How has social networking changed political communication?

Answers

Answer 1

When movement organizers can use social media to swiftly and efficiently convey information about upcoming events and political changes, organizing protest activities is made easier.

What is political communication research?

Social media, especially when it comes to political views, is a persuasive communication tool that commonly works to change or influence beliefs since there are so many ideas, thoughts, and opinions circulating on the social media platform.

The introduction of social media in the mid-2000s dramatically changed political communication in the United States because it allowed regular people, politicians, and thought leaders to publicly convey their ideas to sizable networks of like-minded people and engage with them.

It is simpler to organize protest activities when movement leaders can quickly and effectively disseminate information about impending occasions and political changes using social media.

With a focus on comprehending the historical and present state of technological developments, PEC (Political Economy of Communications) analyzes the power relations between the mass media system, information and communications technologies (ICTs), and the larger socioeconomic structure in which these operate.

To learn more about political communication refer to:

https://brainly.com/question/2499229

#SPJ4


Related Questions

What is the primary tool that retrieves data and helps users graphically design the answer to a question

Answers

Query by Example (QBE) is the primary database query tool in which the user sets conditions for search selection.

What is Query by Example?

It is a database query language where the first results presented are those that the search engine considers the most relevant for the search carried out.

It is characterized by having a system for ranking and ordering search results that allows the user to return more relevant results.

Therefore, we can conclude that Query by Example (QBE) is the primary database query tool in which the user sets conditions for search selection.

Learn more about Query by Example (QBE) here: brainly.com/question/7479160

What does this mean? it is coming after i ask a question

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

Answer:

To my own opinion I think it means that when you're answering a question here in brainly I think they are referring that your message is rude but sometimes you are not rude but I don't know. Maybe it could be some difficult technical problems.

5. All of the following are part of a cylinder head EXCEPT:
OA. Water pump
OB. Combustion chamber
OC. Valve guides
OD. Valve seats

Answers

Answer:

Wouldn't it be B? I mean a combustion chamber is where the fuel and air mixture are injected to be ignited and burned to produce power to a vehicle.

Explain why it is important to use the correct spatial
referencing method, map projection and datum in a GIS project

Answers

Answer:

Using the correct spatial referencing method, map projection, and datum in a Geographic Information System (GIS) project is crucial for several reasons:

Explanation:

Accurate Geospatial Analysis: GIS projects involve analyzing and visualizing spatial data. Choosing the appropriate spatial referencing method ensures that the data aligns accurately with the real-world geographic coordinates. It enables accurate geospatial analysis, such as measuring distances, calculating areas, and performing spatial queries.

Data Integration and Interoperability: GIS projects often involve combining datasets from various sources and integrating them into a common spatial framework. Using consistent map projections and datums ensures that different datasets align properly and can be integrated seamlessly. It facilitates data interoperability, allowing different GIS layers to be overlaid and analyzed together accurately.

Avoiding Distortions and Errors: Different map projections introduce distortions in representing the curved Earth surface on a flat map. Each map projection has its own strengths and limitations, and choosing the appropriate one for a specific project minimizes distortions and errors. Using an unsuitable map projection can lead to inaccuracies, such as misshapen features, distorted distances, or incorrect spatial relationships.

Coordinate Transformation and Data Sharing: GIS projects often require sharing data with others or integrating data from different regions or coordinate systems. By using the correct datum and coordinate transformation techniques, data can be accurately converted between different spatial referencing systems, ensuring seamless data sharing and integration. It facilitates collaboration among different stakeholders and allows for the proper analysis of data across different geographic areas.

Standardization and Consistency: Following established spatial referencing methods, map projection standards, and datums ensures consistency across GIS projects and promotes interoperability with existing geospatial datasets and systems. It enables data sharing, comparison, and analysis between different projects and organizations, fostering a standardized and compatible geospatial data environment.

can zenmap detect which operating systems are present on ip servers and workstations? which option includes that scan?

Answers

Answer:

Yes, Zenmap can detect which operating systems are present on IP servers and workstations. Zenmap has a built-in OS detection feature that allows it to identify the operating system running on a remote target.

the staywell property management team wants a list of all property addresses combined with the name of the owners. you will need to return three columns: the first name as first name, the last name as last name, and the property address as address of the owners.

Answers

SELECT first_name AS first_name, last_name AS last_name, property_address AS address

FROM property_owners;

What is the SQL query to retrieve a list of property addresses combined with the names of the owners?

To obtain a list of property addresses combined with the names of the owners, we can execute a SQL query. The query will retrieve the required information from the "property_owners" table.

By using the SELECT statement, we can specify the columns we want to include in the result. In this case, we select the first name as "first_name," the last name as "last_name," and the property address as "address."

By referencing the appropriate columns from the "property_owners" table and utilizing the AS keyword, we can assign desired aliases to the selected columns. This allows us to customize the column names in the result set to match the requested format.

Learn more about SQL query

brainly.com/question/31663284

#SPJ11

how many lines of text are in your questionnaire document

Answers

Answer:

*9* lines - I think.

Explanation:

A group of computers that share resources are called what?

Answers

Answer:

A network

Explanation:

In the table below, there are a few white collar crimes listed. After reviewing the link
above, define each crime and give an example of each white collar crime listed.
Money Laundering
Investment Fraud
Ponzi Scheme
Pyramid Scheme
Promissory Note
Fraud
Commodities Fraud
Broker Embezzlement
Market Manipulation

Answers

Answer:

Money Laundering: The process of hiding the source of illegally-obtained money.

Investment Fraud: A type of fraud that involves convincing a person to invest money in a fake

or worthless investment.

Ponzi Scheme: A type of investment fraud in which a person uses money from new investors

to pay off existing investors.

Pyramid Scheme: A type of investment fraud in which a person uses money from new investors

to pay their own personal expenses.

Promissory Note: A document that promises to pay a certain amount of money to a certain person

by a certain date.

Fraud: A type of white collar crime in which a person lies or uses deception in order to gain

something of value.

Commodities Fraud: A type of fraud that involves illegally manipulating the prices of

commodities.

Broker Embezzlement: A type of fraud in which a broker illegally uses their clients' money

for their own personal gain.

Market Manipulation: A type of fraud in which a person artificially inflates or deflates the

price of a security.

Explanation:

FILL IN THE BLANK. Appropriate ____ control is essential to ensure the confidentiality, integrity, and availability of the DBMS.a.participationb.maintenancec.locationd.access

Answers

The appropriate answer to the blank would be "access control." Access control refers to the process of controlling who has access to the database and what level of access they have. It is essential to ensure the confidentiality, integrity, and availability of the DBMS.

Confidentiality is the protection of sensitive data from unauthorized access. The access control mechanism ensures that only authorized users can access the data and protects it from unauthorized access.
Integrity refers to the accuracy and consistency of data. The access control mechanism ensures that only authorized users can modify the data and protects it from unauthorized modifications.
Availability refers to the accessibility of data when it is needed. The access control mechanism ensures that authorized users can access the data when they need it and protects it from unauthorized access that could lead to denial of service attacks.
Overall, access control is an essential component of database security, and it plays a critical role in ensuring the confidentiality, integrity, and availability of the data stored in the DBMS. Organizations need to implement appropriate access control mechanisms to protect their sensitive data from unauthorized access, modification, and theft.

Learn more about access control here:

https://brainly.com/question/28288408

#SPJ11

Assignment: Blues Progression
Blues is a sub-genre of jazz that follows some specific guidelines: specifically, the Blues scale and the Blues chord progression.
In this assignment, you’ll write out a 12-bar Blues chord progression. This assignment is a MuseScore assignment. Do not turn in this document for grading.

Directions:

1. Create a new document in MuseScore
a. For the title, write “MuseScore Assignment: Blues”.
b. For the composer, write your name., then click "next".
c. Under "general", choose “Grand Staff”, then click “Next”.
d. Choose G major for your key signature (1 sharp), then click next.
e. Choose “Piano” (in the Keyboards section) for your instrument. (This step may or may not show for you. It's ok either way!)
f. Choose 4/4 for your Time Signature and 12 measures for number of measure.
g. Click “Finish”.

2. In the Bass Clef, write out a 12-bar Blues Chord Progression.
a. Use whole notes for your chords
b. I – I – I – I – IV – IV – I – I – V7 – IV – I – V7

Save your assignment (with your name!) and submit it to the Composition: Blues Progression Dropbox basket. Turn in the MuseScore file only.

Answers

Explanation:

I can provide you with the 12-bar Blues chord progression as you requested:

In the key of G major:

I (G) – I (G) – I (G) – I (G)

IV (C) – IV (C) – I (G) – I (G)

V7 (D7) – IV (C) – I (G) – V7 (D7)

The Roman numerals in parentheses represent the chords to play in each measure, and the chord names outside the parentheses indicate the actual chords to play in the key of G major.

A solar panel installation company wants to expand into a new state and they want to learn what home owners understand about solar panels. They post a series of questions on their social media platforms to gather information and ideas about how to expand in this new area. The posts go viral and they collect thousands of responses, questions, and criticisms. What is this behavior called?

Answers

Answer:

This behavior is called Crowdsourcing.

Yelena has created timings within her slide show, and she wants to verify that each slide has the correct timing. In which view in PowerPoint can she do this? a. Normal view b. Outline view c. Slide Master view d. Slide Sorter view

Answers

Yelena has created timings within her slide show, and she wants to verify that each slide has the correct timing in the Slide Sorter view in PowerPoint.

The correct answer to the given question is option d.

Viewing the Slide Show in Power Point.The default view of the presentation is in Normal view. In this view, we can add content and make modifications to the slides. However, we can also view the slides in various other ways. Let's have a look at each view:

Normal view: This view is the default view and is the view in which we can add and modify the slide content. We can also add and modify slide animations and transitions here.

Outline view: In this view, we can view the text content of the presentation in outline form, which makes it easy to organize the presentation.

Slide Sorter view: This view allows us to view all the slides in the presentation simultaneously, which makes it easy to rearrange the slides or change their timings.Notes Page view: In this view, we can view the speaker notes associated with each slide.

Slide Master view: In this view, we can create and modify slide layouts and templates.The Slide Sorter view allows us to see all the slides in the presentation at once, so it is the best view to use to verify the timings for each slide. We can use the controls at the bottom of the Slide Sorter view to modify the timing of each slide.

For more such questions on PowerPoint, click on:

https://brainly.com/question/28220859

#SPJ8

Python help!
Input a grade level (Freshman, Sophomore, Junior, or Senior) and print the corresponding grade number [9-12]. If it is not one of those grade levels, print Not in High School.
Hint: Since this lesson uses else-if statements, remember to use at least one else-if statement in your answer to receive full credit
Sample Run 1
What year of high school are you in? Freshman
Sample Output 1
You are in grade: 9
Sample Run 2
What year of high school are you in?
Kindergarten
Sample Output 2
Not in High School

Answers

Answer:

print("What year of high school are you in?")

grade = input()

grade = grade.lower()

if grade == "freshman":

   print("You are in grade: 9")

elif grade == "sophomore":

   print("You are in grade: 10")

elif grade == "junior":

   print("You are in grade: 11")

elif grade == "senior":

   print("You are in grade: 12")

else:

   print("Not in high school")

Explanation:

The first line prints the question. "grade = input()" stores the answer the user will type in the terminal into the variable 'grade'.

grade.lower():

The third line lowercases the entire string ("FreshMan" would turn to "freshman"). Python is case-sensitive.

Then, test the string to see if it matches freshman, sophomore, junior, or senior. If the input string matches print the statement inside the if block. The last statement is the else. It prints if nothing else matches.

according to this frontline piece, what are the three ways di information is created?

Answers

Professional content: This is content created by professionals, such as journalists, writers, and editors, in the form of articles, reports, and other media.

What is media?

Media is the collective term for various means of communication such as newspapers, magazines, radio, television, and the internet. It is the medium through which news, entertainment, education, data, or promotional messages are disseminated. Media can be used to refer to the organizations that control these channels of communication, or it can refer to the content that is created and shared through these channels. It is a powerful tool for influencing public opinion, shaping public discourse, and promoting or opposing particular ideologies or agendas. It has become a major platform for political and social movements, and has enabled the rise of movements such as #MeToo, Black Lives Matter, and Occupy Wall Street. Media can be used to create awareness around important issues, to inform public opinion, to bring attention to injustice, and to provide an opportunity for the public to engage in meaningful conversations.

To learn more about media

https://brainly.com/question/24814095

#SPJ4

Design and implement an algorithm that gets as input a list of k integer values N1, N2,..., Nk as well as a special value SUM. Your algorithm must locate a pair of values in the list N that sum to the value SUM. For example, if your list of values is 3, 8, 13, 2, 17, 18, 10, and the value of SUM is 20, then your algorithm would output either of the two values (2, 18) or (3, 17). If your algorithm cannot find any pair of values that sum to the value SUM, then it should print the message ‘Sorry, there is no such pair of values’. Schneider, G.Michael. Invitation to Computer Science (p. 88). Course Technology. Kindle Edition.

Answers

Answer:

Follows are the code to this question:

def FindPair(Values,SUM):#defining a method FindPair  

   found=False;#defining a boolean variable found

   for i in Values:#defining loop for check Value  

       for j in Values:#defining loop for check Value

           if (i+j ==SUM):#defining if block that check i+j=sum

               found=True;#assign value True in boolean variable

               x=i;#defining a variable x that holds i value

               y=j;#defining a variable x that holds j value

               break;#use break keyword

       if(found==True):#defining if block that checks found equal to True

           print("(",x,",",y,")");#print value

       else:#defining else block

           print("Sorry there is no such pair of values.");#print message

Values=[3,8,13,2,17,18,10];#defining a list and assign Values

SUM=20;#defining SUM variable

FindPair(Values,SUM);#calling a method FindPair

Output:

please find the attachment:

Explanation:

In the above python code a method, "FindPair" is defined, which accepts a "list and SUM" variable in its parameter, inside the method "found" a boolean variable is defined, that holds a value "false".

Inside the method, two for loop is defined, that holds list element value, and in if block, it checks its added value is equal to the SUM. If the condition is true, it changes the boolean variable value and defines the "x,y" variable, that holds its value. In the next if the block, it checks the boolean variable value, if the condition is true, it will print the "x,y" value, otherwise, it will print a message.  
Design and implement an algorithm that gets as input a list of k integer values N1, N2,..., Nk as well

What best describes proprietary file format?
A format that is closed but free of cost.
A format that is considered a trade secret.
A format that is not bound by copyright law.
A format that is open and free of cost.

Answers

Answer:

A

Explanation:

I took its on my quiz and i certainly go it correct!

A format that is closed but free of cost is the  best describes proprietary file format. Thus, option (a) is correct.

What is the cost?

The term cost refers to the actual money are spent on the manufacturing of the product. The product are manufacture to spend on money are raw material, transportation, wages, salary, and other expenses add. The all expenses are added to identify the cost.

Each business was responsible for managing the data on file. A proprietary file format is one that a firm, person, or organization develops in order to keep itself or its operations hidden. It allows for the decoding and interpretation of stored data to be documented. A business kept track of the files and prepared for free of cost.

As a result, the format that is closed but free of cost is the  best describes proprietary file format. Therefore, option (a) is correct.

Learn more about cost, here:

https://brainly.com/question/15135554

#SPJ2

There is never a good reason to use null values in a database.
True or False

Answers

The given statement "There is never a good reason to use null values in a database" is FALSE because Null values can be necessary in certain situations where a value is unknown or not applicable.

For example, if a customer has not yet provided their phone number, the phone number field may contain a null value until the information is obtained.

However, it is important to use null values sparingly and appropriately, as overuse can lead to data inconsistencies and make queries more complex.

It is best practice to establish default values or use constraints to ensure that null values are only used when necessary. Ultimately, the decision to use null values should be based on the specific requirements and use case of the database.

Learn more about Null value at https://brainly.com/question/31814560

#SPJ11

The Purpose Of This Assignment Is To Take The Email Below And Re-Write It To Be Courteous, Conversational, And Professional. Instructions Read The Scenario Below Rewrite The Below Email, In No More Than 250 Words Use Headers, Bullet Points And Formatting To Help Convey Your Message You Are Expected To Change Sentences, Word Choice, Structure,That
Purpose - The purpose of this assignment is to take the email below and re-write it to be courteous, conversational, and professional.
Instructions
Read the scenario below
Rewrite the below email, in no more than 250 words
Use headers, bullet points and formatting to help convey your message
You are expected to change sentences, word choice, structure,that supports a professional and appropriate email
Scenario–You (Jane Smith) are a member of the IT Support teamat a mid-size consulting firm. You have been asked to send an email from your office to all company employees. Below is your first draft an email you want to send to all employees. Upon re-reading your draft, you want to re-write it using a more professional and appropriate tone.
Rewrite and edit the text below the line and submit your emailas a Word.doc the assignment 1 dropbox. Please include a cover page.
From: Susan Janzen
To: All Staff
Cc: IT Support

Answers

From: Susan Janzen ,To: All Staff, Cc: IT Support, Subject: Complaints!!!!

I discovered that many individuals were dissatisfied with how inefficient and difficult to utilize the new sharepoint was. Further investigation revealed that there is truly no problem, despite the fact that relatively few people had complained about the intranet's disorganization.  Further investigation revealed that people who work remotely and mostly use their phones to access the intranet are the ones who are complaining.

Regards,

An intranet is a computer network used only within a company to share information, facilitate communication, support collaboration, provide operational systems, and provide other computing services.

Although the word is used in opposition to open networks like the Internet, it is nevertheless built on the same technology.

Learn more about intranet , from :

brainly.com/question/13139335

#SPJ4

How does Python recognize a tuple?

Answers

Answer:

Tuples can be recognized like this,

tuple = 'hello', 'world'

or tuples can be recognized like this

tuple = ('hello', 'world')

you can see the value of a tuple by simply printing it out like so,

print(tuple)

Answer:

Tuples can be recognized like this,

tuple = 'hello', 'world'

or tuples can be recognized like this

tuple = ('hello', 'world')

you can see the value of a tuple by simply printing it out like so,

print(tuple)

Explanation:

Hardware refers to the _________________ of a computer

Answers

Answer:

physical component

Explanation:

Well, softwares are the applications and anything installed inside the computer but hardware isn't installed, it's just been connected by wires

At a high school, students can choose between three art electives, four history electives, and five computer electives. Each student can choose two electives.

Answers

In a Venn diagram, sets are represented by circles encircling the universal set, which is a rectangle.

Describe a computer.

An electronic device used to alter data or information is a computer.Data can be stored, retrieved, and processed by it.You may already be aware of the fact that you can have used a computer to surf the Internet, send emails, type documents, and play games.

An introduction to computers is what?

An computer is a piece of technology that transforms raw data and outputs information. a piece of technology that takes data as input and then modifies it in accordance with a set of specific instructions known as programs to produce the intended outcome (referred to as Information).

To know more about computer visit:
https://brainly.com/question/15707178

#SPJ4

Data is read from physical hard drives in concentric circles known as which of the following?
a. blocks
b. tracks
c. sectors
d. cylinders

Answers

Data is read from physical hard drives in concentric circles known as tracks. These tracks are further divided into smaller units called sectors.

The process of reading data from the physical hard drive involves the movement of the read/write head over these tracks to access the data stored on them. The tracks are arranged in a spiral pattern on the surface of the hard drive, with the outermost track being the largest and the innermost track being the smallest. The tracks are read in a specific order, starting from the outermost track and moving towards the innermost track. This process is known as sector addressing and is used to access specific blocks of data on the hard drive.

learn more about  physical hard drives  here:

https://brainly.com/question/28444960

#SPJ11

What does a good résumé help you do?
A. hide your contact details
B. emphasize your best skills and accomplishments
C. highlight only your most recent projects
D. highlight only your academic qualifications

Answers

Answer:

b, emphasize your best skills and accomplishments

Explanation:

think of an acting resume!!

clicking either the date & time button or the ____ button opens the header & footer dialog box.

Answers

clicking either the date & time button or the slide button opens the header & footer dialog box.

What is a dialog box?

An informational and response-prompting graphical control element called a dialog box presents information to the user. Depending on whether they prevent communication with the software that opened the dialog, dialog boxes are categorized as "modal" or "modeless."

A dialog box is a transient window that a program creates to collect user input. Dialog boxes are frequently used in applications to ask users for more details about menu items.

To learn more about a dialog box, use the link given
https://brainly.com/question/23119185
#SPJ1

Which SmartArt feature would you use to illustrate bulleted points?

A. Circle
B. List
C. Process
D. Pyramid

Answers

Answer:

List

Example:

* Milk

* Cheese

* Bread

That is bulleted points

write around 600 words discussing the role of IT in Jumia operational applications

Answers

Jumia is an e-commerce platform that operates in various African countries, and it relies heavily on technology to run its operations. Information technology (IT) plays a critical role in enabling Jumia to process transactions, manage inventory, track deliveries, and provide customer support. In this essay, we will discuss the role of IT in Jumia's operational applications and how it helps the company to achieve its business objectives.

Jumia uses a range of IT systems and tools to support its operations, including its website, mobile application, customer relationship management (CRM) software, order management system (OMS), warehouse management system (WMS), and logistics management system (LMS). These systems work together seamlessly to provide a comprehensive end-to-end solution for Jumia's e-commerce operations.

One of the key roles of IT in Jumia's operational applications is to provide a platform for customers to browse and purchase products online. The Jumia website and mobile application are designed to be user-friendly and easy to navigate, with a search function that allows customers to find products quickly and easily. The website and mobile application also allow customers to view product details, check prices, and make payments securely using a range of payment options.

Another critical role of IT in Jumia's operational applications is to support order management and fulfilment. The order management system (OMS) allows Jumia to manage customer orders, allocate inventory, and track order fulfilment. The OMS also integrates with Jumia's warehouse management system (WMS), which helps Jumia to manage inventory levels, track product movement, and fulfil orders efficiently.

IT also plays a role in Jumia's customer support operations. Jumia uses a CRM system to manage customer interactions and provide support to customers. The CRM system allows Jumia to track customer orders, manage customer inquiries, and provide post-sale support. The CRM system also integrates with Jumia's website and mobile application, allowing customers to access support directly from these channels.

To know more about various  visit:

https://brainly.com/question/32260462

#SPJ11

A way for developers to avoid bias in their computational artifacts is to
O identify solutions to bias in software
increase universal access to bias
refine their computational artifacts
use the various forms of bias and inequity
test their software for inequity and bias.
. Select 3 options.

Answers

A way for developers to avoid bias in their computational artifacts is to

identify solutions to bias in software increase universal access to biasrefine their computational artifacts use the various forms of bias and inequitytest their software for inequity and bias.

What is a computational artifact?

A software artifact is anything created throughout the development process.

A data model, a prototype, a workflow diagram, a design document, or a setup script are all examples of this. In fact, particular artifacts are required during the development cycle, and they must be preserved in an accessible location.

Learn more about computational artifact at:

https://brainly.com/question/31276613

#SPJ1

11.1.2 Ball and Paddle Code HS JavaScript



Overview

Add the ball and paddle. The ball should bounce around the screen. The paddle should move with the mouse.


Add Ball and Paddle

The first step is to add the ball to the center of the screen, and the paddle to the bottom of the screen. The dimensions of the paddle and its offset from the bottom of the screen are already constants in the starter code.


The next step is to get the paddle to move when you move the mouse. The paddle should be centered under the mouse, and should not go offscreen.


Move Paddle, Bounce Ball

The next step is to get the ball to bounce around the screen. We may have done this exact problem before…

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that Add the ball and paddle. The ball should bounce around the screen. The paddle should move with the mouse.

Writting the code:

function setupBall(){

ball = new Circle(BALL_RADIUS);

ball.setPosition(getWidth()/2, getHeight()/2);

add(ball);

}

function setupPaddle(){

paddle = new Rectangle(PADDLE_WIDTH, PADDLE_HEIGHT);

paddle.setPosition(getWidth()/2 - paddle.getWidth()/2,

 getHeight() - paddle.getHeight() - PADDLE_OFFSET);

add(paddle);

}

function getColorForRow(rowNum){

rowNum = rowNum % 8;

if(rowNum <= 1){

 return Color.red;

}else if(rowNum > 1 && rowNum <= 3){

 return Color.orange;

}else if(rowNum > 3 && rowNum <= 5){

 return Color.green;

}else{

 return Color.blue;

}

}

function drawBrick(x, y, color){

var brick = new Rectangle(BRICK_WIDTH, BRICK_HEIGHT);

brick.setPosition(x, y);

brick.setColor(color);

add(brick);

}

function drawRow(rowNum, yPos){

var xPos = BRICK_SPACING;

for(var i = 0; i < NUM_BRICKS_PER_ROW; i++){

 drawBrick(xPos, yPos, getColorForRow(rowNum));

 xPos += BRICK_WIDTH + BRICK_SPACING;

}

}

function drawBricks(){

var yPos = BRICK_TOP_OFFSET;

for(var i = 0; i < NUM_ROWS; i++){

 drawRow(i, yPos);

 yPos += BRICK_HEIGHT + BRICK_SPACING;

}

}

function setSpeeds(){

vx = Randomizer.nextInt(2, 7);

if(Randomizer.nextBoolean())

 vx = -vx;

}

function setup(){

drawBricks();

setupPaddle();

setupBall();

setSpeeds();

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

11.1.2 Ball and Paddle Code HS JavaScriptOverviewAdd the ball and paddle. The ball should bounce around

Josh is searching for information online about the conservation status of blue jays. He enters the phrase blue jays and most of the results are about the baseball team. What can he do to get the specific results he wants?

Answers

Answer: specify the bluejay bird

Explanation:

by specifically mentioning it is birds he wants that Is the results he will get

If Josh wants to get the specific information in the context of the  conservation status of blue jays, then  in that case can add birds in the search bar along with the name of  blue jays.

What are blue jays?

Eastern North America is home to the beautiful  blue jay, a bird of prey that belongs to  the Corvidae family. It inhabits the majority of eastern and central America; some eastern populations might be migratory.

Breeding populations can be found all over southern Canada; resident populations can also be found in Newfoundland, Canada. Blue Jays are renowned for their brilliance, intricate social structures, and strong familial ties.

It is believed that their love of acorns contributed to the proliferation of oak trees following the last glacial period.

Learn more about blue jays from here:

https://brainly.com/question/3034695

#SPJ2

Other Questions
if you can help it would be much appreciated Justin makes a necklace for his sister. Twelve beads take up 4 inches ofstring. How many beads fit on 1 foot of string? Explain your answer.1 point Which of the following things would you need if you wanted to write a letter?el papelel mapael aulala prueba . a solar photovoltaic cell is designed to operate at maximum efficiency under a load of 0.4 a and 0.52 v under 750 w/m2 of irradiation at 45 degc. if the cells reverse saturation current density is 5.8x10-9 5a/m2 and the cell surface area is 0.01 m2 , what is the cells open circuit voltage (in volts) and short circuit current (in amps)? 40 points! Pre calc questions, thanks for your help :) Calling card A charges a connect fee of 69 plus 1.9 perminute. Calling card B has no connect fee but charges 6 perminute.Which system of equations can be used to determine the number of minutes (x) where the price (y) is the same for both cards? Find the equation of the lineThat is perpendicular to y=-2x+1 and contains the point (8,2) 8. An object of mass 4 kg moving with a speedof 29 m/s to the right collides with an objectof mass 11.5 kg moving with a speed of 18 m/sto the left. After collision, the 11.5 kg object movesto the right with a speed of 4 m/s to the right. Calculatethe velocity of the 4 kg object after collision. (1 point)A. O-53.475 m/sB. O-13.341 m/sC. O-34.25 m/sD. -19.579 m/sE. O-27.7 m/s9. An object of mass 2 kg moving with a speed Phil spends no more than 12 hours per week knitting. It takes him 2 hours to knit a hat and3 hours to knit a scarf. He uses 150 yards of yarn for each hat and 400 yards of yarn for eachscarf. Which combinations of complete hats and scarves can Phil knit if he has 900 yards of yarn?Select all of the correct answers.A. 1 hat, 1 scarfB. 3 hats, 2 scarvesC. 6 hats, 0 scarvesD. 4 hats, 1 scarfE. 0 hats, 4 scarvesF. 2 hats, 1 scarf Read the question carefully and select the best answer.LenovoWhich inference about the writer's attitude toward human exploration is best supported by the essay?A. He thinks it is admirableB. He thinks it is harmful.C. He thinks it is unnecessary.D. He thinks it is ridiculous. The sum of two numbers is 48. If the second number is 6 less than the first, whatis the value of EACH of the numbers? The personal level of ethical challenges include situations we face in our personal livesa. at work.b. and in our families.c. outside of the work context.d. and spiritual lives How do you graph (4,5) and (2,2) to find the distance between the pionts. Suppose 20% of ohio residents support the legalization of marijuana. If you randomly select n people and would like to use the normal approximation to answer questions, what does your sample size have to be, at minimum?. Why are the activities listed in the outline below important? Civic Responsibilities A. Be informed and vote B. Volunteer in the community C. Participate in the local government D. Listen to and respect different opinions E. Respect the rights and property of others A. They guarantee the prosperity and well-being of all citizens B. The allow the wealthiest citizens to control the government C. They discourage responsible decision making by elected leaders D. They promote a healthier and more democratic society what is barter trade? Which of the following values does not satisfy the equation x-2=3.5A 5 1/2B 5.5C 1.5 PLEASE HELP ! make sure to give full steps :) BONUS (optional for extra credit) Calculate the amount of energy, in kilojoules, produced from the reaction of 1.35 moles of methane with 3.41 moles of oxygen (Hint: this is a limiting reagent problem} Change the word phrase to an algebraic expression. The difference between twice a number and two The objective of the federal judicial branch of government is, in part, to interpret whether laws are ______.