What game is this?????? ?

What Game Is This?????? ?

Answers

Answer 1

Answer:

name the emoji

Explanation:

Answer 2

Answer:

Stop wasting points

Explanation:


Related Questions


This the code from the last post I did

Answers

import java.util.Scanner;

public class JavaApplication86 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       int x = 0, c = 0, sum = 0;

       while (true){

           x = scan.nextInt();

           System.out.println("You entered: "+x);

           if (x == -1){

               break;

           }

           sum += x;

           c++;

       }

       System.out.println("The sum is "+sum);

       System.out.println("You entered "+c +" numbers");

   }

   

}

This works for me. Instead of subtracting one from c and adding one to sum, I used an if statement to break away from the while loop if the entered number is -1.

What game is this? help mee?

Answers

Answer:

nooooooo

Explanation:

__init__(self, features, phones): create/initialize instance variables for features and the list of phones (optional) in the plan. When phones is not provided, use an empty list as its initial value. Create an instance variable

Answers

Answer:

class Phone(object):

   def __init__(self, features, phones=[]):

       self.features = features

       self.phones = phones

Explanation:

In python object-oriented programming, an instance variable of a class object is created in the "__init__()" method. the "self" is a convention name used to represent the instance of an object class. The input values are assigned to the object variable with the self.'argument_name' statement.

When the phone argument is not given, the self.phones variable is initialized as an empty list.  

Write a C++ program that reads a temperature value and the letter C for Celsius or F for Fahrenheit. Print whether water is liquid, solid, or gaseous

Answers

Answer:

(1) #include<iostream>

(2) #include<conio.h>

(3) using namespace std;

(4) void main()

(5) {  

(6) float temp;

(7) char sel;

(8)    cout<<“Select a temperature value in Celcius or Fahrenheit.\n”;

(9)   cout<<“Press C for Celcius.\n”;

(10)   cout<<“Press F for Fahrenheit.\n”;

(11)  cin>>sel;

(12) switch (sel)

(13){

(14)case ‘C’:

(15) cout<<“Enter a temperature value in Celcius: “;

(16)cin>>temp;

(17) if(temp<=0)

(18)   {

(19)   cout<<“Water is solid at “<<temp<<” degree C.”;

(20)   }

(21)  else if(temp>=100)

(22)   {

(23)  cout<<“Water is gaseous at “<<temp<<” degree C.”;

(24) }

(25) else

(26)    {

(27)   cout<<“Water is liquid at “<<temp<<” degree C.”;

(28)  }

(29)         break;

(30)  case ‘F’:

(31)     cout<<“Enter a temperature value in Fahrenheit: “;

(32)   cin>>temp;

(33)   if(temp<=32)

(34)  {

(35)  cout<<“Water is solid at “<<temp<<” degree F.”;

(36)    }

(37)    else if(temp>=212)

(38)  {

(39)   cout<<“Water is gaseous at “<<temp<<“degree F.”;

(40)  }

(41)    else

(42)   {

(43)  cout<<“Water is liquid at “<<temp<<” F.”;

(44)    }        

(45)    break;

(46)  }  

(47)   getch();

(48) }

Question 1 of 20 Gus has decided to organize his inbox on June 26 by using folders and deleting irrelevant messages. He creates a folder called "Project XYZ" for all relevant emails related to this project. Which of the following emails should he save in this folder instead of deleting or moving it to another folder? O A. Schedule Update for Project XYZ B. Update: New Time and Location for May 20 Meeting for Project XYZ C. Time and Location for May 20 Meeting for Project XYZ D. New Project EFG to Launch Next Week SUB​

Answers

Answer: Schedule Update for Project XYZ

Explanation:

Answer:

A. Schedule Update for Project XYZ

Which of the following tools can be used to aggregate relational data from multiple sources?
A.)Power Pivot
B.)PivotTables
C.)Get & Transform

Answers

Answer:

ApOWER PIVOT

Explanation:

The tools that can be used to aggregate relational data from multiple sources is Power Pivot.

Data aggregation is the known as putting or gathering of data and presenting a summary form of it.

The data can be gathered from multiple data sources with the intent of combining these data sources into a summary for data analysis.

conclusively, Data warehouses gives users room to run queries, compile reports, generate analysis, and retrieve data in a consistent format.

Learn more from

https://brainly.com/question/21263038

Wake up to reality. Nothing ever goes as planned in this world. The longer you live,the more you realize that only pain, suffering and futility in this reality.

what show is this from correct answer gets brainly (i already know what show its from)​

Answers

Answer:

Naruto

Explanation:

Madara Uchiha said that TwT

-LavenderVye


What is the device that is non-volatile sometime called external memory?

Answers

Answer:

bcause when the computer crashes and shuch the thing is fine becasue all it does is store

Explanation:

PLZZZZZZZZZZZZZZZ HELP ME OUT!!!!! I SICK AND TIRED OF PEOPLE SKIPING MY QUESTION WHICH IS DUE TODAY!!!!ANSWER THEM ALL PLZ

DIABETES: What causes this condition? *

DIABETES: What are the symptoms of this condition? *


DIABETES: Does this condition explain why Elisa may be tired? (Why or why not?) *

DIABETES: Which molecule is most likely affected by this condition: oxygen, glucose, or amino acids? *

ANEMIA: What causes this condition? *

ANEMIA: What are the symptoms of this condition? *

ANEMIA: Does this condition explain why Elisa may be tired? (Why or why not?) *


ANEMIA: Which molecule is most likely affected by this condition: oxygen, glucose, or amino acids? *

Answers

Answer:

Explanation:

Being overweight, eating unhealthy, and not exercising can cause diabetes.

Some symptoms of diabetes are being sleepy, being very thirsty, losing weight without trying to, being very hungry, having dry skin, and your hands or feet being numb are some symptoms.

This conditions does explain why Elsa may be tired because tiredness is a symptom of diabetes.

Glucose is most likely affected by diabetes.

Having a shortage of iron in your body causes anemia

Symptoms of anemia are weakness, fatigue, shortness of breath, pale skin, chest pain, and dizziness.

Anemia may be the reason Elisa is tired because it causes fatigue and weakness.

Oxygen is most likely affected by anemia.

write a program to Test if mold is stored in the variable word.

Answers

word = whatever value you want.

if "mold" in word:

   print("Mold is in the variable word.")

else:

   print("Mold is not in the variable word.")

A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that reads through the file and stores the largest number read in a variable named maxvalue.
** PYTHON**

Answers

f = open("numbers.txt", "r")

lst = [int(x) for x in f.read().splitlines()]

maxvalue = max(lst)

This works for me. Best of luck. If you want to test the code in an ide, use print(maxvalue) at the end of the code to see the value of your maxvalue variable.

Users can customize their Windows device by going to the Control Panel under __________.

Answers

Answer:

The Settings app

Explanation:

The control panel on windows can be accessed by going into the settings app, or by going to the side bar and clicking the gear icon.

Answer:

hmmmm i would say system preferences but i may be incorrect

Explanation:


To identify a document as a template, you will need to change the file type in the_____ dialog box.

A. Options

B. Save As

C. References

D. Template

Answers

Answer:

A) options this is correct

Explanation:

Answer:

The answer is definitely option A

Explanation:

Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base.

Answers

Answer:

double pyramidVolume(double baseLength, double baseWidth, double pyramidHeight)

{

  return baseLength * baseWidth * pyramidHeight / 3.0;

}

A manufacturer of scented candles is preparing to produce five new candles with fragrances of peppermint, cinnamon, lemon, spice pumpkin, and pine scents to sell for the holiday season. To track the sale of the new scented candles you will need to create a program that should use two parallel element arrays. An array that will hold the names of the 5 new scented candles and another array that holds the count of the 5 new scented candles that are sold over the next couple of months. The program will track the fragrance type of the candle purchased and the number of candles sold for each fragrance. The program should also generate a report that displays the fragrance type of the 1.largest number and 2.smallest number of candles sold and the 3.total sales of all candles purchased.

Answers

Answer:

Why are you asking someone to create a program

Explanation:

Declare report candle fragrance_]{459.’~

What is the character missing in the line of code below that is part of the pseudocode outline of a program?
______ Get the user's height.

Answers

Answer:

# Get the user's height.

Explanation:

The answer is #

Answer: #

Explanation: got it right on edgen

A local bank has just one branch. It sets up a peer-to-peer network for all devices on the system. The bank would like to be able to have one technician administer the entire network from his location outside the bank without having to go to the bank each time there is a problem. Will this be possible for the technician?

A. It will not work because it is not possible to have the technician administer from one single location.

B. It will not work because the bank needs to use a server in a central location to allow for the remote access.

C. It will work as long as a LAN network is established to facilitate the communication between devices.

D. It will work if it uses a WAN to bring in all of the LANs to one central location.

CORRECT ANSWER IS B!

Answers

B
Good luck hope you get a good grade

It will not work because the bank needs to use a server in a central location to allow for the remote access, hence option B is correct.

What is a peer-to-peer network?

A distributed application architecture known as peer-to-peer computing or networking divides jobs or workloads across peers.

Peers are equally qualified and capable members of the network. They are referred to as the nodes in a peer-to-peer network.

In the hypothetical situation, the technician is unable to manage the complete network from outside the bank. Every time a problem arises, the technician must visit the bank.

Therefore, in order to give them the desired remote access, I need a server that is situated in a strategic location, hence option B is correct.

Learn more about peer-to-peer network, here:

https://brainly.com/question/10571780

#SPJ5

Which statements are true about different software?

You can use a word processor to write, edit, print, and perform a variety of modifications on a document. Word processors work with entirely text-based documents without images or video. Spreadsheet programs enable users to perform statistical functions and create charts and graphs for data analysis. Managers can use database software to discuss financial performance with the help of slideshows. Graphics software, audio- and video-editing software, and media players are all examples of system software.

Answers

Answer:

You can use a word processor to write, edit, print, and perform a variety of modifications on a document.

Spreadsheet programs enable users to perform statistical functions and create charts and graphs for data analysis.

Explanation:

Took the test

Which of the following should be implemented when there is a period of high employee turnover?

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The question is about which of the following should be implemented when there is a period of high employee turnover?

The options to this question are given below.

A review of NTLM hashes on the domain servers A review of group policies A review of user access and rights A review of storage and retention policies

The correct option to this question is-3:

A review of user access and right.

Other options are not correct because these options are not related to review when employee turnover is going high etc.

With _____, rather than automation, humans are in the decision loop, with machines rapidly executing the approved tasks.

Answers

Answer:

artificial intelligence

Explanation:

Remember, the term Artificial intelligence in simple words refers to a technology that enables machines (such as computers) to make decisions, plan activities, and execute tasks.

So in a sense, with widespread usage of artificial intelligence, humans would no longer play active roles in executing tasks but the machines will; doing so rapidly.

(Print distinct numbers) Write a program that reads in numbers
separated by a space in one line and displays distinct numbers (i.e., if
a number appears multiple times, it is displayed only once). (Hint:
Read all the numbers and store them in list1. Create a new list list2.
Add a number in list1 to list2. If the number is already in the list,
ignore it.)

Answers

I've included my code in the picture below.

Which two statements are true about an OS?

translates the user’s instructions into binary to get the desired output
-needs to be compulsorily installed manually after purchasing the hardware
-is responsible for memory and device management
-delegates the booting process to other devices
-is responsible for system security

Answers

The correct answers are A and C
Please give me brainless

Answer:

See answers below :)

Explanation:

-is responsible for memory and device management

-is responsible for system security

For an indirect reference, what happens if there is no list of limited values authorized for a user in the direct reference?

a. SQL Injection
b. Brute Forcing of stored encrypted credentials
c. XML Injection
d. Access to sensitive data possible

Answers

Answer: Access to sensitive data possible

Explanation:

A reference is a value that allows a particular datum to be accessed indirectly by a program.

It should be noted that when there is no list of limited values authorized for a user in the direct reference, this will lead to a possibility for an access to sensitive data. Therefore, in order for this to be prevented, there should be a list of limited values that will be authorized for a user.

The absence of a list of limited values which would restrict access to certain files or data will lead to vulnerability of sensitive data. Hence, access to sensitive data possible.

The possibility of data being assessed by an unauthorized user is very likely when there is no restriction.

The reference is supposed to be key as a key to control the level of access given to users by providing a list of limited authorized values.

Hence, when these list is absent, then, access to sensitive data possible becomes very likely.

Learn more : https://brainly.com/question/16666220

I need help with my previous question please

Answers

I can’t find your previous question :(

The Fibonacci sequence is a famous sequence in mathematics. The first two elements are defined as 1, 1. Subsequent elements are defined as the sum of the preceding two elements. For example, the third element is 2 (=1+1), the fourth element is 3 (=1+2), the fifth element is 5 (=2+3), and so on.

Required;
Use a for loop to create a vector which contains the first 50 Fibonacci numbers.

Answers

Answer:

Written using C++

#include <iostream>  

#include <vector>  

using namespace std;  

int main() {  

vector<int> fibb;  

int n1 = 0;

int n2 = 1;

int temp;

for (int nm= 0; nm < 50;nm++) {

 fibb.push_back(n1);

 temp = n1 + n2;

 n1 = n2;

 n2 = temp;

}

for (int nm= 0; nm < 50;nm++) {

{

 cout<<fibb.at(nm)<<" ";

}

return 0;  

}

Explanation:

#include <iostream>  

#include <vector>  

using namespace std;  

int main() {  

This line declares the vector as integer

vector<int> fibb;  

This line initializes the first term to 0

int n1 = 0;

This line initializes the second term to 1

int n2 = 1;

This line declares a temporary variable

int temp;

The following iteration populates the vector with first 50 Fibonacci series

for (int nm= 0; nm < 50;nm++) {

This push an entry into the vector

 fibb.push_back(n1);

The following generate the next Fibonacci element

 temp = n1 + n2;

 n1 = n2;

 n2 = temp;

}

The following iteration prints the generated series

for (int nm= 0; nm < 50;nm++) {

 cout<<fibb.at(nm)<<" ";

}

return 0;  

}

Give the pseudocode of a data structure that supports the stack push and pop operations, and a third operation findMin, which returns the smallest element in the data structure, all in O(1) worst-case time.

Answers

Answer:

start Stack push:

IF stack is full

   return NULL

ENDIF

stack_top = stack_top + 1

stack[ stack_top] = data

end

start stack pop:

IF stack is empty

   return NULL

ENDIF

data = stack[ stack_top]

stack_top = stack_top - 1

end

start stack findMin:

SORT stack in ascending order

min = stack[0]

RETURN min

end

Explanation:

Pseudocode is the description of an algorithm to be used to implement a program code. The pseudocode above describes the step by step implementation of the stack data structure 'push', 'pop', and a new 'findMin' function. The findMin function sorts and gets the minimum value of the elements in the stack. The push and pop operators add and remove items from a stack.

The pseudocode of all three functions does not iterate over the stack element, but gets the constant values of an item in the stack, giving it a time complexity of 1 (O(1) in big-O notation).

Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, and output all integers less than or equal to that value.

Answers

lst = input().split()

lst.pop(0)

w = lst[-1]

lst.pop(-1)

newlst = [int(x) for x in lst if int(x) <= int(w)]

print(newlst)

This works for me. Best of luck.

Which of the following is most often a barrier to software migration?
It's easier to continue using an out-of-date software program as long as possible.
O It's usually cheaper to upgrade software than it is to purchase a new product.
O It's difficult to find new software that is secure enough to replace the old software.
O It's not possible to keep old data when migrating to a new software program.

Answers

Answer: B: It's usually cheaper to upgrade software than it is to purchase a new product.

Explanation: I googled it lol :)

Answer:

b

Explanation:

b

A man is charged a fee by the city for having numerous broken cars and auto parts in his front yard. Which of the following correctly describes why the city punishes him? He has committed a crime. He is in violation of a city statute. He has violated an amendment of the U.S. Constitution. A judge has decided that he is in violation of civil law.

Answers

Answer:

Violation of city Statute

         

Answer:

B

Explanation:

d) Software which is basically language translation software.​

Answers

Answer:

tayanaf

Explan

ation:صثح

Other Questions
Which of the following should be implemented when there is a period of high employee turnover? Kate is 4 years older than Bob. If the sum of their ages is 28, what are the ages ofKate and Bob? The landlady creative writing Discuss the role of foreshadowing in the story. How does the author prepare the reader for the ending from the very first page? (20marks) Write your own problem about money or elevation that uses a number and its opposite Solve the problem Then explain what 0 means in your problem. Solve the problem. Then explain what zero means in your problem PLEASE ANSWER URGENT WILL GIVE BRAINLIEST AND 20 POINTS.Ken needs to solve the equation below. 4.7 y = 10.35 Which statement explains the value of y that makes the equation true? A) 5.65, because 4.7 must be subtracted from both sides before moving the negative sign to the opposite side B)5.65, because the only step needed is to subtract 4.7 from 10.35C)15.05, because 10.35 and 4.7 must be added before moving the negative sign to the opposite sideD) 15.05, because the only step needed is to add 4.7 and 10.35 A swimming pool is draining at a constant rate. The table shows the proportional relationship between the change in the water level and the number of hours the pool is draining. Find the constant of proportionality. Then find the change in the water level at 9 hours and at 23 hours of draining.Draining Swimming PoolHours DrainingChange in Water Level (in.)2 3.59?1729.7523?The swimming pool is draining at a rate of nothing inches per hour.(Type an integer or a decimal.)Enter your answer in the answer box and then click Check Answer. RIVERDALE FANShow is alice dating FP if Juhhead and Betty dating How broad is the rainbow system? Elena has some bottles of water that each holds 17 fluid ounces. Write and equation that relates the number of bottles of water (b) to the total volume of water (w) in fluid ounces?? Lack of employment and income opportunities are pushing large contingents of people to frontier areas and new economic activities, such as gold mining, in the Amazonian region. The number of independent gold miners exceeded 200,000 by 1990. The mining process generates very dangerous and poisonous mercury pollution (mercury is used to separate the gold from other materials), and destroys aquatic and forest habitats. The local population whose diet depends on fish are now threatened by mercury poisoning, as are the miners themselves. United Nations Research Institute for Social Development Read the text, then use the drop-down menus to complete the statements. People have turned to gold mining because of a lack of opportunities. The is dangerous because it generates mercury . 3.* Write a vector that describes the translation of quadrilateral WXYZ if the coordinatesare W(2,2), X(6,2), Y(2,7), Z(6,7) and the coordinates of W'(5,7).a b. |c. d. (3,5)I sin the quadrilateral fra4 Question 92 ptsThe molecules of a cell membrane areO linked to other cells to form long chains of cells.O floating around one another in a fluid structure.O locked together in a rigid structure.connected to the cytoplasm by strong chemical bonds. SOMEONE HELP ASAP !!NEED THIS IN FIVE MINS !! Ill give brainliest!! Please and ty !!! Mr. Stokes bought 6 1/2 pounds of meat for a party. He used 2 1/4 pounds of meat to make tacos. The rest he used to make 1/4 pound burgers. How many burgers did Mr. Stokes make? Garret owns an older car worth about $5,000. He thinks he is paying too much for auto insurance and wants to find out how he can save money. He decides to look into raising his deductible from $250 to $1,000. By doing this, he can save $200 per year. If Garret raises the deductible, will it be worth the risk? Defend your answer. Why are parents buying more puzzles thanever before?A)Schools and daycares have forbidden kidsfrom playing with puzzles.B)Their children are at home with nothing todo because of the pandemic.C)Normal board games are out of stock.D)WiFi systems are being overtaxed withdemand. After signing a treaty creating the Yakama reservation, Chief Kamiakin A agreed to disband the tribe after conflict with white settlers.B led efforts to fight encroachment by white settlers onto former lands.C joined forces with other tribes to attack white settlers on former lands.D allowed his people to continue to fish and hunt on former lands.BEING TIMED HELP Using the information recorded by seismographs, scientists learned more about the depth and density of Earths layers. True False ce noM GmaIf the radius of this Ferris wheel is 125 feet and the angle between each seat is 36,then what is the height of the Ferris wheel seat at point B if the bottom of the wheel is20 feet off the ground? (Round to the nearest tenth) PLZ ANSWER QUICKLY! TIMED!Select all that apply. Select all barriers to oral communication.well organizedlazinesslack of time for preparationaccentbeing unpreparednot paying attentionnoise