Creative Commons material often costs money to use.

True
False

Answers

Answer 1

Answer:

true

Explanation:


Related Questions

can someone write the answers pls :(?

Answers

Answer:

A:  job sharing.

B: part-time working.

C:  flexible hours.

D:  compressed hours.

A: Payroll workers, Typing pool workers, Car production workers, Checkout operators, Bank workers

B: Website designers, Computer programmers, Delivery drivers in retail stores, Computer maintenance staff, Robot maintenance staff.

3: Can lead to unhealthy eating due to dependency on ready meals, Can lead to laziness, Lack of fitness/exercise, Manual household skills are lost.

4: Microprocessor controlled devices do much of the housework, Do not need to do many things manually, Do not need to be in the house when food is cooking, Do not need to be in the house when clothes are being washed, Can leave their home to go shopping/work at any time of the day, Greater social interaction/more family time, More time to go out/more leisure time/more time to do other things/work, Are able to do other leisure activities when convenient to them, Can encourage a healthy lifestyle because of smart fridges analysing food constituents, Do not have to leave home to get fit

Explanation:

I tried really hard to solve these. I hope this answers your questions. can you make me the brainliest, that all I ask since I answered it for you. Pleasure solving these. C:

Which lighting technique can often heighten a dramatic story?

No lighting.
Front lighting.
Natural lighting.
Side or back lighting.

Answers

Answer:

side or back lighting

Explanation:

big brain

In a word processing program, under which tab or menu option can you adjust the picture brightness?

Answers

Explanation:

You must have selected a picture in order the tab format to be available. you should click the picture then you want to change the brightness for and u under picture tools, on the format tab,in the adjust group, click corrections.

Very large storage system that protects data by constantly making backup copies of files moving across an organization's network is known as ...

Answers

Answer:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

Explanation:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

What is File system failure?

File system failure refers to disk-related errors that may be due to corrupt files,  disk integrity corruption, file execution policies, bad sectors, etc. These errors may prevent be causing users from accessing or opening files. The first line of defense against a file system failure is a well-defined set of proper system backup and file maintenance procedures.

These errors can be encountered in files such as images, documents, PDFs, movies, etc. In order to protect and provide defense against file system failure, it is important to manage proper backup and file maintenance procedures.

Therefore, RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

You can learn more about file system at:

brainly.com/question/14312784

#SPJ2

You can Hyperlink by:

Question 5 options:

Press CTRL+K (shortcut)


Go to Insert tab, Link Group, Click on Link Icon


Right click on a word / shape / picture and choose Link


All of the above /

Answers

Answer:

All of the above

Explanation:

I tryed them all

Answer: All of thee above

Which three of the following statements are true about using a WYSIWYG editor?

You can preview the web page you’re creating, but it might appear very differently in a web browser.
After creating a web page, you need to inspect the code the editor generates for correctness.
You can write your own HTML code to create a web page.
You can modify the HTML code the editor generates.
You don’t need any knowledge of HTML to be able to create a web page.

Answers

Answer:

It would be 3

You can preview the web page you’re creating, but it might appear very differently in a web browser. You can modify the HTML code the editor generates. You don’t need any knowledge of HTML to be able to create a web page.

What is WYSIWYG editor?

A WYSIWYG editor stands for "What You See Is What You Get" editor. It is a software application that allows users to create and design web pages without needing to know HTML or other coding languages.

The following are true statements about using a WYSIWYG editor:

You can preview the web page you're working on, but it may look very different in a browser.The HTML code generated by the editor can be modified.You do not need any HTML knowledge to create a web page.

It is not always necessary to inspect the code generated by the editor for correctness after creating a web page, as the editor should ideally generate correct code.

Thus, while you can write your own HTML code to create a web page, this is not a feature unique to WYSIWYG editors.

For more details regarding WYSIWYG editors, visit:

https://brainly.com/question/31574504

#SPJ2

What Are the Components of a Web Address? *​

Answers

Answer:

What Are the Components of a Web Address?

1.Protocol. The first component of a web address is the protocol, which is also known as the scheme. ...

2.Domain Name. The domain name part of the web address is the unique identifier for the website on the internet. ...

3.Domain Extension. ...

4.Path & Filename.

Libby’s keyboard is not working properly, but she wants to select options and commands from the screen itself. Which peripheral device should she use?
A.
voice recognition
B.
microphone
C.
mouse
D.
compact disk

Answers

C. mouse is the answer

2. How has the internet changed the way that people get news?

Answers

Answer:

Explanation:

you can access news from anywhere and know what is going on

Answer:

Most of the news is fact due to the ablilty of anybody can make it

Explanation:

How should employees behave during interactions with clients and co-works

Answers

Answer:always be nice and welcoming

Explanation:

with the utmost respect, you are supposed to respect and listen to your superiors, they are paying you and giving you a job after all, they can easily take it.

To Install Windows 7, we need at least :
a)16 MG of free hard disk space
b) 46MG of free Hard Disk Space ​

Answers

Answer:

B

Explanation:

Your OS (operating System) Needs as much storage as possible for updates and programs, cache, tempFiles, etc. While microsoft recommends more than 1 Gb, the best answer would be answer B.

Read more here: https://support.microsoft.com/en-us/windows/windows-7-system-requirements-df0900f2-3513-a851-13e7-0d50bc24e15f#:~:text=1%20gigabyte%20(GB)%20RAM%20(,20%20GB%20(64%2Dbit)

Why would an organization need to be aware of the responsibilities of hosting

personal data in its platforms?

Answers

Answer:

Providing transparent services for platform customers. Following data protection regulations to avoid disruptions from lack of compliance.

How should you schedule a meeting with someone in another time zone?

Answers

If you know what timezone they're in, try to work out what time in your own timezone your free, then tell the other person to do the same. Tell them what times in your timezone and the other can search up what the time is in their own timezone. If there is a specific time when you are both free, use that.

Ex:

You live in the U.S. but you have a meeting with someone in the U.K. You're only free at 4:00pm-6:00pm and they're only free from 10:00am-11:00am. 11:00am in England is 4:00pm in the U.S. so do at that time!

Hope this helps!

Consider the regular expressions:

R1 = (01)* (0*1*) (10)
R2 = (101)* (01)*
R3 = (10) (01*)*(01)
R4 = 10(R2*)|R3

Recall that, for a list of regular expressions, the function getToken() returns the next token from the input that matches one of the regular expressions. If there is more than one match, the longest match is returned. If there is more than one longest match, the token with the longest match that appears first in the list is returned. If there is no match, ERROR is returned. If the function getToken() is called once on input 1000101, it will return:

a. R1
b. R2
c. R3
d. R4
e. ERROR

Answers

Answer:

c. R3

Explanation:

For R1;

there are 10 matches, after these 10 no matches occur again

for R2;

this also does not match more than 10 as we have in R1

for r3;

R3 has the longest match. Its matching can be done 1000101 times.

for r4;

The whole of r4 can be matched.

Error;

we cannot have an error because matches exist.

so in answer to this question we pick R3 as the solution because there are more than one longest march and the one returned in the list is that which appeared first. R3 came first

In this exercise we have to use computer knowledge to identify which is the correct sequence of code that best corresponds to the given question, in this way we have that the correct alternative is:

[tex]c. R3[/tex]

So analyzing the first alternative, we find;  

For R1, there are 10 matches, after these 10 no matches occur again.

So analyzing the second alternative, we find;

For R2, this also does not match more than 10 as we have in R1

So analyzing the third alternative, we find;

R3 has the longest match. Its matching can be done 1000101 times.

So analyzing the fourth alternative, we find;

For R4, the whole of r4 can be matched.

So analyzing the fifth alternative, we find;

Error; we cannot have an error because matches exist.

So in answer to this question we pick R3 as the solution because there are more than one longest march and the one returned in the list is that which appeared first.

See more about computer at brainly.com/question/950632

How does computer hardware and software work together?

Answers

Answer:

Computer software controls computer hardware which in order for a computer to effectively manipulate data and produce useful output I think.

Explanation:

Write a program that would determine the day number in a non-leap year. For example, in a non-leap year, the day number for Dec 31 is 365; for Jan 1 is 1, and for February 1 is 32. This program will ask the user to input day and month values. Then it will display the day number day number corresponding to the day and month values entered assuming a non-leap year. (See part II to this exercise below).

Answers

Answer:

In Python:

months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]

daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]

day = int(input("Day: "))

month = input("Month: ")

ind = months.index(month)

   

numday = 0

for i in range(ind):

   numday+=daymonths[i]

numday+=day

print(numday)    

Explanation:

This initializes the months to a list

months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]

This initializes the corresponding days of each month to a list

daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]

This gets the day from the user

day = int(input("Day: "))

This gets the month from the user

month = input("Month: ")

This gets the index of the month entered by the user

ind = months.index(month)

This initializes the sum of days to 0

numday = 0

This adds up the days of the months before the month entered by the user

for i in range(ind):

   numday+=daymonths[i]

This adds the day number to the sum of the months

numday+=day

This prints  the required number of days

print(numday)    

Note that: Error checking is not done in this program

For a company, intellectual property is _______________.


A) any idea that the company wants to keep secret


B) the same as the company’s policies


C) any topic discussed at a meeting of senior management


D) all of the company’s creative employees


E) a large part of the company’s value

Answers

Yea I think it is b but I’m not sure

For a company, intellectual property is any idea that the company wants to keep secret. Thus the correct option is A.

What is intellectual Property?

The type of integrity is defined as "intellectual property" which includes intangible works developed by humans with an innovative and problem-solving approach.

These intellectual properties are protected by companies to avoid leakage of the secret of development as well as to avoid imitation of the creation. This protection of the intellectual property is legally bounded.

If any violation of this act has been noticed and found guilty will have to face consequences in terms of charges of violation as well as heavy penalties based on the type and importance of the work.

Therefore, option A any idea that the company wants to keep secret is the appropriate answer.

Learn more about intellectual property, here:

https://brainly.com/question/18650136

#SPJ2

is a
square-shaped blade perfect for digging holes for plants and
bushes.​

Answers

Answer:

Yes. Designed to use in tight spaces, the square-shaped blade is perfect for digging holes for plants and bushes, especially in established gardens where you don't want to disturb existing plants.

Explanation:

Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both doubles) as input, and output the gas cost for 20 miles, 75 miles, and 500 miles. Output each floating-point value with two digits after the decimal point, which can be achieved by executing cout << fixed << setprecision(2); once before all other cout statements.

Answers

Answer:

Explanation:

The following is written in C++ and asks the user for inputs in both miles/gallon and dollars/gallon and then calculates the gas cost for the requested mileages using the input values

#include <iostream>

#include <iomanip>

using namespace std;

int main () {

   // distance in miles

   float distance1 = 20.0, distance2 = 75.0, distance3 = 500.0;

   float miles_gallon, dollars_gallon;

   cout << "Enter cars miles/gallon: "; cin >> miles_gallon;

   cout << "Enter cars dollars/gallon: "; cin >> dollars_gallon;

   cout << "the gas cost for " << distance1 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance1 / miles_gallon << "$\n";

   cout << "the gas cost for " << distance2 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance2 / miles_gallon << "$\n";

   cout << "the gas cost for " << distance3 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance3 / miles_gallon << "$\n";

   return 0;

}

hy plzz help me friends​

Answers

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

Answer:

Ram which stands for random access memory, and Rom which stands for read only memory are both present in your computer. Ram is volatile memory that temporarily stores the files you are working on. Rom is non-volatile memory that permanently stores instructions for your computer

Modify the following code so that:
Make the pool start with a random number ([20, 30] inclusive) of coins.
Based on the number of the randomly generated coins at the beginning,
let the computer determine whether Player 1 or Player 2 will be the
winner based on the winning strategy (by printing out the winner).
After deciding the supposed winner and loser, let the computer play
out both of the roles. For the winner, the computer should be applying
the winning strategy; for the loser, the computer should generate a
random amount of coins while following all the rules of the game
Rules of the game:
a) The game starts with 22 coins in a common pool
b) The goal of the game is to take the last coin
c) Two players take turns removing 1, 2, or 3 coins from the pool
d) A player can NOT take more coins than remaining coins in the pool
e) After each turn, the judge announces how many coins remain in the
pool
f) When the last coin is taken, the judge announces the winner
turn=0 #turn=1 remaining coins-24 print(Take turns removing 1, 2, or 3 coins. ) print(You win if you take the last coin.)

Answers

Answer:

Explanation:

The following code makes all the necessary changes so that the game runs as requested in the question. The only change that was not made was making the number of coins random since that contradicts the first rule of the game that states that the game starts with 22 coins.

turn = 0

remaining_coins = 22

print("Take turns removing 1, 2, or 3 coins. ")

print("You win if you take the last coin.")

while remaining_coins > 0:

   print("\nThere are", remaining_coins, "coins remaining.")

   if turn % 2 == 0:

       # Player1

       taken_coins = int(input("Player 1: How many coins do you take?"))

       turn += 1

   else:

       # Player2

       taken_coins = int(input("Player 2: How many coins do you take?"))

       turn += 1

   if taken_coins < 1 or taken_coins > 3 or taken_coins > remaining_coins:

       print("That's not a legal move. Try again. ")

       print("\nThere are", remaining_coins, "coins remaining.")

       if turn % 2 == 0:

           # Player1

           taken_coins = int(input("Player 1: How many coins do you take? "))

           turn += 1

       else:

           # Player2

           taken_coins = int(input("Player 2: How many coins do you take? "))

           turn += 1

       remaining_coins -= taken_coins

   else:

       remaining_coins -= taken_coins

   if remaining_coins - taken_coins == 0:

       print("No more coins left!")

       if turn % 2 == 0:

           print("Player 1 wins!")

           print("Player 2 loses !")

       else:

           print("Player 2 wins!")

           print("Player 1 loses!")

           remaining_coins = remaining_coins - taken_coins

   else:

       continue

For this exercise, you are going to complete the printScope() method in the Scope class. Then you will create a Scope object in the ScopeTester and call the printScope.
The method will print the name of each variable in the Scope class, as well as its corresponding value. There are 5 total variables in the Scope class, some of which can be accessed directly as instance variable, others of which need to be accessed via their getter methods.
For any variable that can be accessed directly, use the variable name. Otherwise, use the getter method.
Sample Output:
The output of the printScope method should look like this:
a = 5
b = 10
c = 15
d = 20
e = 25
public class ScopeTester
{
public static void main(String[] args)
{
// Start here!
}
}
public class Scope
{
private int a;
private int b;
private int c;
public Scope(){
a = 5;
b = 10;
c = 15;
}
public void printScope(){
//Start here
}
public int getA() {
return a;
}
public int getB() {
return b;
}
public int getC() {
return c;
}
public int getD(){
int d = a + c;
return d;
}
public int getE() {
int e = b + c;
return e;
}
}

Answers

Answer:

Explanation:

The following is the entire running Java code for the requested program with the requested changes. This code runs perfectly without errors and outputs the exact Sample Output that is in the question...

public class ScopeTester

{

public static void main(String[] args)

{

       Scope scope = new Scope();

       scope.printScope();

}

}

public class Scope

{

private int a;

private int b;

private int c;

public Scope(){

a = 5;

b = 10;

c = 15;

}

public void printScope(){

       System.out.println("a = " + a);

       System.out.println("b = " + b);

       System.out.println("c = " + c);

       System.out.println("d = " + getD());

       System.out.println("e = " + getE());

}

public int getA() {

return a;

}

public int getB() {

return b;

}

public int getC() {

return c;

}

public int getD(){

int d = a + c;

return d;

}

public int getE() {

int e = b + c;

return e;

}

}

The information technology (IT) department of a real-estate group cosponsored a data warehouse with a County governement. In the formal proposal written by the IT team, costs were estimated at 8,000,000/- the project’s duration was estimated to be eight months, and the responsibility for funding was defined as the business unit’s. The IT department proceeded with the project before it even knew if the project had been accepted. The project actually lasted two years because requirements gathering took nine months instead of one and a half, the planned user base grew from 200 to 2,500, and the approval process to buy technology for the project took a year. Three weeks before technical delivery, the IT director canceled the project. This failed endeavor cost the organization and taxpayers 25,000,000/-.

Why did this system fail?

Why would a company spend money and time on a project and then cancel it?

What could have been done to prevent this?​

Answers

The system fail because the company had to pay and spend more money in order to pay the workers.

Under which menu option of a word processing program does a star appear?
A star appears under the
menu of the word processing program.

Answers

UNDER THE MENU OPTION INSERT.

Answer:

shapes

Explanation:

Plato got it correctly

17
Select the correct answer.
What is the key length of each key in triple DES?
OA 168 bits
ОВ.
56 bits
128 bits
OD
256 bits
OE.
192 bits

Answers

Answer:

OB

Explanation:

bc i said lol

bc i said lol to be 128 bits

Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this future network, anti-spoofing and directed broadcast filters are widely deployed. Also, the security of PCs and workstations is much greater, making the creation of botnets difficult. Do the administrators of server systems still have to be concerned about, and take further countermeasures against, DoS attacks? If so, what types of attacks can still occur, and what measures can be taken to reduce their impact? Explain in detail with valid diagram and example.

Answers

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

whats difference between DCE AND DTE serial interface

Answers

DCE stands for data circuit-terminating, data communications, or data carrier equipment - this is a modem or more generally, a line adapter.

DTE stands for data terminal equipment which generally is a terminal or a computer.

Basically, these two are the different ends of a serial line.

U $ er Ideas for R 0 B 1 0 X?

Answers

Answer:

umm huh

Explanation:

english please

Answer:

i play ro blox add me wwekane9365

Explanation:

please help me faster plzzz
correct plzz​

Answers

Answer:

a. A numeric keypad.

b. An interpreter.

c. A 3D printer.

d. A speaker.

Explanation:

An output device can be defined as a hardware device that typically receives processed data from the central processing unit (CPU) and converts these data into information that can be used by the end user of a computer system.

Also, an input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since output and input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, mouse, scanner, projector etc.

Basically, the three (3) key element of a computer system are: a set of memory modules, processor and a set of input-output (I/O) modules. Each of the input-output (I/O) module interfaces to the central switch or system bus and are used to control one or more peripheral (external) devices.

a. A numeric keypad is a device used to input a PIN. It comprises of numbers ranging from 0 to 9.

b. An interpreter analyses and executes a program line by line.

c. A 3D printer produces output in the form of solid objects. It is typically used for inscribing or printing textual informations or graphic images on an object in three dimensions.

d. A speaker produces output in the form of sound. It is an electronic device that converts electrical signals into sound energy (waves).

PYTHON
Write a program that picks up a secret number from 1 to 100 when the user starts the game and asks the
user to guess what number it is. If the user’s guess is correct, the program congratulates the user for the
perfect answer and then make it possible for the user to start a new game; otherwise, it will tell the user
that it is too high or too low and let the user continue to play.
In your program, you may use the following code to generate a random number from 1 to 100 as the
secret number for a new game.
import random
number = random.randint(1, 100)
In addition, your program will keep track of the number of guesses the user made and display the number
of guesses when a game is over. If a user is successful by more than 7 tries, display an additional message
to tell the user to consider a different strategy in order to improve one’s performance.
Given below is a typical dialog between a user and your program when the user uses your program.
Hello, what is your name? John
John, I am thinking a number between 1 and 100 (both included).
Can you guess what it is?
Guess a number (1-100): 50
Your guess is too high. Try again.
Guess a number (1-100): 25
Your guess is too low. Try again.
Guess a number (1-100): 35
Your guess is too low. Try again.
Guess a number (1-100): 43
John, you won in 4 tries. Congratulations!
Do you want to continue to play? no
Thank you for playing this game. Bye.
In the above, the user plays the game only once. If the user says ‘yes’ at the second to last step, he/she
would be able to play the game again.

Answers

Answer:

import random

print("Hello! I have a random number from 1 to 100! It is your job to try and guess it!")

number = random.randint(1,101)

guess = int(input("start to guess: "))

num_guesses = 1

while guess != number:

   if guess > number:

       print("lower")

       guess = int(input("try again: "))

       num_guesses +=1

   elif guess < number:

       print ("higher")

       guess = int(input("start to guess: "))

       num_guesses +=1

print("congrats it took you", num_guesses, "tries")

Explanation:

Other Questions
Which of the following is not a language commonly used for web programming?Group of answer choicesPHPAssemblyJavaPython HELP I NEED HELP ASAPHELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAPHELP I NEED HELP ASAPHELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAP is tennis masculine or feminine I dont understand please help Susie can run 4 2/3 miles per hour. If she runs for 3/4 hours how far will she have run? do you support Garrison or Douglass? Why? Write a short response of about 100 words. ) Bob is a notary public employed by a local bank. The bank purchased Bob's supplies, paid for his bond, and had Bob sign an agreement limiting the notarial services he is able to provide within the bank. Bob's neighbor and good friend, Betty, is refinancing her mortgage. She calls Bob on Friday and asks if he would be available to notarize loan documents at her home on Saturday. Bob meets Betty at her house. He notarizes nine signatures, completes nine notarial certificates, and affixes his seal and signature to each. What is the most Bob can charge Betty for this service? When creating a histogram, the first recorded scale is 1 to 15. What should the second scale indicate? A. 15-30 B. 16-30 C. 16-29 D. 16-31 The quadrtic expression x^2-2x-35 can be factored into (x+5)(x-7). Which ordered pairs represent the zeros of this expression related quadratic functions Pls help me with this one!! :> What were two of the ways transportation changed in the early 1800s? if f(x) = 1 - x, whitch value is equivelent to f(i)a . 0b . 1c . (2)d . (-1) Argumentative essay: parents should not be prosecuted if they do not hand over children who have committed crimes to the police. What biome is treeless, has 2 seasons, has an average precipitation level of 6-10 in ( less than 25 cm) per year, and has an average annual temperature of -18 degrees Fahrenheit?A Temperate Deciduous ForestB TaigaC TundraD GrasslandE Tropical Rain ForestF Desert 3. Describe the process behind how students recover an individual's remains from a surface grave. Made up of 100 members, two from each state. What you need to know In this program, a roll string is a number, followed by a lowercase "d", followed by another number. The first number is the number of dice to roll. The second number is the number of sides on each die. For example, 1d6 means there is one die with six sides. The total output of the roll is a random whole number between one and six, inclusive. 2d8 means there are two dice, each with eight sides. The total output of the roll is a random whole number between two and 16, inclusive. Since we are using a computer, we can have an input like 500d1000 (meaning a 1000-sided die, rolled 500 times) which would not be possible in real life.Function: get_roll(rollstring)This function takes an input parameter as a string that looks like "1d3", "3d5", etc. The function should return an integer simulating those dice rolls. In the case of "3d5", for example, the function will generate a random number between one and five, three times, and return the total (sum) as an integer. This function should return the value back to get_damage().Function: get_damage(attack, defense)This function gets the value of damage based on roll strings. Player 1 (the first roll) is always on attack; Player 2 (the second roll) is always on defense. If the defense roll is greater than the attack roll, return 0. Otherwise, return attack minus defense, as an integer. This function should call get_roll() twice, once for each Player. This function should return the value back to main_main().Function: main_menu()In this function, ask the user how many rounds they want to play. Next, ask the user to input Player 1 and Player 2s dice for roll one, roll two, etc., up to the number of rolls they entered. The rolls for each round must be entered on one line with no spaces. This function should call get_damage() for each round. How did the Supreme Court view Maryland's taxing of the national bank created after the War of 1812? 1a. Describe five(5) ways that can show good manners.b. Outline five habits which constitute good manners.c. State four(4) benefits of showing good manners in the community why is conflict confrontation not healthy for sustaining positive relationships?