In which mode the user is able to update the MMC Console? a) Editor Mode. b) Author Mode. c) No Need to consider a Mode. d) User Mode.

Answers

Answer 1

The user is able to update the MMC (Microsoft Management Console) Console in the Author Mode.

The MMC Console is a framework provided by Microsoft for creating and managing administrative tools on Windows operating systems. It allows users to create custom consoles by adding various snap-ins and configuring them to perform specific administrative tasks.

The Author Mode is the mode in which the user can make updates and modifications to the MMC Console. It provides the necessary tools and options for creating, editing, and managing the console. In this mode, users can add or remove snap-ins, customize the console's appearance, define the layout, and configure various settings.

Therefore, the Author Mode  is the correct answer as it enables users to update and customize the MMC Console by adding, removing, and configuring snap-ins, as well as defining the console's overall layout and appearance.

LEARN MORE ABOUT  MMC here: brainly.com/question/30749315

#SPJ11


Related Questions

in older windows versions, the filename was restricted to _______________ characters.

Answers

In older Windows versions, the filename was restricted to a maximum of 8 characters for the filename and a maximum of 3 characters for the file extension.

This naming convention is known as the 8.3 filename format. For example, a file named "example.txt" would be truncated to "exampl~1.txt" in the 8.3 filename format. However, modern Windows operating systems support longer filenames up to 255 characters in length.

To learn more about Windows click the link below:

brainly.com/question/12097493

#SPJ11

you are considering using wi-fi triangulation to track the location of wireless devices within your organization. however, you have read on the internet that this type of tracking can produce inaccurate results. what is the most important consideration for gett

Answers

Create a guest access WLAN that separates guest WLAN traffic from other clients on the same access point and uses open authentication.

The most frequent cause of failure is a lack of user knowledge of the policy's contents. Even the finest security policy can provide a false sense of security that puts crucial assets at risk if user education and enforcement are lacking. One of the most crucial best practices for wireless network security is using a strong password. A strong password consists of a minimum of eight characters, a mix of capital and lower-case letters, numbers, and symbols. To keep passwords secure, they should be changed frequently.

Learn more about security here-

https://brainly.com/question/5042768

#SPJ4

All employees at the company (approximately 80 in total) are given access to the network even though they may not require it to fulfil their functions. For example, warehouse personnel (packers, pickers etc) can get onto the network via three terminals in the warehouse's administration office. These staff only have access to internet facilities and a selection of computer games resident on the network for all employees to enjoy. To get onto the network an employee can enter his user identification and personnel password at any terminal. At this point a menu will appear which lists all of the applications available on the network e.g wages, inventory control, games etc, and the employees simply "clicks" on the application he requires. Once access has been gained to the selected application e.g the wages application, a menu of modules within the application is displayed. If an employee wishes to access a module, he "clicks" on the desired module and the computer checks the user profile that employee before granting (or denying) access. Dion Reddy has implemented the following requirements for personal passwords. They must - be six digits of which the first three digits must be the first three letters of the department in which the employee works and the last three must be numeric e.g WAG123 would be an employee in the wages department; - be changed on the 2
nd
January each year; and - be authorized by Dion Reddy (or one of his staff) to ensure that the same password is not chosen by more that one employee in the same department. If an employee leaves the company his password is given to the new employee (it will only be
January) Dion Reddy is also responsible for creating and maintaining user profile on the system. If any employee wishes to change any details on his profile, e.g "read only" access to a "read and write" access, a written request (on the standard document) signed by the employee must be submitted to Dion Reddy who will make the change. At the end of every second month Dion Reddy's four assistants back up the data files and programmes on all terminals in the accounting department by coping the files onto external hard drives. The external hard drives are labelled and given to Dion Reddy who locks them in a drawer in his desk. YOU ARE REQUIRED TO: a) distinguish between general controls and application controls. b) Identify the weaknesses in the general controls at Rexxon (Pyt) Ltd based on the information provided above. For each weakness you have identified explain why it is a weakness. You are only required to consider the following categories of general control: 1. Control environment 2. Access controls (10) 3. Continuity of operations (9)

Answers

The scenario describes the network access and controls at Rexxon (Pyt) Ltd. The company provides all employees with network access, even if it is not required for their job functions. Employees can log in with their user identification and personnel password, granting them access to various applications. Dion Reddy is responsible for password requirements and user profile maintenance. Weaknesses in general controls at Rexxon (Pyt) Ltd include inadequate access controls, lack of password complexity, and a manual process for user profile changes.

a) General controls are overarching controls that apply to an organization's entire IT environment, while application controls are specific to individual applications or systems. In this scenario, general controls include control environment, access controls, and continuity of operations. Application controls refer to the controls implemented within specific applications.

b) Weaknesses in general controls at Rexxon (Pyt) Ltd based on the provided information are as follows:

1. Access Controls: All employees having network access, regardless of their job requirements, poses a risk of unauthorized access to sensitive information. This lack of segregation of duties and least privilege principle increases the potential for misuse or data breaches.

2. Control Environment: The process of authorizing and changing passwords solely by Dion Reddy or his staff may result in delays and potential security risks. It creates a single point of failure and limits accountability and responsibility for password management.

3. Continuity of Operations: The backup process being performed manually every second month using external hard drives introduces a risk of data loss or inconsistency if a failure or incident occurs between backups.

To know more about Access Controls here: brainly.com/question/32804637

#SPJ11


1. The structural framework for greenhouses is typically made of
A. metal or plastic tubing.
B. wooden slats
C. glass beams
D. All of the above

Answers

The answer is D it takes all those to make a green house

1.Choose the best answer.:
 a) Broadly, computers are of ................ purpose and ................ purpose
     (i) specific, general     (ii) specific, broad    (iii) precise, broad     (iv) None of them
 b) .................. computers works on continuous signals
 (i) Analog     (ii) Digital    (iii) PS/2        (iv) None of them
 c) ................ computers are the largest and most expensive digital computers.
 (i) Mainframe        (ii) Mini    (iii) Super        (iv) Apple 
d) .................. is the example of mainframe computer.
 (i) CYBER 205    (ii) IBM 3081        (iii) VAX        (iv) IBM 9375
 e) Macintosh is the OS used in .................. computer.
 (i) IBM        (ii) mainframe        (iii) super    (iv) apple
 f) .............. was mainframe computer brought first time to process census data in Nepal.
 i) IBM 1400        ii) IBM1401        iii) IBM1402 
g) ……… computer are used in hospital for Ultra Sound.
 i) Analog    ii) Digital        iii)Laptop    iv) Hybrid 
h) Nowadays, most powerful super commuter is Sunway taihulight from .......................
 i) India    ii) Germany         iii) China    iv) Nepal

Answers

Answer:

specific, generaldigitalminiCYBER 205IBMIBM1401digitalGermany

Which communication device uses wireless data transmission? Select 4 options.

Answers

Answer:

Satellite Internet providers, Smart Speakers, Smartphones and Bluetooth headphones are all wireless data transmissions.

Explanation:

The transmission device that uses wireless data transmission are the smartphones, Bluetooth headphones, satellite internet providers and the smart speakers.

What is wireless data transmission?

Wireless data transmission is the transfer of digital or analogue signals using radio spectrum through the atmosphere. It doesn't involve wire or cables.

The examples of devices that makes use of wireless data transmission include the following:

Smartphones,

Bluetooth headphones,

satellite internet providers and

smart speakers.

A typical example of a device that makes use of cable is the Ethernet. An Ethernet connection transmits data over cable.

Learn more about data transmission here:

https://brainly.com/question/24373056

#SPJ2

Write a shell script called pil-lastname sh, where you replace lastname with your last name. The script runs a loop where it reads from the terminal a user name, e.g. root or your own user name, and then it displays to the terminal the total number of processes running on the system belonging to that user. It then asks again for a user name and repeats the loop. The program ends when the user types the empty string. Here is a sample execution of this script:

Answers

The script will keep running until the user enters an empty string. This allows the user to check the number of processes for different usernames. The output will show the total number of processes running for each user entered.

To create a shell script called pil-lastname.sh, replace "lastname" with your last name. This script will run a loop where it prompts the user to enter a username, such as "root" or their own username. It will then display the total number of processes running on the system that belong to that user. After that, it will ask for another username and repeat the loop. The program will end when the user types in an empty string.
Here's an example of how the script would run:
Enter username: root
Total number of processes running for user root: 32
Enter username: john
Total number of processes running for user john: 10
Enter username: (empty string)
Program ended.
The script will keep running until the user enters an empty string. This allows the user to check the number of processes for different usernames. The output will show the total number of processes running for each user entered.
Remember to replace "lastname" with your actual last name in the script file name.

To know more about shell script visit:

https://brainly.com/question/9978993

#SPJ11

The word add is used to add another item to a list.
True
False
A list is a data structure used to organize data.
True
False
Which tag would you use to end a section of bolded text?




The body tag is used to indicate the actual content of a webpage.
True
False
Planning can help reduce logic errors in programs.
True
False
When creating a list in Python, you should enclose each item in the list in parentheses.
True
False
Which tag should be placed after a link to another webpage?




Which tag provides information about the document as well as links to other scripts?




The World Wide Web and the internet are two different terms that refer to the same thing.
True
False
Every HTML document needs to begin with which of the following tags?




Fatima is creating a program. She wants to ask the user a question and then have a 30-second pause before the user is allowed to input an answer. Which line of code should Fatima use?
time.wait(30)
sleep.time(30)
time.pause(30)
time.sleep(30)
The internet existed before the World Wide Web.
True
False
If you are using an incrementing variable to iterate over a list, the variable should be set to zero before the loop begins.
True
False
Which of the following shows the correct way to make an image display at 50% of its original size?
img (height:50%;width:50%;)
img [height:50%;width:50%;]
img {height:50%width:50%}
img {height:50%;width:50%;}
Mark

What is the type of data in the list [103, 405, 527, 396, 503]?
Booleans
strings
integers
alphanumeric

Which of the following is an example of a membership operator?
%
IN
IF
=

Which of the following statements allows you to check on whether a certain item is in a list?
within
query
IN
included
What would be the result of running these three lines of code?

lunch = [“pizza”, “salad”, “sandwich”, “soup”, “tacos”]

# print(lunch[0])

print(lunch[1])

soup or salad
salad
pizza
pizza salad
A program should end if the number of the player’s lives is equal to zero. Which of the following lines of code would do that?

if lives = 0:
exit()
if lives == 0:
exit()
if lives < 0:
exit()
if lives == 0:
end()
Lei is creating a webpage that includes this line of code: The Universe of Skateboarding . Lei runs it and realizes that the entire page (not just the header) is in very large letters. How can Lei change this?
Remove the second .
Change the first to .
Change the second to .
Add a / to the final tag.

The word add is used to add another item to a list.TrueFalseA list is a data structure used to organize
The word add is used to add another item to a list.TrueFalseA list is a data structure used to organize
The word add is used to add another item to a list.TrueFalseA list is a data structure used to organize
The word add is used to add another item to a list.TrueFalseA list is a data structure used to organize
The word add is used to add another item to a list.TrueFalseA list is a data structure used to organize

Answers

Answer:

WORD PROBLEMS

1. False

2. True

3. </b> or </strong>

4. True

5. True

6. False (unless the items are strings)

7. </a>

8. <head></head>

9. False (World Wide Web are the websites which communicate via the Internet. The Internet is a network that allows websites to communicate with each other)

10. <html>

11. time.sleep(30)

12. True

13. True

14. img {height:50%;width:50%;}

15. Integers

16. IN

17. IN

18. salad

19. if lives == 0:

     exit()

20. maybe you can post a picture of it? I'm not quite understanding.

PICTURE PROBLEMS

1. + 1

2. gold -= 100

3. skill = skill - 2

4. time.sleep(60)

5. treasures.remove("silver")

Explanation:

Hope this helps

When creating a flowchart or pseudocode representation of a task, what type of structure is one in which one step follows another unconditionally

Answers

The type of structure in which one step follows another unconditionally is called a "sequence structure".

What is a Sequence Structure?

A sequence structure is a basic programming construct used to represent a series of steps that must be executed in a specific order, one after the other.

Each step in the sequence is executed unconditionally, meaning that it will always be executed, regardless of any other conditions or inputs.

Hence, it can be seen that in a sequence structure, the steps are executed in the order in which they are presented, without any conditions or branching.

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

You’re mapping out the logical relations of a database, and you notice that one of your tables will have a pair of child records for every record created in the parent entity. What type of relationship do these tables have?

A. One-to-many
B. Pair of one-to-many relationships
C. Many-to-Manu
D. One-to-one

Answers

The answer to your question is answer A

The type of relationship that these tables have is (B), Pair of one-to-many relationships.

What is one-to-many relationships?

A one-to-many relationship is a type of relationship between two tables in a database where one record in the parent table can have multiple child records in the child table. In this case, one record in the parent table will have a pair of child records in the child table, so the relationship between the two tables is a pair of one-to-many relationships.

For example, a table of employees could have a one-to-many relationship with a table of dependents. Each employee could have multiple dependents, so each record in the employees table would have a pair of child records in the dependents table.

Find out more on database here: https://brainly.com/question/31089407

#SPJ2

Did the first generation of computers use microprocessors.

Answers

no they used standard 8088 Intel processors

hope this helps

Some of the earliest computers use a microprocessor include the Altair 8800, IBM 5100, and Micral. Today's computers still use a microprocessor, despite the fourth generation being considered to have ended in 2010.

Hope this helps!! :)

What theorems do we need to know for ap calculus ab.

Answers

Answer: Intermediate Value Theorem.

Extreme Value Theorem.

Mean Value Theorem for Derivatives.

Rolle's Theorem.

Fundamental Theorem of Calculus (two parts)

Mean Value Theorem for Integrals.

Explanation:

How can you find the square root of 8 using the pow() function

Answers

import math

print(math.pow(8, 0.5))

You can find the square root of any number by squaring it by 0.5

Opportunity and Spirit, NASA's Mars Exploration Rovers, were the first scientific instruments able to collect samples directly from the surface of Mars. One of the mission's goals was to determine the likelihood that life ever existed on Mars. How were Spirit and Opportunity best able to supply evidence that in the distant past Mars may have had an environment favorable to life?

Answers

Answer:

The rovers sent images of cross beds, centimeter-scale areas in rock layers, that could indicate whether water once flowed on Mars.

Explanation:

case study returns released for blockworks legacy practice mode can also be completed in blockworks online practice mode. true. false.

Answers

The statement "case study returns released for blockwork legacy practice mode can also be completed in blockwork online practice mode" is true.

What is a case study?

A case study is an in-depth examination of a particular subject, such as a person, group, location, occasion, business, or phenomenon. In social, educational, clinical, and business research, case studies are frequently used.

A case study is a type of research methodology that produces a thorough, multifaceted understanding of a complex problem in its actual setting. It is a well-known research strategy that is widely applied in a range of fields, especially the social sciences.

Therefore, the statement is true.

To learn more about the case study, refer to the link:

https://brainly.com/question/24259426

#SPJ1

Marisol wants a data structure that is as flexible and controllable as possible. Which of these would be most appropriate?

A. primitive
B. Built-in
C. User-defined
D. String

Answers

Answer:

B. Built-in

Explanation:

You can modify built-in data structures like adding elements to an array and removing elements.

However, creating a data structure is more time-consuming such as manually sorting a list instead of using the built-in sort function.

i cracked a school computer screen on purpose and one on accident what will happen now?

Answers

Answer:

You will probably have to pay a fee of replacement, or pay for the whole computer.

Explanation:

Custom-built mini-programs that can execute a complicated series of commands in a tool like microsoft word or excel are called.

Answers

Custom-built mini-programs that can execute a complicated series of commands in a tool like Microsoft word or excel are called macros.

What is a macro program?

Macros are known to be a type of programs that functions by automating some commonly used processes or tasks that are found in the Excel.

Note that Custom-built mini-programs that can execute a complicated series of commands in a tool like Microsoft word or excel are called macros as a often  records day to day operations through the use of keystrokes or a mouse.

Learn more about  mini-programs from

https://brainly.com/question/24833629

#SPJ1

4.) Which of the following is a valid SQL statement?
----SELECT GETDATE();
----SELECT UPPER(Hello);
----SELECT CONVERT(VARCHAR(10), GETDATE(), ('Month DD, YYYY');
----ALL OF THE ABOVE

Answers

The option that is a valid SQL statement is "ALL OF THE ABOVE" (Option D)

What is SQL Statement?

Structured Query Language (SQL) is a computer language developed for managing data in a relational database management system or stream processing in a relational data stream management system.

SQL statements have typically been classified into the following logical groups: Statements defining data. These DDL statements can be used to declare, rename, change, or remove objects in the local database.

Learn more about SQL statement at:

https://brainly.com/question/30175580

#SPJ4

Are hackathons evil?

Answers

Answer:No hackathons are not evil because during hackathons they are not actually hacking people they are learning to program.Also hacking also isn't just used for bad things i can also be used for good things;therefore hackathons are not evil

No hackathons are not evil they are simply learning to program

When is the possibility of solar weather affecting terrestrial weather the highest?(1 point)

during solar minimum
during solar minimum

during the solar cycle
during the solar cycle

during solar maximum
during solar maximum

during Total Solar Irradiance
during Total Solar Irradiance

Answers

The possibility of solar weather affecting terrestrial weather the highest is option c: during solar maximum.

Does solar weather have an effect on terrestrial weather?

There are different forms of weather on Earth, this is one that ranges from the surface of the planet out unto the outer space.

Note that Space weather as well as terrestrial weather are known to be influenced by the little  alterations that the Sun undergoes during its solar cycle.

Hence, The possibility of solar weather affecting terrestrial weather the highest is option c: during solar maximum.

Learn more about solar weather from

https://brainly.com/question/15279276

#SPJ1

print 3 numbers before asking a user to input an integer

print 3 numbers before asking a user to input an integer

Answers

Answer:

you can use an array to do this

Explanation:

(I've written this in java - I think it should work out):

Scanner input = new Scanner(System.in);

System.out.println("Enter an integer: ");

int userInt = input.nextInt();

int[] array = new int[userInt - 1];

for(int i = userInt-1; i < userInt; i--)

     System.out.println(array[i]);

Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False

Answers

Answer:

I may be wrong but im pretty sure its true

Explanation:

True <3

Help debugging line 7 type error more arguments (5) than expected (1)

Help debugging line 7 type error more arguments (5) than expected (1)

Answers

Answer:

import random

score = 0

for i in range(5):

   num1 = random.randint(1, 100)

   num2 = random.randint(1, 100)

   prompt = "What is " + str(num1) + "+" + str(num2) + "?"

   answer = int(input(prompt))

   result = (num1, num2)

   if answer == result:

       print("Well done!")

       score += 1

   else:

       print("incorrect")

print("Your score was", score)

Explanation:

Your error is on line 7, where you are providing multiple arguments to the input function, instead of 1.

One way to solve this is to create a variable prompt and concatenate all strings and variables within that variable to use for the input.

At which layer of the osi model does a router function?

Answers

A router functions at the Network Layer (Layer 3) of the OSI model. It is responsible for selecting the best route for data to travel from its source to its destination.

A router functions at the Network Layer (Layer 3) of the OSI model. This layer is responsible for routing packets between different networks and systems. A router inspects the header of a packet to determine its source and destination address and then decides the best route for the packet to travel from its source to its destination. It also performs network address translation (NAT) and can filter packets based on the source or destination address. Furthermore, a router can be used to connect networks of different types, such as a LAN and WAN. It can also be used to connect different networks that use different protocols. By performing these tasks, a router helps facilitate communication between different systems and networks.

Learn more about functions here-

brainly.com/question/28939774

#SPJ4

PLEASE HELP!! This is a question. Please answer using python. Only if you have experience. I will give the first person brainliest!

PLEASE HELP!! This is a question. Please answer using python. Only if you have experience. I will give

Answers

Answer:

what question is this ?? can you be more specific i need more details on the question

Explanation:

The program written in Python programming language that performs the required computations is:

n = int(input("n: "))

while n != 1:

   if n%2 == 0:

       n = int(n/2)

   else:

       n = int(3 * n + 1)

   print(n)

How to write the program in Python programming language?

The program written in Python programming language, where comments are used to explain each line is as follows:

#This gets input for n

n = int(input("n: "))

#The following loop is repeated until the value of n is 1

while n != 1:

#This checks if n is an even number; n is halved, if this condition is true

   if n%2 == 0:

       n = int(n/2)

#If n is an odd number; n is tripled and increased by 1

   else:

       n = int(3 * n + 1)

#This prints the sequence of numbers generated

   print(n)

The above program generates the sequence of numbers for n

Read more about python programs at

https://brainly.com/question/26497128

#SPJ1

T/FPersonalization features like wallpapers and screen savers are important to a virtual machine.

Answers

Personalization features like wallpapers and screen savers are not important to a virtual machine as they do not affect its functionality or performance. Virtual machines are designed to run multiple operating systems and applications, and their main focus is on providing a stable and secure environment for these tasks.

Personalization features are more important for the user's experience and comfort, but they do not affect the virtual machine's operation.


 Personalization features like wallpapers and screen savers are not important to a virtual machine. Virtual machines are mainly focused on providing a functional environment for running applications and software in an isolated manner, rather than emphasizing personalization.

To know more about virtual machine visit:-

https://brainly.com/question/29535108

What is the key sequence to copy the first 4 lines and paste it at the end of the file?

Answers

Press Ctrl+C after selecting the text you want to copy. Press Ctrl+V while holding down the cursor to paste the copied text.

What comes first in the copy and paste process for a slide?

Select the slide you wish to copy from the thumbnail pane, then hit Ctrl+C on your keyboard. Move to the location in the thumbnail pane where you wish to paste the slide, then hit Ctrl+P on your keyboard.

What comes first in the copying process of a segment?

The secret to copying a line segment is to open your compass to that segment's length, then mark off another segment of that length using that amount of opening.

To know more about copy visit:-

https://brainly.com/question/24297734

#SPJ4

Approximately how many tweets are posted on Twitter each day? 500 500 thousand 500 million 500 billion

Answers

Answer:

around 500 million

Explanation:

I have a final project in codehs, where we have to make our own game. I decided to do a game like ping pong, where it hits the paddles and adds points. If you touch the top or the bottom of the screen, you die and it restarts. I need help with adding points, and having it have the “you win”! Screen and restarting the points and positioning the ball in the middle of the screen. Any help would be deeply appreciated. Here’s the code I have :
var PADDLE_WIDTH = 80;
var PADDLE_HEIGHT = 15;
var PADDLE_OFFSET = 10;
var paddle;
var paddle2;
var setPosition;
var rectangle;

var Score;
var point = 0


var setPosition;

var txt = new Text("Can't touch the top or bottom. Get to 20!", "9pt Arial");

var BALL_RADIUS = 15;
var ball;
var dx = 4;
var dy = 4;


function start(){
drawBALL(BALL_RADIUS, Color.black, getWidth()/2, getHeight()/2);
mouseMoveMethod(yay);
paddle = new Rectangle(PADDLE_WIDTH, PADDLE_HEIGHT);
paddle.setPosition(100, 100);
mouseMoveMethod(yay);

Score = new Text("Score : ");
Score.setPosition(0, 35);
add(Score);

txt.setPosition(3, 15 );
txt.setColor(Color.blue);
add(txt);

checkWalls();

paddle2 = new Rectangle(PADDLE_WIDTH, PADDLE_HEIGHT);
paddle2.setPosition(500, 100);
add(paddle2);
}



function drawBALL(BALL_RADIUS, color, x, y){
ball = new Circle (BALL_RADIUS);
ball.setPosition(200, 200);
add(ball);
setTimer(draw, 0);
}

function draw(){
checkWalls();
ball.move(dx, dy);
}



function pop(e){
Score.setText("Score:" + point);

}





function checkWalls(){
if(ball.getX() + ball.getRadius() > getWidth()){
dx = -dx;
if (elem != null) {
dy = -dy;
}
}

if(ball.getX() - ball.getRadius() < 0){
dx = -dx;
if (elem != null) {
dy = -dy;
}
}

if(ball.getY() + ball.getRadius() > getHeight()){
dy = -dy;
if (elem != null) {
dy = -dy;
point = point - 1;
pop();
}

} if(ball.getY() - ball.getRadius() < 0){
dy = -dy;
if (elem != null) {
dy = -dy;
point = point - 1;
pop();
}
}
var elem = getElementAt(ball.getX(), ball.getY() - ball.getRadius());
if (elem != null) {
dy = -dy;
}
elem = getElementAt(ball.getX(), ball.getY() + ball.getRadius());
if (elem != null) {
dy = -dy;
}
}




function yay(e){
paddle.setPosition(e.getX(), getHeight() - 25);
paddle.setColor("#c48ed4");
add (paddle);
paddle2.setPosition(e.getX(), getHeight() - 430);
paddle2.setColor("#c48ed4");
add (paddle2);
}

I have a final project in codehs, where we have to make our own game. I decided to do a game like ping

Answers

Answer:

var elem = getElementAt(ball.getX(), ball.getY() - ball.getRadius());

if (elem != null) {

dy = -dy;

}

elem = getElementAt(ball.getX(), ball.getY() + ball.getRadius());

if (elem != null) {

dy = -dy;

}

}

function yay(e){

Other Questions
For what positive number is the cube of the number greater than twice its square CAN SOMEOME HELP ME ASAP?Jack is a page (a knights helper) in Camelot. His story involves jousting matches and boisterous feasts. Although Jack is small for his age, he hopes to become a knight someday, like his tough older cousin. While working in the horse stalls one day, Jack overhears a plot against the king. He collects evidence and presents it to his cousin, who delivers the news to the king. The plot is thwarted and Jack is hailed as a hero. Which is the best explanation of how the main character helps to reveal the theme? OA. Jack's dream of becoming a knight shows that you can do anything you put your mind to. O B. Jacks work as a page shows that hard work and determination pay off. OC. Jack's ability to gather evidence shows that some people have Surprising talents. OD. Jack's treatment as a hero shows that honesty is always the best policy. Help me please I dont know what to do Find the numerator ?/2 > 1/5 Express the general solution in terms of Bessel functions:x^2y''+4xy'+(x^2+2)y=0 If the relevant population is 268 million people and the number of people in the labor force is 148 million, the number of people NOT in the labor force is equal to: The owners of an amusement park charge an admission fee, c, in dollars for children and an admission, p, in dollar for adults. They sold 500 child tickets and 800 adult tickets. Enter an equation that represents the total amount in dollars, t, collected from sale of tickets the nitrogen atom of an amine has a nonbonded electron pair, and an amine can therefore act both as a(n) ______ and as a(n) ______. How did world events affect American society? How did Americans respond to economic and social turmoil? Write an informative essay inform a newspaper article about the criteria people used to judge a good biking trail Identify the center, vertices, and foci for each ellipse.(x-1) /9} + (y-1)/36 =1 Solve PV = nRT for R. 1.1. Nitrogen gas is an example of al an... A. element B. compound C. heterogeneous mixture D. homogeneous mixture What is the GCF of 14mn, 56m^2n^3, 28m^3n^2?a) 7m^2n^2b) 7mnc) 14m^3n^3d) 14m^2n^2e) 14mn a basketball player makes 140 out of 350 free throws. find the percent by using equivalent fractions which of the following is true of the most useful theories? multiple choice question. they have static variables; in other words, when one variable changes, the other stays the same. they apply to specific, singular ideas and should be viewed independently. they help explain many associations and cover multiple cases. consensus about their validity is reached by academics and verified by the government. a computer is programmed to select two random numbers from 1 to 5 possible outcomes are shown in the table Each outcome has equal probability What is probability that the first number selected was 3 or higher given that the sum of the two numbers for 7A. 3/25B. 4/25C. 1/5D. 3/4 The support for a central argument is aSelect one:major claimjustificationrebuttalsubclaim Module 4: HW - Finding t and P vals (Try 2)For questions 1-2:Suppose we desire to perform the following two-sidedhypothesis test on the mean of a population (the variance is notknown):H0: = Question 1 Find ta/2n-1 for a confidence level of a= 0.10 -0.889 -0.560 -0.448 -0.028 0.662 1.796 2.590 4.080 4.919 6.964Question 2 1 pts Suppose we have computed (from data) a test statistic to 1.1 The perimeter of a triangle is 10 inches, if the length is 7 less than twice the width, find the length and width.I need to see the equation for it, too. Please please help