How do we use game maker?

Answers

Answer 1

Answer:

The easy to use powerful game engine that is the best for 2D games


Related Questions

Most Information Technology careers require workers to perform their jobs in
A. a home office.
B. a business office.
C. a secure office.
D. an off-site office.

Answers

Answer:

b on edge 2020

Explanation:

Answer:

b

Explanation:

Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.
a) true
b) false

Answers

Answer:

a) true

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

With cybersecurity theory, security standards, frameworks and best practices we can guard against cyber attacks and easy-to-guess passwords.

An example of best practices in cybersecurity is the use of alphanumeric password with certain composition and strength, such as a minimum of eight (8) characters. This would ensure there's a formidable wall to protect data and an unauthorized access or usage of the system network.

A dictionary attack typically involves accessing a list of commonly used passwords by end users rather than a random guess.

Hence, organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.

A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected. Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads. Which of the following BEST describe this type of attack?
A. DOS
B. SSL Stripping
C. Memory leak
D. Race condition
E. Shimming
F. Refactoring

Answers

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

Gamification and virtual reality is the future of education

Answers

Answer:

Education is expected to be the fourth largest sector for VR investment. VR in education is predicted to be a $200 million industry by 2020, and a $700 million industry by 2025. 97% of students would like to study a VR course.

Explanation:

Use the factorial operation to evaluate 10!.
A) 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1
B) 9 + 8 + 7 + 6 + 5 + 4 + 3 + 2 + 1
C) 10 + 9 + 8 + 7 + 6 + 5 + 4 + 3 + 2 + 1
D) 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

Answers

Answer:

D

Explanation:

The definition of n! is n x (n-1) x (n-2) x ... x 1.

So 10! = 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1 i.e. D.

Answer:

D) 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

Explanation:

The problem here is to use the factorial method to find;

    10!

The factorial of any number is given as:

       a!  = (a - 1) x (a - 2) .........(a - n)

It is the product of any integer from 1 to that number.

So;

   10!   = 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

The solution is therefore 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

Write the command and explain about each formula in MS Excel


1. SUM

2. AVERAGE

3. MAx

4. MIN

5. COUNT

Answers

Answer:

1. SUM  --- The SUM function is used to sum all the values that are in a given range. Thus, for example, if you want to add the values between cells A1 and A3, you must write the following command: =SUM(A1:A10)

2. AVERAGE  --- The AVERAGE function allows you to average a range of values, throwing the average of these values in the cell where the function is typed. For example, if you want to average the values included between B1 and B3, you should write the following function: =AVERAGE (B1: B3).

3. MAX --- The MAX function, for its part, returns the maximum value of the values included in the function. For example, if the maximum value included between the values C1 and C3 is known, the following function must be written: =MAX (C1: C3).

4. MIN  --- The MIN function, in turn, allows to identify the minimum value of the range of values included in the function. For example, if the minimum value included between the values D1 and D3 is known, the following function must be written: =MIN (D1: D3).

5. COUNT --- The COUNT function, finally, is used to count all the cells that have numbers, which have been included in the range of the function. For example, if you want to count all cells that contain numbers between the values E1 and E3, you must write the following function: =COUNT (E1: E3).

What is the recommended solution if a computer performs slowly?

Answers

Answer:

Not sure what the class/context is, but here's what I'd do to diagnose a problem like that:

- Check to see what programs have high utilization of system resources in task manager and end them

- Prevent background startup processes from occuring on restart or from running in the background during normal use

- Figure out what hardware component is bottlenecking the system and upgrade it (HDD to SSD would be one example)

- If the issue is malware related, I would "flatten" the PC by wiping the entire system and reinstalling the OS (though some malware can persist even across this)

Source: I've worked as labs support

If a computer is performing slowly, there are several recommended solutions one can try to improve its performance, such as closing unnecessary programs, restarting the computer, etc.

Reviewing the programs that automatically start when the computer boots up and disabling unnecessary startup programs to reduce the time it takes for the computer to start and free up system resources. The specific solution may vary depending on the computer's operating system, hardware, and specific performance issues. It's always a good idea to back up important files before making any changes to your computer's configuration. If the performance issues persist, seeking assistance from a computer technician or IT professional may be necessary.

Learn more about computers here.

https://brainly.com/question/32297640

#SPJ6

what is mass communication​

Answers

Hey there!

When you see the word “mass communication” think of an article written on the newspaper or a person interaction on a social media platform. You’re talking to a variety of LARGE groups but not physically there in their appearance, right? (This is an EXAMPLE.... NOT an ANSWER)

Here’s SOME examples

- Political debate campaigns

- Journalism (you could find some in articles / newspapers passages)

- Social Media Platforms

- A company PROMOTING their brand as a COMMERCIAL on the television/radio

Without further a do... let’s answer your question….......

Basically “mass communication”

is the undertaking of media coordination which produce and carries out messages with HUGE crowds/public audiences and by what the message process striven by their audience ☑️

Good luck on your assignment and enjoy your day!

~LoveYourselfFirst:)

Difference between analog and digital computer ??

Answers

Answer:

The analogue computer works on a continuous signal. The digital computer works on a discrete signal. The output is a voltage signal, they are not exact values and are in graphical form.

* HELP FAST*Which Section do you need to go on in the Ribbon, to get to the button that will allow you Create a Link between text boxes?

Answers

Answer:

Insert

Explanation:

Take with a pinch of salt cuz I'm not a coder or anything, but I've got a few skillz.

Consider the following code segment.
firstList + ["guitar", "drums", "bass"]
secondList + ["flute", "violin"]
thirdList = []
thirdList + firstList
firstList secondList
secondlist thirdList
What are the contents of secondList after the code segment is executed?
А
[]
00
["guitar", "drums", "bass"]
с
["flute", "violin"]
D
["flute", "violin", "guitar", "drums", "bass"]

Answers

Answer:

[tex]secondList = ["guitar", "drums", "bass"][/tex]

Explanation:

At the third line of the code segment:

An empty list thirdList is created

At the fourth line of the code segment:

The content of firstList is passed into thirdList

i.e. [tex]thirdList = ["guitar", "drums", "bass"][/tex]

At the fifth line of the code segment:

The content of secondList is passed into firstList

i.e. [tex]firstList =  ["flute", "violin"][/tex]

At the fifth line of the code segment:

The content of thirdList is passed into secondList

i.e. [tex]secondList = ["guitar", "drums", "bass"][/tex]

How do motion sensors determine in simation
about a person?
They store information regarding a person's
health.
They record a person's surroundings.
They record who a person interacts with.
They track where they go and how they move.

Answers

Answer:

They record a person's surroundings.

Explanation:

Motion sensors like the passive infrared (PIR) work by detecting changes in the infrared radiation given off by objects in their surroundings. Normally most objects give off a small amount of infrared radiation. Human bodies, however, give off a large amount of infrared radiation.

So when motion sensors detect the presence of a person in a surrounding, they give off an alarm to indicate the presence of an intruder.

Answer:D

Explanation: the track where they go

Consider the following pseudocode:

Get the Sqrt of 9.
This pseudocode is an example of what?

A
An event that contains a parameter

B
A function that contains an argument

C
An object that contains a parameter

D
A class that contains an argument

Answers

Answer: sorry I couldn’t help but Pseudocode is an artificial and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented. These include while, do, for, if, switch.

Explanation:

III. FILL-IN THE BLANK (five points each)
11. Open divided scales have scales going in
directions.
12. There are
groups of scales.
13. The open divided scales have an
unit preceding zero.
14. The triangular scale can have up to
different scales on one piece of plastic.
15. The mechanical inch is divided into
equal parts.

Answers

Jsjejshxjskksnxbfbsjchjsjens

You have an image of building but there are people standing on the far left side. You would like to remove those people. Which tool do you need ?

Answers

Answer:

cropping tool

Explanation:

since the people are on the far left you can just crop the image

State what’s printed for each println in the code below:

public static void main(String args[ ])

{

MyClass theObj = new MyClass( );
theObj.gravy = 107.43;
String s = "hello";
int xray[] = {1, 2, 3, 4, 5};
double floozy = 97.4;
myMethod(floozy, theObj, xray, s );
System.out.println(floozy); // Problem 1:
System.out.println(theObj.gravy); //Problem 2:
System.out.println(xray[2]); //Problem 3:
System.out.println(s); //Problem 4:
}
public static void myMethod(double floozy, MyClass anObj, int a[ ], String s)
{
floozy = 13.1;
anObj.gravy = 10.001;
a[2] = 100; s = "good bye";
}

Answers

Answer:

Explanation:

Each of the following println statements will print the following values

ystem.out.println(floozy); // Problem 1:   97.4

System.out.println(theObj.gravy); //Problem 2:  107.43

System.out.println(xray[2]); //Problem 3:  100

System.out.println(s); //Problem 4: Hello

This is because out of all of the variables that the myMethod gives a value to, the only variable that is being saved back to the global variable in the main method is a[2]. The other variables are being saved as instance variables and not being returned. Therefore, when the println statements are called they target the local variables in the main method.

If you wanted to help your phone , a nonliving thing , perform the process of life which is to gain energy which would be the best description of what to do ?

Help

Answers

Answer:

d. plug it into the charger.

Explanation:

How to do brainliest

Answers

If the reply that someone put has a blue crown you click it and it will give them brainliest but it usually won’t work unless there are two answers

When defining a class, it is a best practice to declare ____ as private. constructors mutators nothing should be private accessors variables

Answers

Answer:

The answer is "variables".

Explanation:

It is necessary to declare a variable privately when declaring a class because the private variable 'protects' the code while it is in operation. It may not aim to protect it at this stage from changing the codes themselves for other developers. Its purpose of the so-called "data hiding" is to hold the internal data from many other classes using the class protected.

Select all correct answers. Technology helps:

A) make things cooler

B) make Things easier

C) make things faster

D) solve Problems

Answers

Answer:

a,b,c,d

Explanation:

it helps with all of those things

Answer:

D. Solve Problems

Explanation:

Technology has played a crucial role in keeping so many people alive through life support machines and other specialized health equipment. Technology also aids in the scientific research of new medicines and cures that are beneficial to the entire human race. Business and Commerce. Business is not as usual since the internet came into this world.

Which function in spreadsheet software can be used to predict future sales or inventory needs?

Answers

create a forecast, Excel creates a new worksheet that contains both a table of the historical and predicted values and a chart that expresses this data. A forecast can help you predict things like future sales, inventory requirements, or consumer trends.

Answer:forecast

Explanation:

in java please
In this exercise, you will need to create a static method called findString in the MatchingString class that should iterate over String[] arr looking for the exact match of the String that is passed as a parameter.

Return the index of the array where the String is found; if it does not exist in the array, return -1.

For example, if the word “Karel” is passed in, your method would return 1.

Answers

Answer:

Explanation:

The following code is written in Java. It is a static method that takes in a String parameter and loops through the String array called arr comparing each element in the array with the word parameter that was passed. If it finds a match the method returns the index of that word, otherwise it will return -1

  public static int findString(String word){

               int index = -1;

               for (int x = 0; x < arr.length; x++) {

                       if (word == arr[x]) {

                               index = x;

                               break;

                       }

               }

               

               return index;

               

       }

DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/pythons = "Administrator"The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment. Options may be used once or not at all.Select and Place:

Answers

Answer:

The output is to the given question is:

nist

nsrt

imdA

strat

Explanation:

The missing code can be defined as follows:

code:

s = "Administrator" #defining a variable that hold string value

print(s[4:8])#using slicing with the print method  

print(s[4: 12:2])#using slicing with the print method  

print(s[3::-1])#using slicing with the print method  

print(s[-7:-2])#using slicing with the print method    

In the above code, a string variable s is declared, that holds a string value, and use the multiple print method to print its slicing calculated value.

what benefit can we get form using computer in education?​

Answers

Teaches you technology uses, and what we can do with them

Many interesting science-, technology-, engineering-, and math-oriented websites provide open-source data to the public. Which of the following sites provide that information?

a. DATA.GOV
b. Whitehouse.gov
c. NYC Open Data
d. National Cancer Institute
e. International Genetics Foundation
f. creditscore.com
g. USPostal Service

Answers

Answer: a. DATA.GOV

b. Whitehouse.gov

c. NYC Open Data

d. National Cancer Institute

e. International Genetics Foundation

Explanation:

The mentioned websites will provide information about science, engineering, mathematics, and technology. These are open source websites and they can provide information to the public.

creditscore.com  and  US Postal Service these websites the above mentioned information. The former provides the credit report provided by the credit bureau and the other latter is related with the independent agency which provides postal services.

write a python program to accept a number and check whether it is divisible by 4 or not​

Answers

Answer:

number = int(input("Enter number: "))

if (number % 4):

 print("{} is not divisible by 4".format(number))

else:

 print("{} is divisible by 4".format(number))

Explanation:

If the %4 operation returns a non-zero number, there is a remainder and thus the number is not divisable by 4.

If you are working in a word-processing program and need to learn about its features, the best place to get assistants is from the ________.
A. application's help menu
B. desktop
C. toolbar
D. start menu

Answers

Answer:

A

Explanation:

plz mark me brainlies

Answer:

A. Application's help menu

Explanation:

can you answer this question?

Answers

Answer:

The SIZE constant is not definedThe variable i should be defined at the start of the function, not within the condition of the while loopThe main function returns no value.  Generally they should return a zero on success.The printf text "%d" should actually be "%f".  %d treats the variable as though it's an integer.

What are the words that make up a high-level programming language called?

Answers

Answer:

just ask your teacher

Explanation:

A user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and password. A technician inspects the logs in Event Viewer and finds a message that corresponds to the user's login attempts: The user profile for User l5 could not be loaded. Ntuser.dat is missing or corrupt. What would be MOST appropriate for resolving this issue?

Answers

Answer:

Press the function key F8 to boot into safe mode and log in as User15. Then, remove extraneous startup programs.

Explanation:

This is a problem that is related to a missing or corrupt system file responsible for managing user accounts and profiles on a computer system.

In this scenario, a user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and password. A technician inspects the logs in Event Viewer and finds a message that corresponds to the user's login attempts: The user profile for User l5 could not be loaded. Ntuser.dat is missing or corrupt.

Thus, what would be most appropriate for resolving this issue is to press the function key, F8 to boot into safe mode and log in as User15 and then remove extraneous startup programs that are running in the background while a computer is booting (startup).

Other Questions
Name and give an example of the 4 elements in the Rhetorical Triangle * the product of -3/4 and a namber x is -27 Help!!! I need this ASAP!!!! Please help me would be very appreciated. A coffee cup calorimeter contains 100.0 mL of 1.50 M Ba(NO3)2 at 25.0o C. A student pours 100.0 mL of 1.50 M Na2SO4 at 25.0o C into the calorimeter. A precipitate forms and the temperature rises to 29.7o C. Assume that no heat was lost to the surroundings, the volumes were additive, the specific heat capacity of the solution was 4.184 J/gK, and the density of the solution was 1.00 g/mL.A. This reaction could be represented as a complete ionic or a net ionic equation. Write the balanced chemical equation that should be used in association with the Delta Hrxn value for this reaction. B. Find the amount of heat that was lost or gained by the solution in the calorimeter. C. Find the heat of reaction, Delta Hrxn. D. Is the reaction endothermic or exothermic? Need help its really hard PLEASE HELP!!!!!!!!!!!!! Where do James, Major, Hollis, and Sonny decide to go afterward during what period did the aztec empire flourish why do you think we should wear mask? evaluate. (5.2 + 3) (6.4 - 1.4) Whoever answer this question with explanation gets marked the brainiest Help me pleaseee! Thank you! :) There are only two chemical elements which are significantly magnetic and reasonablycommon and had appropriate densities,_______and______They concluded therefore that the Earth had to have a______made ofand__________Pls help me out please help will mark brainliest:) Evaluate the expression when a= 4, b= -6, c= -12 What is the Slope of the line containing points Q(-4,-1) and T(0, 9)? What is the relationship ofStores function and otherdepartments Write a leaflet with 8 simple things for you that you will help the planet! which linear inequality is represented by the graph? O y3/2x+3 (B)O y>2/3x+3 (C)O y