Communication exchanges with a command and control (C2) server are typically performed using the Remote Procedure Call (RPC) protocol.
RPC is a protocol that allows a computer program to make a request to a remote server and receive a response. It is used by many applications and services to communicate with remote servers, and is often used in C2 operations to register with a C2 server and receive further instructions.
The Remote Procedure Call (RPC) protocol is a protocol used for communication between two or more computers. It allows a program running on one computer to make a request to a remote program running on another computer and receive a response. It is used for distributed computing, allowing different computers to communicate with each other and access services provided by other computers. RPC is often used in C2 operations to register with a C2 server and receive further instructions.
Learn more about (RPC) protocol. :
https://brainly.com/question/14390380
#SPJ4
1. Casting is the process that occurs when a. a number is converted to a string b. a floating-point number is displayed as a fixed-point number c. a string is converted to a number d. one data type is converted to another data type
2. Code Example 6-1 float counter = 0.0; while (counter != .9) { cout << counter << " "; counter += .1; } (Refer to Code Example 6-1.) How could you modify this code so only the numbers from 0 to 0.8 are displayed at the console? a. a and c only b. Cast the counter variable to an integer within the while loop c. Round the counter variable to one decimal point within the while loop d. Change the condition in the while loop to test that counter is less than .85 e. All of the above
3. Code Example 6-1 float counter = 0.0; while (counter != .9) { cout << counter << " "; counter += .1; } (Refer to Code Example 6-1.) What happens when this code is executed? a. The program displays the numbers from 0 to 0.8 in increments of .1 on the console. b. The program displays the numbers from .1 to 0.9 in increments of .1 on the console. c. The program displays the numbers from 0 to 0.9 in increments of .1 on the console. d. The program enters an infinite loop.
4. If you want the compiler to infer the data type of a variable based on it’s initial value, you must a. define and initialize the variable in one statement b. store the initial value in another variable c. code the auto keyword instead of a data type d. all of the above e. a and c only
5. When a data type is promoted to another type a. the new type may not be wide enough to hold the original value and data may be lost b. an error may occur c. the new type is always wide enough to hold the original value d. both a and b
6. When you use a range-based for loop with a vector, you a. can avoid out of bounds access b. can process a specified range of elements c. must still use the subscript operator d. must still use a counter variable
7. Which of the following is a difference between a variable and a constant? a. The value of a variable can change as a program executes, but the value of a constant can’t. b. Any letters in the name of a variable must be lowercase, but any letters in the name of a constant must be uppercase. c. You use the var keyword to identify a variable, but you use the const keyword to identify a constant. d. All of the above
8. Which of the following is a difference between the float and double data types? a. float numbers are expressed using scientific notation and double numbers are expressed using fixed-point notation b. float contains a floating-point number and double contains a decimal number c. float can have up to 7 significant digits and double can have up to 16 d. float can provide only for positive numbers and double can provide for both positive and negative
9. Which of the following statements is not true about a vector? a. Each element of a vector must have the same data type. b. The indexes for the elements of a vector start at 1. c. It is a member of the std namespace. d. It is one of the containers in the Standard Template Library.
1. Casting refers to the process of converting one data type to another data type.
What is casting?Casting refers to the process of converting one data type to another data type. It can involve converting a number to a string, displaying a floating-point number as a fixed-point number, or converting a string to a number.
2 e. All of the above
You can modify the code by casting the counter variable to an integer within the while loop, rounding the counter variable to one decimal point within the while loop, and changing the condition in the while loop to test that the counter is less than 0.85. This combination of modifications will ensure that only the numbers from 0 to 0.8 are displayed.
3. d. The program enters an infinite loop.
The code will result in an infinite loop because floating-point numbers cannot be represented exactly in binary. Due to the rounding errors in floating-point arithmetic, the condition counter != 0.9 will never be true, causing the loop to continue indefinitely.
4. e. a and c only
If you want the compiler to infer the data type of a variable based on its initial value, you can define and initialize the variable in one statement (e.g., auto variable = initial_value;) or use the auto keyword instead of specifying a data type explicitly.
5. d. both a and b
When a data type is promoted to another type, the new type may not be wide enough to hold the original value, leading to data loss. This can result in incorrect or unexpected results. Additionally, an error may occur if the promotion involves incompatible data types.
6. a. can avoid out of bounds access
When using a range-based for loop with a vector, you can avoid out-of-bounds access because the loop automatically iterates over the elements within the specified range of the vector.
7. a. The value of a variable can change as a program executes, but the value of a constant can't.
The main difference between a variable and a constant is that the value of a variable can be modified during program execution, while the value of a constant remains constant and cannot be changed.
8. a. float numbers
The float data type represents single-precision floating-point numbers, while the double data type represents double-precision floating-point numbers. Double has higher precision and can store larger and more precise floating-point values compared to float.
Read more on float numbers here:https://brainly.com/question/29242608
#SPJ4
a school principal trying to find out if parents will help buy new playground equipment shows digital leadership by.
A. asking the school board to ask parents
B. Creating a email survey for parents
C. Ordering the equipment and asking parents to contribute
D. Setting up a web conference for a small group of parents
Answer:
D. is the correct answer!
Answer:
B. Creating a email survey for parents
Explanation:
I did this on edg
____ is used to exit the Python Shell.
We should use the exit() function to exit the Python shell and return to the system prompt. The shortcut to close the Python shell is Ctrl + D.
We can invoke the Python shell by opening a terminal window and typing the word 'python'. A Python shell only provides users the functionality of entering commands and functions in the command line.
This shell has a partial history of all the commands being used in the command line, but only for a session.
The exit () function is an in-built function to come out of the execution loop of the program. This function is defined in the site module only.
To learn more about python shell,
https://brainly.com/question/30365096
Students performed an investigation on how aluminum cans taken to a recyle center were able to be reused. they found out an aluminum can undergoes which type of change?
In your investigation, students discovered that aluminum cans undergo a physical change when taken to a recycling center.
During the recycling process, the aluminum cans are first sorted, cleaned, and then shredded. After shredding, they are melted down to form molten aluminum. This molten aluminum is then cooled and shaped into new products, such as new aluminum cans or other aluminum objects. Throughout the entire process, the aluminum's chemical composition remains unchanged, meaning that it undergoes a physical change rather than a chemical change. This allows the aluminum to be reused and recycled multiple times without losing its original properties.
To know more about aluminum visit:
https://brainly.com/question/4229590
#SPJ11
what isa programming language
Answer:
programming language is a formal language comprising a set of instruction that produce various kind of out put.
Answer:
A programming language defines a set of instructions that are compiled together to perform a specific task by the CPU .hope it's helps you have a great day keep smiling be happy stay safe.How do i fix this? ((My computer is on))
Answer:
the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?
Answer:your computer had a Damage by u get it 101 Battery
and if u want to fix it go to laptop shop and tells him to fix this laptop
Explanation:
true or false? the u.s. government currently has no standard for creating cryptographic keys for classified applications
The United States government selected the symmetric block cipher known as the Advanced Encryption Standard (AES) to safeguard sensitive data. To encrypt data, AES is used in hardware and software across the globe.
What type of encryption does the US government employ?The current encryption standard for the majority of governmental and commercial IT security applications is the Advanced Encryption System (AES). In 2001, AES was selected as the U.S. government's security standard. Over time, it has developed into the encryption standard for the majority of businesses in the private sector.
In the US, is encryption permitted?It varies. The import, export, and use of encryption goods may be prohibited in the United States and many of the countries you travel to due to their potential use for criminal and terrorist activity.
to know more about cryptographic keys here:
brainly.com/question/14278859
#SPJ1
What is the function of cache memory
Answer:
is below
Explanation:
cache memory, also called cache, supplementary memory system that temporarily stores frequently used instructions and data for quicker processing by the central processing unit (CPU) of a computer. The cache augments, and is an extension of, a computer’s main memory.
that is what i found mixed with what ik so hope that helps
Which of the following are advantages of coding manually? Check all of the boxes that apply.
You can see what rendered code looks like as you type.
You can view source code to figure out HTML structure and behavior.
You can learn how HTML works.
You do not need a lot of HTML knowledge to create complex web pages.
Answer: Answer B
Explanation: My point of view this answer is correct because when we write any code then we have observed the lines of code to check whether they meet the conditions or not
To minimize the degradation of spatial beam profiles of laser beams due to beam
divergence when propagating over a free space, a technique called relay imaging is often used
inside lasers and precision imaging systems. A student has constructed a relay imaging setup using
two converging lenses, each having a focal length of +100 mm, and placed 330 mm apart along
the optical axis. On the left side in front of the first lens, there is an object 190 mm away from the
lens. By using the thin lens equation, determine the location of the final image, and the total
magnification of the optical arrangement.
The final image location can be determined by applying the thin lens equation, given the focal length and object distance. The total magnification can be calculated by dividing the image distance by the object distance.
What is the purpose of the EXP-LAN protocol in enterprise networks?EXP-LAN stands for "Enterprise eXtended Protocol Local Area Network". It is a term used to describe a local area network (LAN) that utilizes the Enterprise eXtended Protocol (EXP) for communication.
The EXP protocol is an advanced networking protocol designed for high-performance and scalable LAN environments, offering features such as improved reliability, enhanced security, and increased bandwidth efficiency.
An EXP-LAN implementation typically involves the deployment of network equipment and infrastructure that supports the EXP protocol to enable efficient and robust communication within an enterprise or organization.
Learn more about equation
brainly.com/question/29657983
#SPJ11
What is machine? Any three example of cpu ? show principle of computer.
Answer:
Single Core
Dual Core
Quad Core
Explanation:
web design, pls help me i need this in 40 minutes
<input type="color">: This input type allows the user to select a colour using a colour picker. , This input type, "date," enables users to choose a date from a calendar.
Which seven different text structures are there?A few examples of text structures are sequence/process, description, time order/chronology, proposition/support, compare/contrast, problem/solution, cause/effect, inductive/deductive, and research.
How should a date be formatted?Here is a general rule to remember when writing dates with commas: in the month-day-year format (used in the United States), use commas after the day and year. Do not use any commas when using the day-month-year format, which is used in the UK and other nations. In 2007, on May 13, Daniel was born.
To know more about input type visit:-
https://brainly.com/question/14543408
#SPJ1
Text mining is a __________, while NLP is a __________. Method, Process Process, Process Process, Method Method, Method
The answer to text mining and NLP being either a method or a Process are; Text mining is a Process while NLP is a method
Understanding Text mining & NLPNLP is a method whereby text, speech, images, signs, and other forms of natural human communication are all utilized to examine the grammatical structures that the end - user inputs and derives semantic meanings.
However, Text mining is a technique that is used for analyzing text documents by making use of qualitative analysis to extract the properties of the materials.
Read more about Text Mining at; https://brainly.com/question/25873249
njbuhbgtgyuhjkhghghvgbtyujhnhbvgvfgtyujhnhbgfrtrythg
Answer:
odkgxxkxhfohxgichocohct8xiycohx8tx8ychichicjoviyxycohvi
Explanation:
brainlylist please
ap computer science principles practice quiz unit 9 What is data?I. Computer readable informationII. Information collected about the physical worldIII. Programs that process imagesIV. Graphs and charts
Data refers to computer-readable information that can be used for various purposes, including analysis and decision-making. It is typically collected from various sources, including human input, sensors, and automated systems. This information can be stored and processed by computer programs to generate insights and inform actions.
The scope of data is vast and includes information collected about the physical world, such as environmental conditions, and information about human behavior, such as social media usage patterns. It can also include programs that process images, such as facial recognition software or satellite imagery analysis.
Data can be represented in various ways, including graphs and charts, which can help to visualize complex information and make it easier to understand. These visualizations can be used to identify patterns, trends, and relationships between different data points, and inform decision-making in various fields, including business, healthcare, and government.
To learn more about, analysis
https://brainly.com/question/19671930
#SPJ11
When is it appropriate to delete an entire row or column as opposed to deleting the data in the row or column
Answer:
huh wdym
Explanation:
Using the sequences x[n]={−5,8,2} and h[n]={3,−1,0,5}, aUse the circular convolution command 'cconv' in MATLAB to compute the 4-point circular convolution. Turn in a copy of your code and the output which you can copy from the Workspace (or from the command window if you leave off the semicolon on the line where you calculate the convolution). b. Add another line to your code to find the output of the circular convolution command in the previous part if you do not specify the number of points for the circular convolution . This is the same as the linear convolution. Turn in a copy of the output.
The code in MATLAB to compute the 4-point circular convolution is in the explanation part below.
Here's an example MATLAB code that uses the above sequences to execute circular and linear convolution:
% Circular convolution
x = [-5, 8, 2];
h = [3, -1, 0, 5];
conv_circular = cconv(x, h, 4);
disp('Circular Convolution:');
disp(conv_circular);
% Linear convolution
conv_linear = conv(x, h);
disp('Linear Convolution:');
disp(conv_linear);
Thus, in this code, we define the input sequences x and h.
For more details regarding MATLAB, visit:
https://brainly.com/question/30763780
#SPJ4
The real power of data validation becomes apparent when you use data validation formulas. The formula that you specify must be a logical formula that returns either true or false. If the formula evaluates to true, what does it mean?.
What a user can enter into a cell can be regulated with the use of data validation. Examples of common scenarios that you might encounter are covered in these formulas.
What is a formula for data validation?Validating data to prevent duplication and only permit unique entries. The formula returns TRUE and the validation is successful when a singular value is entered. When the input cannot be validated because the same value already exists in the range supplied (count larger than 1), COUNTIF returns FALSE.
How may data validation be used in an equation?To a cell or range, add data validationTo validate, pick one or more cells.Click Data Validation under the Data Tools section of the Data tab.Select List in the Allow box on the Settings tab.Type your list values in the Source box, separating them with commas.The In-cell dropdown check box must be selected.To learn more about 'Data validation' refer to
https://brainly.com/question/20411239
#SPJ4
a corporation establishes gateways gw1 and gw2 at different branches. they enable machines in different branches to communicate securely over the internet by implementing ipsec at the gateways only. that means that when a machine a inside the first network sends an ip packet to a machine b in the second network, the gateway gw1 intercepts the ip packet in transit and encapsulates it into an ipsec packet. at the other end, gw2 recovers the original ip packet to be routed in the second network to machine b. which of the two ipsec modes, tunnel or transport, and ah or esp, should be used in combination if it was desired that no internet eavesdroppers learn about the identities a and b of the communicating parties? why?
In order to ensure that no internet eavesdroppers learn about the identities of the communicating parties, the corporation should use the tunnel mode and the ESP protocol in combination.
The tunnel mode creates a new IP packet and encrypts the entire original packet, including the header, which hides the identities of the communicating parties. The ESP protocol provides confidentiality by encrypting the packet and also provides data integrity by adding a message authentication code (MAC) to the packet. The AH protocol provides authentication and integrity but does not provide confidentiality. This means that even though the identities of the parties would be protected, the content of the communication would not be. Therefore, the ESP protocol should be used instead. Here's why:
1. Tunnel mode: This mode is more suitable for gateway-to-gateway communication because it encapsulates the entire original IP packet, including the IP header, in a new IPsec packet. This way, the identities of the communicating parties (Machine A and Machine B) are hidden from internet eavesdroppers, as they can only see the gateway addresses (GW1 and GW2) in the new IPsec packet headers.
2. ESP (Encapsulating Security Payload): ESP provides both confidentiality (encryption) and data integrity (authentication) for the encapsulated IP packet. It is more appropriate in this case than AH (Authentication Header), which only provides data integrity without encryption. By using ESP, the corporation ensures that the contents of the communication between Machine A and Machine B are also protected from eavesdropping and tampering.
In summary, to prevent internet eavesdroppers from learning about the identities of the communicating parties (Machine A and Machine B) in the corporation's network, it is recommended to use Tunnel mode with ESP for implementing IPsec at the gateways GW1 and GW2.
Learn more about AH protocol here:
https://brainly.com/question/31926020
#SPJ11
write a version of the program in which you only use clrw, addlw, and xorlw instructions;
Here's an example version of the program using only `CLRW`, `ADDLW`, and `XORLW` instructions in assembly-like syntax:
ORG 0x00; Set origin address
; Data section
DATA 0x05 ; arr[0]
DATA 0x04 ; arr[1]
DATA 0x03 ; arr[2]
DATA 0x02 ; arr[3]
DATA 0x01 ; arr[4]
; Program section
MOVLW 0x01 ; Initialize i = 1
MOVWF i
LOOP:
CLRW ; Clear the working register
ADDLW 0x01 ; Add 1 to the working register
XORLW 0x05 ; XOR the working register with 0x05 (arr.length)
BTFSS Z ; Skip the next instruction if Z flag is set (i >= arr.length)
GOTO END ; Exit the loop if i >= arr.length
MOVLW 0x01 ; Initialize insertItem
ADDWF i, W ; Add i to W (i + 1)
MOVWF insertItem
MOVLW 0x01 ; Initialize k = i - 1
SUBWF i, W ; Subtract i from W (i - 1)
MOVWF k
WHILE_LOOP:
CLRW ; Clear the working register
ADDWF k, W ; Add k to W
XORLW 0x05 ; XOR the working register with 0x05 (arr.length)
BTFSS Z ; Skip the next instruction if Z flag is set (k < 0)
GOTO END_WHILE_LOOP ; Exit the while loop if k < 0
CLRW ; Clear the working register
ADDWF k, W ; Add k to W
XORLW 0x01 ; XOR the working register with 0x01 (1)
BTFSC Z ; Skip the next instruction if Z flag is clear (arr[k] <= insertItem)
GOTO END_WHILE_LOOP ; Exit the while loop if arr[k] <= insertItem
MOVLW 0x01 ; Initialize k - 1
SUBWF k, W ; Subtract k from W (k - 1)
MOVWF k ; Update k
GOTO WHILE_LOOP ; Repeat the while loop
END_WHILE_LOOP:
MOVF insertItem, W ; Move insertItem to W
CLRW ; Clear the working register
ADDWF k, W ; Add k to W
XORLW 0x01 ; XOR the working register with 0x01 (1)
BTFSS Z ; Skip the next instruction if Z flag is set (k < 0)
GOTO END ; Exit the loop if k < 0
MOVWF arr + k + 1 ; Store arr[k] in arr[k+1]
MOVLW 0x01 ; Initialize k - 1
SUBWF k, W ; Subtract k from W (k - 1)
MOVWF k ; Update k
GOTO WHILE_LOOP ; Repeat the while loop
END:
; End of the program
; Variables
i EQU 0x0A
k EQU 0x0B
insertItem EQU 0x0C
learn more about program here:
https://brainly.com/question/31074383
#SPJ11
Write a loop that continually asks the user what pets the user has until the user enters rock in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have a dog with a total of 1 pet(s) if they enter dog, and so on
Loops are program statements that are repeated as long as the loop condition is true.
The loop in Python, where comments are used to explain each line is as follows:
#This initializes the number of pets to 0
count = 0
#This gets input for the pet name
pet = input("Pet: ")
#This is repeated until the user enters "rock"
while pet.lower() != "rock":
#This increases the number of pets by 1
count+=1
#This prints the pet and the number of pets
print("You have a",pet,"with a total of",str(count),"pet(s)")
#This gets input for the pet name
pet = input("Pet: ")
Read more about loops at:
https://brainly.com/question/19344465
What protocols does advanced IP Scanner use?
Advanced IP Scanner consists of protocols including ICMP ping, SNMP scans, as well as ARP.
What are examples of protocols?Types of communication protocol include TCP/IP and HTTP, which are fundamental data communication technologies. Management protocols maintain and regulate the network using protocols such ICMP and SNMP. Three security protocols are HTTPS, SFTP, and SSL.
What does protocol mean in communication?A collection of guidelines that communication partners must abide by in order to transmit information are known as communication protocols. Protocols are simply established procedures for ensuring that two or more communications entities linked together can identify and communicate with one another.
To know more about protocols visit:
brainly.com/question/30264898
#SPJ4
PLEASE HELP ME ASAP
which of the following technologies is now being used to do many of the things that Adobe Flash was once used for
Answer:Advanced HTML and JavaScript
Explanation:
Answer:
Advanced HTLM and javascript
What's the size of this struct? struct record4 int a; int c; float e; char b; char d; A 16 B 20 C 14 D 24
The size of the struct `record4` is **D) 24 bytes**.
To calculate the size of a struct, we add up the sizes of its individual members, taking into account padding and alignment.
In this case, we have:
- `int a` (4 bytes)
- `int c` (4 bytes)
- `float e` (4 bytes)
- `char b` (1 byte)
- `char d` (1 byte)
When calculating the size, the compiler may add padding bytes to ensure proper alignment. In this case, to align the `float e` member, the compiler may add 2 bytes of padding after `int c` and `char b`.
So, the total size of the struct becomes:
4 (int a) + 4 (int c) + 4 (float e) + 1 (char b) + 1 (char d) + 2 (padding) = **16 bytes**.
It's important to note that the size of a struct can vary depending on the compiler and its specific padding and alignment rules. To ensure consistency, it's good practice to use compiler-specific directives, such as `#pragma pack`, to control the padding and alignment of structs when necessary.
learn more about struct here:
https://brainly.com/question/31414222
#SPJ11
What does output allow a computer to do?
Answer:
communicate information to a user or another system
Explanation:
An output device allows data to be transmitted by the computer in a human-friendly form, for example, sound being played through a speaker. Monitor which is the main output device of a computer.
Also please help me on my previous please!!!
Which of these can replace the function of lenses in a telescope?
Group of answer choices
Photographic Plate
Mirror
Charge Coupled Device (CCD)
Diffraction Grating
Prism
Flag question: Question 7
Question 72 pts
If you wanted a higher resolution image, what should you do?
Group of answer choices
Use a brighter background light
Have less background light
Get a bigger telescope
Use more colors
Use a microscope instead
Flag question: Question 8
Question 82 pts
Radio telescopes often combine the signals from multiple antennae to simulate a much larger telescope using what technique?
Group of answer choices
Seeing Disk
Hubble’s Law
The Doppler Effect
Adaptive Optics
Interferometry
Flag question: Question 9
Question 92 pts
What does 5772 K represent for the Sun?
Group of answer choices
The temperature that the Earth would be heated up to by the Sun if we didn’t have an atmosphere blocking out infrared radiation
The temperature at the center of a sunspot
The temperature of a blackbody that best fits the Sun’s surface emission
The average temperature throughout its entire structure
Its highest core temperature
Flag question: Question 10
Question 102 pts
What represents the amount of solar energy received at the top of Earth’s atmosphere?
Group of answer choices
Sunspot
Solar flux
Solar constant
Nuclear fusion
Solar luminosity
Telescopes are tools that enable us to see distant objects. Lenses or mirrors in telescopes are used to reflect and focus light onto a detector that can record the image.
The role of lenses in a telescope can be substituted by a mirror. Mirrors have curved surfaces that reflect light and bring it to a focal point. Light passes through the telescope tube and is reflected from the primary mirror to the secondary mirror and then onto the eyepiece.Radio telescopes often combine the signals from multiple antennae to simulate a much larger telescope using the technique called Interferometry. It is used for higher resolution and sensitivity of the telescopes.The temperature of a black body that best fits the Sun’s surface emission represents 5772 K for the Sun. A black body is an idealized object that absorbs all the radiation that falls on it. It emits radiation in a unique way that depends only on its temperature. The temperature of the sun's surface is approximately 5,800 Kelvin, while the sun's core is roughly 15 million Kelvin.The amount of solar energy received at the top of Earth's atmosphere is called the solar constant. It represents the amount of power received per unit area and has a value of approximately 1,366 watts per square meter. It is used as a standard measurement for determining the solar energy received by the earth.
Learn more about image :
https://brainly.com/question/29347554
#SPJ11
11.1.2 Ball and Paddle Code HS JavaScript
Overview
Add the ball and paddle. The ball should bounce around the screen. The paddle should move with the mouse.
Add Ball and Paddle
The first step is to add the ball to the center of the screen, and the paddle to the bottom of the screen. The dimensions of the paddle and its offset from the bottom of the screen are already constants in the starter code.
The next step is to get the paddle to move when you move the mouse. The paddle should be centered under the mouse, and should not go offscreen.
Move Paddle, Bounce Ball
The next step is to get the ball to bounce around the screen. We may have done this exact problem before…
Using the knowledge in computational language in JAVA it is possible to write a code that Add the ball and paddle. The ball should bounce around the screen. The paddle should move with the mouse.
Writting the code:function setupBall(){
ball = new Circle(BALL_RADIUS);
ball.setPosition(getWidth()/2, getHeight()/2);
add(ball);
}
function setupPaddle(){
paddle = new Rectangle(PADDLE_WIDTH, PADDLE_HEIGHT);
paddle.setPosition(getWidth()/2 - paddle.getWidth()/2,
getHeight() - paddle.getHeight() - PADDLE_OFFSET);
add(paddle);
}
function getColorForRow(rowNum){
rowNum = rowNum % 8;
if(rowNum <= 1){
return Color.red;
}else if(rowNum > 1 && rowNum <= 3){
return Color.orange;
}else if(rowNum > 3 && rowNum <= 5){
return Color.green;
}else{
return Color.blue;
}
}
function drawBrick(x, y, color){
var brick = new Rectangle(BRICK_WIDTH, BRICK_HEIGHT);
brick.setPosition(x, y);
brick.setColor(color);
add(brick);
}
function drawRow(rowNum, yPos){
var xPos = BRICK_SPACING;
for(var i = 0; i < NUM_BRICKS_PER_ROW; i++){
drawBrick(xPos, yPos, getColorForRow(rowNum));
xPos += BRICK_WIDTH + BRICK_SPACING;
}
}
function drawBricks(){
var yPos = BRICK_TOP_OFFSET;
for(var i = 0; i < NUM_ROWS; i++){
drawRow(i, yPos);
yPos += BRICK_HEIGHT + BRICK_SPACING;
}
}
function setSpeeds(){
vx = Randomizer.nextInt(2, 7);
if(Randomizer.nextBoolean())
vx = -vx;
}
function setup(){
drawBricks();
setupPaddle();
setupBall();
setSpeeds();
}
See more about JAVA at brainly.com/question/18502436
#SPJ1
PLEASE HELP!
A ... study will help Neil analyze and examine the proposed product.
Answer:
Feasibility
Explanation:
A feasibility study is the analysis and examination of the proposed product
________ deals with more objective, rational, and technical knowledge.
Explicit knowledge deals with more objective, rational, and technical knowledge.
Explicit knowledge is knowledge that can be readily verbalized, codified, stored and accessed. Hence, explicit knowledge can be easily transmitted to others.
Explicit knowledge is the most basic form of knowledge since it can be easily accessed. Examples of explicit knowledge is company data sheets, research reports. Explicit knowledge deals with more objective, rational, and technical knowledge.
Find out more at: https://brainly.com/question/16980038
PLZ HELPP ME!!!
You are driving on a highway and your gas pedal gets jammed. You cannot reduce engine
power. You should keep your eyes on the road and
A: Stay in the gear you are in. Turn off the ignition, and remove the ignition key from the lock.
B: Shift into neutral. Then turn off the ignition without locking the steering, and use your brakes to
stop.
C: Shift your vehicle into top gear. Then apply the parking brake as hard as you can
Answer:
b
Explanation:
shift to neutral then use brakes
In pedal gets jammed, Shift into neutral. Then turn off the ignition without locking the steering, and use your brakes to stop.
What to do in the above case?If the vehicle that is its accelerator pedal is said to be stuck in case a person is driving, one can press the brake and also put their hands on the wheel and then shift the gear to neutral.
Conclusively, When your gas pedal gets jammed, by doing the above that is shifting your gear into neutral and turning off the ignition without locking the steering, one can use the brakes to come to a stable halt.
Learn more about highway from
https://brainly.com/question/2919240
#SPJ2