You purchased a copy of a computer game “Plants vs. Zombie”. Then you follow the directions on the package how to install the game. This game is consist of

Answers

Answer 1

Answer:

Please explain what you mean by this.

Explanation:


Related Questions

What game is this??????????????????????

Answers

Answer:

rocket league

Explanation: cars and balls

Select the correct navigational path to change a chart's style in an Excel worksheet.

Answers

Select the correct navigational path to change a chart’s style in an Excel worksheet.

Select the table.

Click the  

✔ Design

tab on the ribbon and look in the  

✔ Chart Styles

group.

Select a new style from the templates available and release

Toggle the chart. The Design, Layout, and Format tabs have been added to the Chart Tools, which are displayed. Click the arrow in the Chart Elements box under the Current Selection group on the Format tab, then click the chart element you wish to alter the formatting style for.

What navigational path to change a chart's style?

Click on the chart, then press Ctrl + Shift + C to swiftly switch the type of chart you're using. By using this shortcut, you may rapidly browse between the various chart kinds to pick the one that best fits your data. 3. Click on the chart and then press Ctrl + to add a trend line to it.

Therefore, Click Move Chart in the Location group under Chart Tools on the Design tab. Choosing one of the following, Click New sheet, enter a name for the worksheet in the New sheet box, and then click the chart to transfer it to the new worksheet.

Learn more about Chart Styles here:

https://brainly.com/question/12154998

#SPJ5

What game is this ?? Helpp mee??

Answers

Answer:

GTA 5

Explanation:


1a. Ust Seven (7) Components of a Computer?
1b. Explain in Details the functions of Each one Mentioned Above
2a. What is Internet?
2b. Identity and Explain in Details the uses of internet to students of

Answers

Explanation:

1a. i know only 4 components of computer these are users, data,hardware & software

1b.users,the person who use the computer

data,it is the collection of raw facts and figures

hardware,is the physical part of the computer that can be seen and touch

software,is a set of program that instruct the computer to perform the certain action

2a,an internet is worldwide systen of interconnected computer network

2b.if some student want to now about something he can use internet and get the answer,to commenicate with others,and to learn online

4.15 LAB: Password modifier

Answers

I've included my code in the picture below. Best of luck.

The program written modifies inputted password, replacing certain characters to make it stronger. The program is written in python 3 thus ;

password = input("Set your password : ")

#accepts input from user meant for password

modified_password = ''

#initialize an empty string to hold the modified password

for val in password:

#loop through each password value

if val == 'i':

modified_password += "!"

elif val == 'a':

modified_password += ''

elif val == 'm' :

modified_password += 'M'

elif val == 'B' :

modified_password +='8'

elif val == 'o':

modified_password += '.'

else :

modified_password += val

#checks for certain values in the input and replaces them, with the output assigned to the modified password variable

print(modified_password+"q*s")

Sample run of the modified password with the string "q*s" concatenated at the end.

Learn more :https://brainly.com/question/15086326

For an indirect reference, what happens if there is no list of limited values authorized for a user in the direct reference?

a. SQL Injection
b. Brute Forcing of stored encrypted credentials
c. XML Injection
d. Access to sensitive data possible

Answers

Answer: Access to sensitive data possible

Explanation:

A reference is a value that allows a particular datum to be accessed indirectly by a program.

It should be noted that when there is no list of limited values authorized for a user in the direct reference, this will lead to a possibility for an access to sensitive data. Therefore, in order for this to be prevented, there should be a list of limited values that will be authorized for a user.

The absence of a list of limited values which would restrict access to certain files or data will lead to vulnerability of sensitive data. Hence, access to sensitive data possible.

The possibility of data being assessed by an unauthorized user is very likely when there is no restriction.

The reference is supposed to be key as a key to control the level of access given to users by providing a list of limited authorized values.

Hence, when these list is absent, then, access to sensitive data possible becomes very likely.

Learn more : https://brainly.com/question/16666220

Out-of-order instruction execution can cause problems because a later instruction may depend on the results from an earlier instruction. This situation is known as a ______ or a________

a. risk, reliance
b. hazard, reliance
c. risk, dependency
d. hazard, dependency

Answers

Answer:

C

Explanation:

_____, a quality system standard is a three-part, continuous cycle of planning, controlling, and documenting quality in an organization.

a. Seven run rule
b. ISO 9000
c. ASQ
d. Six Sigma

Answers

Answer:

b. ISO 9000

Explanation:

ISO 9000 can be defined as a quality system standard is a three-part, continuous cycle of planning, controlling, and documenting quality in an organization.

This ultimately implies that, the ISO 9000 is a set of standards that typically guides an organization in ensuring that they meet both the stakeholders and consumer requirements or needs with respect to their products and services under statutory and regulatory requirements at a specific period of time.

Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are maintaining your firewall and network security configuration correctly?

Answers

Explanation:

It is extremely important for organizations to adopt the principles of network security and firewall configuration according to the highest security parameters and requirements, because through vulnerabilities in an organization's network system, attacks by hackers and criminals can occur. they take advantage of some system failure to steal data and information, which can be detrimental to companies that may have stolen sensitive information, organizational performance data, bank account intrusion and asset theft, etc.

In order to avoid such problems, it is necessary to have a constant management of the network systems and organizational software, in order to maintain the control, prevention and security of the systems.

What will be the output of the given code?

class BookName {
public void book() {
System.out.println(“new book”);
}
}
public class Check{
public static void main(String args[]) {
BookName c1[] = new BookName [5];
for (int i = 0; i<10 ;i++) {
c1[i] = new BookName();
c1[i].book();
}
}
}

A. to print new book five times
B. to print the numeral 5 five times
C. a runtime error
D. to print new book 10times

Answers

Answer:

B

Explanation:

Why is body language an important indicator in business meetings? A. You will be able to communicate more strongly. B. You will know if your audience is engaged. O C. You will know how you look to your peers. O D. You will be a better oral presenter. SUB​

Answers

Answer:

you will know if your audience is engaged.

Explanation:

Answer:B

Explanation:

I just took the test

write an if statement to Test if a number stored in y is between 6 and 10 inclusive. only an if statement.

Answers

y = whatever value you want

if 5 < y < 11:

   print("Your number is between 6 and 10")

What would give Lucy, an entry-level candidate, an edge over others while she seeks a programmer’s position? Lucy, an entry-level candidate, is looking for her first job. Lucy has a high GPA in her college transcripts, skill using a multitude of software, and skills in many extracurricular activities. She completed an internship at a reputed IT organization while she was at college. Her portfolio contains many self-made programs.

Answers

Answer:

She completed an internship at a reputed IT organization while she was at college.

Explanation:

Based on her accomplishments the one aspect that would give her an advantage and set her apart from the competition would be that she completed an internship at a reputed IT organization while she was at college. Having done this means that she gained extremely valuable and recognized work-place experience that would be extremely valuable to any IT company looking to hire someone. Her other traits are all things that every individual applying for such a position must have including the portfolio of self-made programs.

Write an if-else statement for the following: If user_tickets is less than 5, assign 1 to num_tickets. Else, assign user_tickets to num_tickets

Answers

Solution :

function tickets(user_tickets){

var num_tickets;

if (user_tickets < 5) {

num_tickets = 1;

return ('num_tickets: '+ num_tickets);

}

else {

num_tickets = user_tickets;

 return('num_tickets: '+ num_tickets);

}

}

// Testing the tickets function

// With user_tickets = 3, 5, 8, and 1

console.log(tickets(3));

console.log(tickets(5));

console.log(tickets(8));

console.log(tickets(1));

Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goal is to convince the recipient into submitting personal information, such as passwords or bank account numbers.

Question 9 options:
True
False

Answers

Answer:

this is true

Explanation:

the answer is true

The answer is true .

What do people do when they navigate using GPS

Answers

Answer:

they use  it when they are driving and when they dont know where they are doing

Explanation:

GPS or also known as Global Positioning System. It helps people locate and locate locations. Many people are using it for navigation.

Write a program that will input two numbers and print the larger number on the screen.

Answers

num1 = float(input("Enter the first number: "))

num2 = float(input("Enter the second number: "))

if num1 > num2:

   print(num1)

else:

   print(num2)

I hope this helps!

PLEASE HURRY AND BE SERIOUS

Which of the following statements is true of a hierarchical addressing scheme? Check all of the boxes that apply.

It includes different parts that represent the location of a computer or device on a network.

It presents numbers in a randomized format.

It is used for IP addresses.

Answers

Answer:

It is used for IP addresses.  It includes different parts that represent the location of a computer or device on a network.

Explanation: My dad is a professional engineer

Answer:

Its A and C

Explanation:

I did it on ed2020

08408519 kahoot code

Answers

Answer:

ill join

Explanation:

Answer:

the code 08408519 dosent work

Explanation:

Complete the Car class by creating an attribute purchase_price (type int) and the method print_info() that outputs the car's information.
Ex:
If the input is:
2011
18000
2018
where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs:
Car's information:
Model year: 2011
Purchase price: 18000
Current value: 5770
Note: print_info() should use three spaces for indentation.
This is what is given
class Car:
def __init__(self):
self.model_year = 0
# TODO: Declare purchase_price attribute

self.current_value = 0

def calc_current_value(self, current_year):
depreciation_rate = 0.15
# Car depreciation formula
car_age = current_year - self.model_year
self.current_value = round(self.purchase_price * (1 - depreciation_rate) ** car_age)

# TODO: Define print_info() method to output model_year, purchase_price, and current_value

if __name__ == "__main__":
year = int(input())
price = int(input())
current_year = int(input())

my_car = Car()
my_car.model_year = year
my_car.purchase_price = price
my_car.calc_current_value(current_year)
my_car.print_info()

Answers

Answer:

Just add this and yoyr code should work.

Explanation:

def print_info(self):

      print("Car's information:")

      print("   Model year:", self.model_year)

      print("   Purchase price:", self.purchase_price)

      print("   Current value:", self.current_value)

Classes are templates used when an object is to be created while methods are functions that are executed when called or evoked

To declare the attribute purchase_price (type int), we make use of the self keyword, and we initialize the value to 0

So, the declaration of the purchase_price attribute is:        

self.purchase_price = 0

To define the print_info() method, we simply evoke the model_year and the purchase_price attributes.

So, the definition of the print_info() method is:

def print_info(self):

    print("Car's information:")

    print(" Model year:", self.model_year)

    print("Purchase price:", self.purchase_price)

Read more about class and methods at:

https://brainly.com/question/15125793

Which of these is not an application software?
A. Control and Measurement
B. APPS
C. Spreadsheets
D. Utilities​

Answers

A; control and measurment

Answer:

D. utilities should be the answer

Write the definition of a void function that takes as input an integer and outputs two times the number if it is even; otherwise it outputs five times the number.

Answers

Answer:

Written in C++

void number(int n){

if(n%2 == 0)

cout<<2 * n;

else

cout<<5 * n;

}

Explanation:

The programming language is not stated.

However, I answered using C++

This line defines the function as void

void number(int n){

This line checks if the number is even

if(n%2 == 0)

If yes, it doubles the number and prints the output

cout<<2 * n;

If otherwise,

else

It multiplies the number by 5 and prints the output

cout<<5 * n;

}

To call the function from main, use:

number(n);

Note than n must be declared as integer

See attachment

Where can a user find the set of tools used for adjusting the magnification of a slide

Answers

At the top left corner 6 small spots down, you can find it. (Highlighted Orange)

( Marking me Brainlyst will help my rank <3 )

what could a company do if it was using a commercial wan and a vulnerability appered thst allowed attackers

Answers

Answer:

The answer is below

Explanation :

If a company was using a commercial WAN and a vulnerability appeared that allowed attackers find routing information and therefore be able to eavesdrop on corporate transmissions "It is expected that such a company should try to formulate and establish Virtual Private Networks between corporate sites.

This will ultimately lead to intercepted transmissions to be unreadable. Though such means have been seen as time-consuming."

Spyware is malicious software installed on a computer without the owner’s knowledge. It is designed to monitor data and allow unauthorized remote access.

Question 6 options:

True

False

Answers

Answer:

True

Explanation:

What solicits online input such as product ratings from consumers?
A qiuck response code
Computer forensics
Crowdsourcing
Or Crowdfunding?

Answers

Answer:

Crowdsourcing I think is the correct answer. "A quick response code" and "Computer Forensics" both don't make sense as answers, and Crowdfunding is specifically for money.

Type the correct answer in the box. Spell all words correctly.

Review the situation below and identify the television system in use.

Laura lives in the mountainous state of Nevada. She doesn’t receive very good television reception. She wonders whether there is a problem with her television set or the antenna she uses. Her neighbor Patsy does not have any problem with her television reception. Patsy also mentioned that she has no antenna. Patsy is possibly using a ___ television system.

Answers

Answer:

Patsy is possibly using a cable television system.

Explanation:

The cable television system is the private television service provision system that is provided not through signals captured by means of antennas, but through coaxial cables that are connected from the home to the poles belonging to the providers, located on the public road.

The advantages of wired televission are relatively high sound and image quality with a minimum of interference with the simplicity and low cost of subscriber receivers.

How is the two point formula used to find the equation of a line when 2 points are known?

Answers

y-y1=((y2-y1)/(x2-x1))(x-x1)
Here (x1,y1) and (x2,y2) are the given points
taking the change in y over the change in x

how i simplify this boolean expression ?A'.B'.C'+A'.B'.C+A'.B.C+A.B'.C+A.B.C

Answers

Answer:

A⁵+B⁵+C⁵

A+A+A+A+A= A⁵

B+B+B+B+B=B⁵

C+C+C+C+C= C⁵

Answer:

woah thats crazy i have no clue

im so sorry

Explanation:

I want to make apps but I don't know how and which things I have to learn first ,so if you know mention from starting to ending​

Answers

Answer:

There are a lot to learn, especially the basics. I'd suggest using SolorLearn for this.

Other Questions
Jeremy's password is the combination of letters and numbers shown below. Hewants to know the ratio of letters to numbers in this password. Use Jeremy'spassword to write the ratio THREE different ways. (Hint: think about the differentformats) 27 R Q A58 E 3 (plz help I know the problem mightseem long but not really) i need help on 17, 18, 19 and 20 i will be giving a brainliest Why did colonists fear creating a federal government that was too strong For each words use a sentence ( your own) Which of the following were part of the Treaty of Paris 1783? Select ALL that apply.Question 13 options:The British were to fully withdraw all troops from US landsThe British would cede all lands east of the Mississippi River and North to Canada to the United States except for Florida, which would be given back to SpainThe United States would gain independenceThe US would have to purchase the western lands from the British for 7 million dollarsThe British would continue to have economic control over the United States How did the Hindu beliefs of karma and dharma support the caste system? *Karma is created by the good or evil deeds of a personKarma is what determines the caste a person is in.The only way to rise to a different caste is to follow dharma.All of the above An estimate for - 72 isA.- 8.1b. - 8.5c. -9.1d. -9.5 After the death of Mohammed, Mehmed II was chosen to be the leader of Islam.Please select the best answer from the choices providedTF Celestial Crane Cosmetics is analyzing a project that requires an initial investment of $2,750,000. The projects expected cash flows are:Year Cash Flow1 $350,0002 -125,0003 450,0004 425,000Celestial Crane Cosmetics's WACC is 9%, and the project has the same risk as the firm's average project.1. Calculate this project's modified internal rate of return (MIRR). Choose from the options given below:a. 23.25%b. 17.19%c. 24.26%d. -18.52%2. If Celestial Crane Cosmetics's managers select projects based on the MIRR criterion, they should _ _ _ _ _ this independent project. In the disorder called "dissociative identity disorder," the "alters," or distinct personalities:O a. may all be present simultaneously.O b. are typically all the same age.O c. are typically all the same gender.O d. can be of different ages and sexes. I don't know what this equals?? PLEASE HELP!! I WILL GIVE BRAINLIEST! When elements combine to form a mixture, the resulting chemical properties may be very different from those of the elements that make it. true or false Extracellular matrix is made of extracellular protein fibers and ground substance.True or False? 3. Which ONE of the two products (outputs) of photosynthesis will the plant store in their cells for furtheruse? Perry wants to project a movie from his phone to a screen on the wall. The side length of the screen is 56 inches. The scale from the screen to the phone is 7 inches to 1 inch. What is the side length of perry's phone? Choose three excerpts from the text that tells you what the people of Ghana were like. How do you think plant cells differ from animal cells? (Hint: What can plants do that animalscannot?)Gizmo The CFO of Ward Enterprises is setting up a new activity-based costing system. He has currently finished identifying activities and mapping overhead costs to cost pools associated with each activity. What is the next step for him to take in the process of designing an activity-based costing system?a. Identify a cost driver associated with each activity. b. Determine the appropriate denominator volume for each cost driver, to calculate an activity rate. c. Add the cost pool totals together. d. Divide each cost pool by the number of units produced The regular price of a bag is $41.45. During the sale, the bag was marked 20% off. What was the price of the bag during the sale?$8.29$33.16$39.45