another loss.E. About 10,000 Continental soldiers became prisoners of war.