Answer:
Genshin Impact and you can fight me on it.
Explanation:
The game has way more to explore and offer with different fighting styles which include Magic and Swords fighting. It also has more story and I appreciate that!
The side quests to get tedious though so the final rating is 8.79//10.00
Answer:
genshin
Explanation:
Color codes are stored as:
A) int
B) float
C) dec
D) Strings
Answer:
the correct answer is Strings, have a great evening yall
Explanation:
A website is unencrypted. Which tool can be used to stop the website’s traffic and analyze the information on it?
Answer:
Explanation:
Web analytics is the computation, amassing, study and reporting of web data for purposes of accepting and adjust web custom. although, Web analytics is not just a method for measuring web traffic but can be used as a tool for job and market study, and to determine and become better the effectiveness of a website. Web analytics applications can also help companies measure the broadcast advertising attacks. Web analytics support information about the number of users to a website and the number of page views. It helps measure traffic and popularity trends which is useful for market study.
Which of the following is NOT an acceptable way to create a color?
A) O "cyan"
B) O "#ff2341"
C) blue
D) "RGB (0, 15, 234)"
The option that is not an acceptable way to create a color is blue.
How can I create a color?There are a lot of ways to create some unique color such as the additions of colors together. An example is the addition of purple, orange, and green together.
Note that blue on its own cannot create another color and as such, The option that is not an acceptable way to create a color is blue.
Learn more about color from
https://brainly.com/question/4431200
#SPJ2
How is net pay different from gross pay?
if you hard working right now go to this EASY question
#BRAINLY and I will give you brainlist something I forgot what's it called for your hard work
what three factors helped the Wright brothers achieve success in controlled sustained and powered flight?
What responsibilities does the film editor have? (Select all that apply).
Answer:
“Revising the script”, “reading the script”, and “manipulating graphics, plot, sound, and score”
Explanation:
Which are the following 4 things something must be able to do in order to be a computer? *
Answer:
There are four main equipment functions of a computer system: Input, Processing, Storage and Output.
Explanation:
A beam of light travels in air and then passes through a piece of glass at an angle of 45 degrees to the normal. As the light passes from the air into the piece of glass, the light ray is bent, what is the angle of refraction measured from the normal?
Answer:
The angle of refraction measured from the normal is approximately 28.13°
Explanation:
The angle of refraction is the angle made by the refracted ray and the normal line drawn at the point where the ray passes through the interface of the two mediums
According to Snell's law, we have;
[tex]_1 n_2 = \dfrac{n_1}{n_2} = \dfrac{sin \, \theta _2}{sin \, \theta _1}[/tex]
n₁·sin (θ₁) = n₂·sin(θ₂)
Where;
₁n₂ = The refractive index of air to glass = 1.5
n₁ = The refractive index of air = 1
n₂ = The refractive index of glass ≈ 1.5
θ₁ = The angle of incidence = 45°
θ₂ = The angle of refraction measured from the normal
Therefore, we have;
1/1.5 = sin(θ₂)/sin(45°)
sin(θ₂) = sin(45°)/1.5 = (√2)/2/(3/2) = (√2)/3
∴ θ₂ = arcsin((√2)/3) ≈ 28.13°
The angle of refraction measured from the normal = θ₂ ≈ 28.13°.
Lin wants to play an online game with her friends. She read the description of the game and knows it contains several features with addictive design, including rewards for completing levels and long game times with penalties for quitting early. She likes the game but doesn’t want to get sucked in and skip her homework (which has happened before)! Name two guidelines Lin should set for herself before playing the game.
Answer:
Set a time limit for herself. Ask her parents for help monitering her app usage.
Jeff is at his workplace and needs a file from his computer at home. Which protocol can Jeff use to access this file from a remote location? A HTTP B. POP3 C. LDAP D. Telnet
can someone help me answer this, I can’t fail tysm :)
What do you type in the “subject” box
(A)The title of your email/summary of what you need
(B) The persons name you are sending an email to
(C) The question you are asking
I will mark brainliest
Answer:
the correct answer is: (A) The title/summary of what you need.
Explanation:
The subject is what the receiver see's when going across the email. Putting the summary of what the email is about in subject allows them to see what the email is mainly about seeing if they should continue reading the email or not. So providing the summary pf the email lets the receiver know what the email is about. Hope this helps! :D
2.32 LAB: Musical note frequencies On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance (number of keys) from that key, and r is 2(1/12). Given an initial key frequency, output that frequency and the next 4 higher key frequencies. Output each floating-point value with two digits after the decimal point, which can be achieved by executing cout << fixed << setprecision(2); once before all other cout statements. Ex: If the input is: 440.0 (which is the A key near the middle of a piano keyboard), the output is: 440.00 466.16 493.88 523.25 554.37
Answer:
Explanation:
[tex]\text{This is a python code:}[/tex]
[tex]\text{import math}[/tex]
[tex]your {\_} {value 1 }= float(inpu \ t ())[/tex]
[tex]your{\_}value 2 = your{\_}value1*math.exp(1 * math.log(2) / 12)[/tex]
[tex]your{\_}value 3 = your{\_}value1*math.exp(2 * math.log(2) / 12)[/tex]
[tex]your{\_}value 4 = your{\_}value1*math.exp(3 * math.log(2) / 12)[/tex]
[tex]your{\_}value 5 = your{\_}value1*math.exp(4 * math.log(2) / 12)[/tex]
[tex]print('\{:.2f\} \{:.2f\} \{:.2f\} \{:.2f\} \{:.2f\}'.format(your\_value1, \ your\_value2, \ your\_value3,[/tex][tex]\ your\_value4, \ \ your\_value5))[/tex]
[tex]\mathbf{OUTPU \ T :}[/tex]
[tex]\mathbf{440.00 \ 466.16 \ 493.88 \ 523.25 \ 554.37}[/tex]
The code for musical note frequencies On a piano, a key has a frequency, say f0 is in the explanation part below.
Here is a C++ program to the stated problem:
#include <iostream>
#include <iomanip>
#include <cmath>
int main() {
double frequency;
std::cout << "Enter the initial key frequency: ";
std::cin >> frequency;
std::cout << std::fixed << std::setprecision(2); // Set output precision to 2 decimal places
std::cout << frequency << " ";
for (int i = 1; i <= 4; ++i) {
frequency *= std::pow(2, 1.0 / 12); // Calculate the next frequency
std::cout << frequency << " ";
}
return 0;
}
Thus, in this program, we use the user's original key frequency as input. The starting frequency and the following four higher key frequencies are then calculated and produced using a loop.
For more details regarding C++ program, visit:
https://brainly.com/question/33180199
#SPJ6
(Print distinct numbers) Write a program that reads in integers separated by a space in one line and displays distinct numbers in their input order and separated by exactly one space (i.e., if a number appears multiple times, it is displayed only once). Hint: Read all the numbers and store them in list1. Create a new list list2. Add a number in list1 to list2. If the number is already in the list, ignore it.
Answer:
Following are the program to the given question:
num = input("Enter numbers: ")#defining a variable num for input value
list1 = num.split()#defining a list1 that adds value in list1
list2 = []#defining an empty list list2
for j in range(len(list1)):#defining a for loop that checks the list value in range
if not list1[j] in list2:# use if block that checks multiple value
list2.append(list1[j])#add value in list2
print("The distinct numbers are: ")#print message
for j in range(len(list2)):#defining for loop for print list value
print(list2[j])#print list value
Output:
Enter numbers: 1 22 55 7 22 1 1 2 3
The distinct numbers are:
1
22
55
7
2
3
Explanation:
In the above-code, a "num" variable is defined, that takes inputs from the console screen, and in the next step, "list1 and list2" is defined. In the "list1" it adds num variable value a into the list.
In the next step, a for loop is defined that checks the list value in range , and define an if block, that checks multiple value and add value into the list2, and in the next step, the for loop is defined that prints the list2 values.
Boolean Operators help filter information when completing a ________ ________
A. web search
B. column making
Who should NOT apply for financial aid?
Students who will attend college part-time
Students whose annual family income is over $100,000
Students who will attend community college
All students should apply for financial aid
Answer: wealthy students should, not a must, apply for it. Not every student.
The AND operator is a disjunction and the OR operator is a conjunction.
True
or
False
Answer:
True but it might be false but i think is true
Live Preview, found in the Font group, uses which method for seeing different font sizes without committing to them.
double-clicking the sizes on the Size drop-down list
pointing the mouse pointer to the sizes on the Size drop-down list
right-clicking the cell and clicking Preview Size on the drop-down list
clicking the sizes on the Size drop-down list
Answer:
B- pointing the mouse pointer to the sizes on the Size drop-down list
Explanation:
Answer:
B
Explanation:
got it right on edge
Who is the orange and white Foxy that looks like Mangle but instead of pink its orange
Answer:
Its Lolbit
Explanation:
Lolbit is an animatronic from Five Nights at Freddy's: Sister Location. It is a recolored version of Funtime Foxy's disembodied head, appearing as a minor Easter Egg from the main game.
Answer:
prity sure it's LOLBit
Write an extensive note on register and type of register .
a very long note that will give me enough mark.
I WILL MARK U BRAINLEST
30 POINTS
1. The structural framework for greenhouses is typically made of
A. metal or plastic tubing.
B. wooden slats
C. glass beams
D. All of the above
which kind of blocks is used to hold values
Answer:
Variable block.
Explanation:
In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.
Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.
For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.
For instance, to pass a class to a family of classes use the code;
\\parameter Name as Type (Keywords) = value;
\\procedure XorSwap (var a,b :integer) = "myvalue";
Hence, variable block is used to hold values. Also, it can be used to hold strings in variables, which may be displayed through the computer monitor.
PLEASE ANSWER ASAP!!!
Name the error that can happen as a result of adding binary numbers.
Answer:
Sometimes, when adding two binary numbers we can end up with an extra digit that doesn't fit. This is called an overflow error. This sum is fine as the original numbers have two digits, and the result of the sum also has two digits.
Explanation:
1 Sales tax
5.00%
Use the image to help you answer the question.
Which formula will tell you the total "Before tax"
price using cell references?
A. =3+2+50
B. =B8
C. =B4+B5+B6
D. =B4*B5*B6
Answer:
Future value (FV) tells you the value in the future of money deposited in a bank account ... We can use Excel to make a table of how the future value grows with the ... 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. A. B. C. D. E. F. Interest. 6% ... To answer the question, we compute the IRR of the investment and compare it.
Explanation:
Answer:
C. = B4+B5+B6
Explanation:
Edge 2020
Choose all items that are true about the two example of HTML shown on the right.
A. Example 1 will display differently than example 2 in a web browser.
B. They are styled differently, but will look the same in a web browser.
C. Example 2 is easier to analyze and repair.
D. The styling in example 2 is required by modern web browsers.
Answer:
“They are styled differently, but will look the same in a web browser” & “The styling in example 2 is required by modern web browsers”.
Explanation:
Answer:
B and C
Explanation:
Which command do you use to save a document with a new name? Choose the answer.
Save As
Save New
Save Type
Save
Answer:
Explanation:
Most word processors use Save As which not only allows you to save with a different name, but the root can be changed as well. I use LibreOffice write. Its Save As Command allows you to change the name from say J1 to Jerome and also to save the document in many of the word formats. That last ability is really important because some people only have Microsoft products. On my old computer, I have Microsoft Word 2000. If I want to transfer files, that is how I have to save the file.
Nano technology uses include...
A: Tennis racquets (high strength to weight)
B: Self-cleaning fabrics
C. Antibacterial fabrics
D: All of the above
Can somebody do an Algorithm 2 for more?
(Python)
# If the number is positive, we print an appropriate message, else we print the opposite
num = 3
if num > 0:
print(num, "is a positive number.")
num = -1
elif num < 0:
print(num, "is a negative number.")
num = 0
else
print(num, "is neither positive nor negative.")
The process of acquiring existing information or developing new information.
Answer:
Various definitions of the SDLC methodology exist, but most contain the following phases.
Preliminary Analysis. In this phase, a review is done of the request. ...
System Analysis. ...
System Design. ...
Programming. ...
Testing. ...
Implementation. ...
Maintenance.
Explanation:
There are four methods of acquiring data: collecting new data; converting/transforming legacy data; sharing/exchanging data; and purchasing data. This includes automated collection (e.g., of sensor-derived data), the manual recording of empirical observations, and obtaining existing data from other sources.