What is an example of an outcome for a game?

A. trying to save the world from an evil wizard
B. rescuing Princess Peach from Bowser
C. playing an ocarina to teleport across the land
D. pressing Up, Up, Down, Down, Left, Right, Left, Right, Start on a controller as a “cheat code” to gain extra lives

Answers

Answer 1

Answer:

B

Explanation: I play alot of ####### NIntendo games!!!!!!

Answer 2

Answer:

b

Explanation:


Related Questions

You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.

Answers

Answer:

in

Explanation:

Not an explanation, but here's an example:

if "mouth" in "mouthwatering":

   print("It is.")

else:

   pass

Another example:

if "water" in "mouthwatering":

   print("Yes.")

else:

   pass

Please Answer ASAP!!

You must attempt to read past the end of the text file before any end-of-file indicators are set
True
False


Answers

Answer:

I think it's true

Explanation:

Sorry if it's wrong :(

what is the difference between windows 10 and windows 11

Answers

Answer: Windows 11 brings a brand-new, more Mac-like interface to the OS. It features a clean design with rounded corners and pastel shades. The iconic Start menu also moves to the centre of the screen along with the Taskbar. But you can move those back to the left, as they are in Windows 10, if you prefer.

Explanation:

Windows 11 will be a better operating system than Windows 10 when it comes to gaming. ... The new DirectStorage will also allow those with a high-performance NVMe SSD to see even faster loading times, as games will be able to load assets to the graphics card without 'bogging down' the CPU.

Which of these would be the best way to inform an employee that they are losing their job?
Group of answer choices

group email

face-to-face conversation

instant message

personal email

Answers

Answer:

Terminations are a sensitive subject.

Even if you have strong reasons for letting an employee go, sitting them down to explain they are out of a job can be an awkward conversation.  

Some employers might be tempted to fire an employee using an impersonal method ⁠— like a phone call, email, or text ⁠— just to avoid that discomfort. But that is a very bad idea. We strongly recommend that employers should only fire staff during a face-to-face termination meeting.

12. Your project specifications call for a business rule that the database design can't
enforce. What tool should you use to enforce this business rule?
A. Trigger
B. Weak entity
C. Exception
D. Lookup entity

Answers

A lot of business rules needs to be triggered so as to run.

In making of business rule, one can select triggers to run some specific events or run using some particular specified frequency.

The trigger options differs  based on the type of rule you are interested in.  One can also use multiple triggers when using a single rule.

Learn more about rules from.

https://brainly.com/question/5707732

Which steps allow a user to change the column layout in the Handout Master?

Answers

Answer:

D. Click the View tab, select Handout Master, and choose the number of columns in the Slides Per Page drop-down list.

Explanation: correctEdg

is there actually a difference between left and right twix

Answers

one has more caramel and one has more cookie

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Answers

Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

what is the hack of the cookie clicker

Answers

Answer:

Open Sesame

New Pokemon Games - The Loop. Open Sesame is the control panel for Cookie Clicker. It can be opened with a console command, or by changing the name of your bakery.

Explanation:

Hope this helps you !!

Hacking is a process to exploit a computer network system or a private network within a computer. Simply put, unauthorised access to or control of a computer network security system for unauthorised purposes.

To better explain hacking, we must first understand hackers. It’s easy to a Hacking assume that they are intelligent and highly skilled with computers.

In fact, breaking security systems requires more intelligence and expertise than actually creating them. There are no hard and fast rules that can classify hackers into neat categories. However, in common computer terminology, these are called white hats, black hats, and gray hats. White hat experts audit their own security systems to make them more resistant to hacking.

Learn more about network system here:

brainly.com/question/23294592

#SPJ6

WRITE A PROGRAM TO CALCULATE SIMPLE INTEREST

Instructions to do the program:-

The output format of the program should be as shown below:

P = 2000

R = 8

N = 4

Simple Interest = 640
pls help

Answers

The simple interset program is a sequential program, and does not require loops and conditions

The simple interset program in Python, where comments are used to explain each line is as follows:

#This gets input for the principal amount

P = int(input("P = "))

#This gets input for the rate

R = int(input("R = "))

#This gets input for the number of years

N = int(input("N = "))

#This calculates the simple interest

I = P * R * T * 0.01

#This prints the simple interest

print("Simple Interest =",I)

Read more about simple interest at:

https://brainly.com/question/2294792

what is the full form of DDR and GWBASIC?

Answers

Answer:

DDR: DDR stands for Double Data Rate.

GWBASIC: The full form of GW-BASIC is Graphics and Windows Beginner‘s All-Purpose Symbolic Instruction Code.

What is DDR? - It is a technique in computing with which a computer bus transfers data at double the rate sending data at rising and falling edges of a clock cycle. This method allows for sending 2 signals per clock cycle.

What is GWBASIC? - GW-BASIC is a dialect of the BASIC programming language developed by Microsoft from IBM BASICA. Functionally identical to BASICA, its BASIC interpreter is a fully self-contained executable and does not need the Cassette BASIC ROM found in the original IBM PC.

what is the similarities between traditional and modernized presentation​

Answers

Answer:

“Traditional” refers to those societies or elements of societies that are small-scale, are derived from indigenous and often ancient cultural practices. “Modern” refers to those practices that relate to the industrial mode of production or the development of large-scale often colonial societies.


[tex]{\huge{\underline{\bf{\pink{Question}}}}}[/tex]

: Given a matrix, we need to count all paths from top left to bottom right of MxN matrix. You can either move down or right.​

Answers

Answer:

[1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

Based on the information given, the correct option will be [1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

A matrix simply means a set of numbers that are laid out on rows and columns. The numbers in matrix can represent either data or mathematical equations

It should also be noted that matrix can be used as way of providing quick approximation of calculations.

In conclusion, the correct option is [1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

Learn more about matrix on:

https://brainly.com/question/1821869

what is the full form of BASIC​

Answers

Answer:

BASIC, in fullBeginner's All-purpose Symbolic Instruction Code, computer programming language developed by John G.

A network of computers that provides access to information on the web.
Question 13 options:

Phishing

Internet

Antivirus Application

Modem

Answers

Answer:

Internet

Explanation:

I think it is Internet

What does

mean in computer science

Answers

Answer:

i think the answer is a character or characters that determine the action that is to be performed or considered.

Explanation:

hope this helps

a program is under development to keep track of a clubs members

Answers

Answer:

Keep a chart with you

Explanation:

You could right something along the lines of:

To keep track of the members in the club, I'll(we'll) have them write their names down on a chart so we don't forget. I(we) could also just do a thing where I(we) plan everything out beforehand and I(we) have been keeping track of the members.

You could right something along the lines of:

Since the program is under development, I(we) could tell everyone in the club to put their names on a spreadsheet and I(we) could start developing the program further that way.

Why would you add learning inside the app? A. To add contextual help for each page in the app B. To contact Salesforce support C. To link to your company’s onboarding resources D. To add resources about working in Salesforce Classic E. A and C

Answers

There are different reasons why there was the addition of learning to the app. The reasons why you would you add learning inside the app is that:

To add contextual help for each page in the app.

To link to your company’s onboarding resources.

Salesforce Learning Paths is known to result in bringing out the power of learning straight into the app.

It can help companies to update their teams as they function or work in Salesforce.

Through the use of the Learning Paths, firms whether big or small and other industry can update or equip their employees with timely, personalized learning in the flow of work.

This can therefore help employees of all experience levels by boasting their skills and in turn increase their productivity.

Learn more about Salesforce from

https://brainly.com/question/7452075

what is internet? short ans​

Answers

Answer:

The Internet is a big network that connects computers all over the world.

Lori wants to set up a SOHO network in her apartment. The apartment comes with a Gigabit Ethernet network already installed. Lori's notebook computer has an integrated wireless network adapter. Her printer has an Ethernet card, but is not wireless enabled. Your task is to select the appropriate devices and cables (without spending more than necessary) to set up a network that provides wireless access for Lori's laptop and wired access for her printer.

Match the labels for the components on the left to the locations where they need to be installed in Lori's home office on the right.

Answers

hi there!

Answer:

1. cat6 cable

2. wireless ethernet router

3. cat5e cable

Explanation:

1. you need a cat6 cable to be capable to deliver the gigabyte ethernet data to the network device.

2. you need a wireless device to provide wireless connection to her notebook.

3. for a printer no cat6 is necessary you can use cat5e cable and it will be enough.

hope this helps.

Connection to the gigabit ethernet network must be done with Cat6 Cable. Using the wireless ethernet router as the network device and connecting the cable to the printer must be done with Cat5e Cable.

We can arrive at this answer because:

The Cat6 Cable will be responsible for establishing a bridge between the gigabyte Ethernet and the network device, allowing data delivery to be made between the two systems.This connection must be made with a wireless device, to keep it more stabilized and it needs, mainly, for the notebook to receive the internet signal. This will be done using the wireless ethernet router.The printer needs a softer, less rigid connection, so a Cat5e cable will be a convenient option.

In this case, we can see that using these devices will allow Lori to have a more stable and efficient connection to meet her needs.

More information on network connection at the link:

https://brainly.com/question/8118353

You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent the code from spreading further.

Required:
Based on the email message, what are the next BEST actions to complete?

Answers

Answer:

The next BEST actions to complete could either be to call 911 or just drive somewhere further from your computer and where you live because the threat might come to your place, or it might already be in your place.

Explanation:

A professional is someone who uses education and acquired skills to earn money in a career.
Question 10 options:
True
False

Answers

After using my big brain it’s true

What is an electrical conductor? Name five electrical conductors

Answers

Answer:

Explanation:

silver.

copper.

gold.

Steel

Seawater.

Explanation:

Electrical conductors are those which allows the electrons to flow easily. Examples of five conductors are :-

Gold Silver CopperAluminium Iron.

Can someone plss help me with this!!

Answers

Answer:

Text

Explanation:

There is no text in between the <h1> and </h1> tags.

I hope thats correct.

algorithm to find the difference between two numbers second number is greater than first
Plzzz solve this problem ​

Answers

Answer:

You should concentrate yourself

Explanation:

1=x

2=y

x<y

hence proved solved thank me later

Q44. Cell A20 displays an orange background when its value is 5. Changing the value to 6 changes the background color to green. What type of formatting is applied to cell A20

Answers

The type of formatting that is applied to cell A20 is called conditional formatting.

Conditional formatting in Excel Sheet enables an easier method of highlighting noteworthy cells or ranges of cells, displaying data by employing data bars, color scales, and icon sets that match particular variations in data.

A conditional format modifies the look of cells based on the conditions you set. The cell range will be formatted provided that the conditions are true; if otherwise, it will be false and the cell range will not form.

Learn more about conditional formatting here:

https://brainly.com/question/25051360

What is the maximum possible value of num after the code has been run?

Answers

Answer:

the maximum value from the first line is 20 - 0 = 20

and from the second 20-5 and 20+5 so the maximum is 25

goal of any user-friendly game should be to create a good what for the player?
A. user experience (UX)
B. user-interface (UI)
C. user intuition (UIT)
D. user skill (US)

Answers

Answer:

A

Explanation:

The goal of user friendly game is to provide UX.

For example a user friendly game will have much different interface than professional CAD program.

Answer:

user friendly.

Explanation:

outline how the appropriate features that may be used to ensure that the document is free of spelling and grammatically errors.​

Answers

Answer:

Answer

Since Sophie often makes a lot of

grammatical and spelling errors in her

document, it might be best for her to use

a feature available in Microsoft Word that

would help her better in understanding

what her mistakes are, which is

something that (D) Explain does.

Explain would tell Sophie which part of

her sentence is wrong, or what word

did she mistype, and what better way to

phrase a sentence to avoid fragmented

ones.

! (( i > ( f + 1)) es verdadero o falso segun la logica de programación.

Answers

Answer:

yeajadaj

Explanation:

Other Questions
number 4 plssss!!!!!!!!!! 3.-Las 80 habitaciones de un motel se podran alquilar todas las noches si el director cobrar 40 o menos por habitacin. Si se cobra (40+x) por habitacin, entonces 2x habitacionespermanecern vacantes. Si cada habitacin alquilada le cuesta al director 10 al da y cada habitacin no alquilada 2 al da, qu precio debera cobrar el director por habitacin para maximizar su beneficio diario?4.- Un fabricante de automviles vende 2000 coches al mes, con un beneficio medio de 1000 por coche. Las prospectivas de mercado indican que por cada 50 de descuento que el fabricante ofrezca a los compradores podra vender 200 coches ms al mes. Cunto descuento debera ofrecer para maximizar el beneficio mensual? Which war led to the US participating in an international peace conference? Read the passage from Hamlet, Act I, Scene iii. Hamlet:. But tell Why thy canonizd bones, hearsed in death, Have burst their cerements; why the sepulchre, Wherein we saw thee quietly inurnd,55 Hath opd his ponderous and marble jaws, To cast thee up again. What may this mean, That thou, dead corse, again in complete steel Revisitst thus the glimpses of the moon. Which phrases provide clues that sepulchre means "grave"? Check all that apply. Canonizd bones hearsed in death we saw thee ponderous and marble jaws the glimpses of the moon. Factorize the expressionspx2 + qx A complex shape with measurements 6 inches, 5 inches, 4 inches, 3 inches, 4 inches, 2 inches, 6 inches, 10 inches. What is the perimeter of the shape? Write a story extension of either Like the Sun or The Open Window. You can choose to focus your story on one of 3 characters - Sekhar, Mr. Nuttle, or Vera and what happens with them next. For Sekhar, it is the next day and he now has to deal with the fallout from his day of truth-telling...with his wife, his co-workers, and the headmaster. For Frampton Nuttle, what happens to him after he runs out of the house. Finally, for Vera, what does she tell her Aunt and Uncle after Frampton has run out of the house in complete terror.No links and don't answer if you don't know what to writeI will mark Brainliest, I will also report if you write something foolishNeed this ASAP, Thank you Stuart McGregors goal was to be a chef, and he received a highly prestigious apprenticeship just before turning 17. Soon after starting his apprenticeship, he Experienced verbal abuse at work, and colleagues began making innuendos about his sexuality. He was once given a large bag of peas by the kitchen managers and asked to count them.McGregor was told by his colleagues that he was going to receive an award. Excitedly, he called his family and could not wait to receive the award later in the day. Unknown to him, however, his peers had broken into his car and stolen the knob of his gear stick. They then wrapped it up and gave it to him as his award in front of the entire staff.McGregor was regularly asked to perform tasks he did not know how to do and then was ridiculed when he did them incorrectly. Shortly before the conclusion of the apprenticeship period, he was invited to go on a camping trip with his workmates. Sadly, the kitchen managers threatened him with bodily harm if he went. McGregor was afraid for his safety and made excuses to avoid the trip.Another employee ultimately complained about being bullied, and investigators questioned McGregor about his experience. He denied being bullied, probably out of fear for his safety, fear of losing his job, or because he thought he could handle the situation.Consider how you might have resolved the situation faced by Stuart McGregor. Applying the 3-Step Problem-Solving Approach1. Define the problem in this case.2. Identify what OB concepts or theories help explain McGregors situation and reaction.3. Recommend what you would do if you were McGregor and also if you were the manager of therestaurant.Prepare a 15-minute PowerPoint presentation on your approach indicating the problem, the theories you will use to explain the problem and the recommendations you will suggest. Find the solution(s) for x in the equation below.x2 25 = 0 Solve 4,200 70 = ________. Rewrite as a fraction to help you. PLEASE HELP!!! I ONLY HAVE A FEW MINUTES!! PLEASE HELP NOW If YOU KNOW YOUR RIGHTWhat are the FOUR geographical regions of Honduras?interior highlandsMosquito Coastrain forestCoastal plainsPacific lowlandssemiarid desertsCaribbean lowlands The ___________________ contains receptors for monitoring the position of the head. What is unique about Indian people? Sulfur reacts with oxygen to form sulfur dioxide (SO2(g), Delta. Hf = "296. 8 kJ/mol) according to the equation below. Upper S (s) plus upper O subscript 2 (g) right arrow upper S upper o subscript 2 (g). What is the enthalpy change for the reaction? Use Delta H r x n equals the sum of delta H f of all the products minus the sum of delta H f of all the reactants. "593. 6 kJ "296. 8 kJ 296. 8 kJ 593. 6 kJ. how to get anything you want? Use a graphing calculator to approximate the vertex of the graph of the parabola defined by the following equation. Y = x squared + x + 6 a. (0. 5, -5. 75) c. (-0. 5, 6) b. (-0. 5, 5. 75) d. (0. 5, 5. 75). We need to use 60 yards of fencing to enclose a rectangular shaped garden the length is 30 yards less than twice the width. Find the dimensions of the garden. Y=-3x+1 y+5=-3(x-2) what do the following two equations represent A)The same line B)Distinct parallel lines C)Perpendicular Lines D)Intersecting, but not perpendicular lines ANSWER IT!!! I ONLY HAVE MINUTES