9. The monumental failure of Atari's E.T Extra-terrestrial was, among other things, due to the fact that ______________
a) it was too easy to play
b) it was too long to finish
c) the rules of the game were not clear enough
d) it put too much emphasis on the artistic side of the game

Answers

Answer 1

Answer:

c

Explanation:


Related Questions

10.The front end side in cloud computing is​

Answers

Answer:

The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system.

The front end includes the client's computer (or computer network) and the application required to access the cloud computing system.

Explanation:

can i have brainliest please

Which of the following is not an advantage of e-commerce for consumers?
a. You can choose goods from any vendor in the world.
b. You can shop no matter your location, time of day, or conditions.
c. You have little risk of having your credit card number intercepted.
d. You save time by visiting websites instead of stores.

Answers

Answer:  c. You have little risk of having your credit card number intercepted.

====================================

Explanation:

Choice A is false because it is an advantage to be able to choose goods from any vendor from anywhere in the world. The more competition, the better the outcome for the consumer.

Choice B can also be ruled out since that's also an advantage for the consumer. You don't have to worry about shop closure and that kind of time pressure is non-existent with online shops.

Choice D is also a non-answer because shopping online is faster than shopping in a brick-and-mortar store.

The only thing left is choice C. There is a risk a person's credit card could be intercepted or stolen. This usually would occur if the online shop isn't using a secure method of transmitting the credit card info, or their servers are insecure when they store the data. If strong encryption is applied, then this risk can be significantly reduced if not eliminated entirely.

Answer:

c. You have little risk of having your credit card number intercepted.

Explanation:

Hope this helps

For this exercise, you are given the Picture class and the PictureTester class. The Picture class has two instance variables. You will need to finish the class by writing getter and setter methods for these two instance variables.
Then in the PictureTester class a Picture object has been created for you. You will need to update this object and then print using the getter methods you created.
public class Picture
{
private String name;
private String date;
public Picture(String theName, String theDate){
name = theName;
date = theDate;
}
// Add getter and setter methods here.
// method names should be:
// getName, setName, getDate, setDate
}

Answers

Answer:

hope this helps, do consider giving brainliest

Explanation:

public class Picture {

  

   // two instance variables

   private String name;

   private String date;

  

   // Parameterized constructor

   public Picture(String name, String date) {

       super();

       this.name = name;

       this.date = date;

   }

  

   /**

   * return the name

   */

   public String getName() {

       return name;

   }

   /**

   * param name the name to set

   */

   public void setName(String name) {

       this.name = name;

   }

   /**

   * return the date

   */

   public String getDate() {

       return date;

   }

   /**

   * param date the date to set

   */

   public void setDate(String date) {

       this.date = date;

   }  

}

----------------------------------------------------TESTER CLASS---------------------------------------------------------------------

package test;

public class PictureTester {

   public static void main(String[] args) {

       // TODO Auto-generated method stub

       // creating Picture object (pic is the reference variable) and we are invoking the constructor by passing // values of name and date

      

       Picture pic = new Picture("flower_pic", "28-04-2020");

      

       // now we will first use get method

       String name = pic.getName();

       String date = pic.getDate();

      

       // displaying the value fetched from get method

       // value will be name - flower_pic and date - 28-04-2020

       System.out.println("[ Name of the Picture - "+name+" and Date - "+date+" ]");

      

       // now we will use set method to set the value of name and date and then display that value

       // declaring two variable

      

       String name1 = "tiger_pic";

       String date1 = "28-03-2020";

      

       //assigning those value using set method

      

       pic.setName(name1);

       pic.setDate(date1);

      

       System.out.println("[ Name of the Picture - "+pic.getName()+" and Date - "+pic.getDate()+" ]");

      

   }

}

1. If you were on Earth and wanted to call someone via the radio on the moon, and they immediately sent a message back as soon as they received your message, how long from when you sent your message would you get a response

Answers

Answer:

About 2.5 seconds.

Explanation:

The speed of radio waves is 299,750 km/s whereas the distance between moon and earth is 384,400 km. By dividing speed of radio waves over the distance of moon and earth, we get 1.22 seconds of time from one side or in other words the person on the moon receives message in 1.22 seconds from the earth and the person on the earth receives a response from the moon in also 1.2 seconds so total time taken by the sender in receiving response from the moon is 2.5 to 3 seconds.

Suppose the program counter is currently equal to 1700 and instr represents the instruction memory. What will be the access of the next instruction if:

instr[PC] = add $t0, $t1, $t2

Answers

Answer:

C

Explanation:

omputer chip

sorry btw

Write a function process_spec that takes a dictionary (cmap), a list (spec) and a Boolean variable (Button A) as arguments and returns False: if the spec has a color that is not defined in the cmap or if Button A was pressed to stop the animation Otherwise return True

Answers

Answer:

Explanation:

The following code is written in Python. The function takes in the three arguments and first goes through an if statement to check if Button A was pressed, if it was it returns False otherwise passes. Then it creates a for loop to cycle through the list spec and checks to see if each value is in the dictionary cmap. If any value is not in the dictionary then it returns False, otherwise, it returns True for the entire function.

def process_spec(cmap, spec, buttonA):

   if buttonA == True:

       return False

   

   for color in spec:

       if color not in cmap:

           return False

   return True

The following text is encoded in binary. 001000100100010001101111001000000110111101101110011001010010000001110100011010000110100101101110011001110010000001110100011010000110000101110100001000000111001101100011011000010111001001100101011100110010000001111001011011110111010100100000011001010111011001100101011100100111100100100000011001000110000101111001001000100010000000101101001000000100010101101100011001010110000101101110011011110111001000100000010100100110111101101111011100110110010101110110011001010110110001110100

Answers

The answer to your question is A :)

Write a piece of code that constructs a jagged two-dimensional array of integers named jagged with five rows and an increasing number of columns in each row, such that the first row has one column, the second row has two, the third has three, and so on. The array elements should have increasing values in top-to-bottom, left-to-right order (also called row-major order). In other words, the array's contents should be the following: 1 2, 3 4, 5, 6 7, 8, 9, 10 11, 12, 13, 14, 15
PROPER OUTPUT: jagged = [[1], [2, 3], [4, 5, 6], [7, 8, 9, 10], [11, 12, 13, 14, 15]]
INCORRECT CODE:
int jagged[][] = new int[5][];
for(int i=0; i<5; i++){
jagged[i] = new int[i+1]; // creating number of columns based on current value
for(int j=0, k=i+1; j jagged[i][j] = k;
}
}
System.out.println("Jagged Array elements are: ");
for(int i=0; i for(int j=0; j System.out.print(jagged[i][j]+" ");
}
System.out.println();
}
expected output:jagged = [[1], [2, 3], [4, 5, 6], [7, 8, 9, 10], [11, 12, 13, 14, 15]]
current output:
Jagged Array elements are:
1
2 3
3 4 5
....

Answers

Answer:

Explanation:

The following code is written in Java and it uses nested for loops to create the array elements and then the same for loops in order to print out the elements in a pyramid-like format as shown in the question. The output of the code can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       int jagged[][] = new int[5][];

       int element = 1;

       for(int i=0; i<5; i++){

           jagged[i] = new int[i+1]; // creating number of columns based on current value

           for(int x = 0; x < jagged[i].length; x++) {

               jagged[i][x] = element;

               element += 1;

           }

       }

       System.out.println("Jagged Array elements are: ");

       for ( int[] x : jagged) {

           for (int y : x) {

               System.out.print(y + " ");

           }

           System.out.println(' ');

       }

       }

   }

Define a class StatePair with two template types (T1 and T2), a constructor, mutators, accessors, and a PrintInfo() method. Three vectors have been pre-filled with StatePair data in main():vector> zipCodeState: ZIP code - state abbreviation pairsvector> abbrevState: state abbreviation - state name pairsvector> statePopulation: state name - population pairsComplete main() to use an input ZIP code to retrieve the correct state abbreviation from the vector zipCodeState. Then use the state abbreviation to retrieve the state name from the vector abbrevState. Lastly, use the state name to retrieve the correct state name/population pair from the vector statePopulation and output the pair.Ex: If the input is:21044the output is:Maryland: 6079602

Answers

Answer:

Here.Hope this helps and do read carefully ,you need to make 1 .cpp file and 1 .h file

Explanation:

#include<iostream>

#include <fstream>

#include <vector>

#include <string>

#include "StatePair.h"

using namespace std;

int main() {

  ifstream inFS; // File input stream

  int zip;

  int population;

  string abbrev;

  string state;

  unsigned int i;

  // ZIP code - state abbrev. pairs

  vector<StatePair <int, string>> zipCodeState;

  // state abbrev. - state name pairs

  vector<StatePair<string, string>> abbrevState;

  // state name - population pairs

  vector<StatePair<string, int>> statePopulation;

  // Fill the three ArrayLists

  // Try to open zip_code_state.txt file

  inFS.open("zip_code_state.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file zip_code_state.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <int, string> temp;

      inFS >> zip;

      if (!inFS.fail()) {

          temp.SetKey(zip);

      }

      inFS >> abbrev;

      if (!inFS.fail()) {

          temp.SetValue(abbrev);

      }

      zipCodeState.push_back(temp);

  }

  inFS.close();

 

// Try to open abbreviation_state.txt file

  inFS.open("abbreviation_state.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file abbreviation_state.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <string, string> temp;

      inFS >> abbrev;

      if (!inFS.fail()) {

          temp.SetKey(abbrev);

      }

      getline(inFS, state); //flushes endline

      getline(inFS, state);

      state = state.substr(0, state.size()-1);

      if (!inFS.fail()) {

          temp.SetValue(state);

      }

     

      abbrevState.push_back(temp);

  }

  inFS.close();

 

  // Try to open state_population.txt file

  inFS.open("state_population.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file state_population.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <string, int> temp;

      getline(inFS, state);

      state = state.substr(0, state.size()-1);

      if (!inFS.fail()) {

          temp.SetKey(state);

      }

      inFS >> population;

      if (!inFS.fail()) {

          temp.SetValue(population);

      }

      getline(inFS, state); //flushes endline

      statePopulation.push_back(temp);

  }

  inFS.close();

 

  cin >> zip;

for (i = 0; i < zipCodeState.size(); ++i) {

      // TODO: Using ZIP code, find state abbreviation

  }

  for (i = 0; i < abbrevState.size(); ++i) {

      // TODO: Using state abbreviation, find state name

  }

  for (i = 0; i < statePopulation.size(); ++i) {

      // TODO: Using state name, find population. Print pair info.

  }

}

Statepair.h

#ifndef STATEPAIR

#define STATEPAIR

#include <iostream>

using namespace std;

template<typename T1, typename T2>

class StatePair {

private:

T1 key;

T2 value;

public:

// Define a constructor, mutators, and accessors

// for StatePair

StatePair() //default constructor

{}

// set the key

void SetKey(T1 key)

{

this->key = key;

}

// set the value

void SetValue(T2 value)

{

this->value = value;

}

// return key

T1 GetKey() { return key;}

 

// return value

T2 GetValue() { return value;}

// Define PrintInfo() method

// display key and value in the format key : value

void PrintInfo()

{

cout<<key<<" : "<<value<<endl;

}

};

#endif

In this exercise we have to use the knowledge in computational language in C++  to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is

#include<iostream>

#include <fstream>

#include <vector>

#include <string>

#include "StatePair.h"

using namespace std;

int main() {

 ifstream inFS;

 int zip;

 int population;

 string abbrev;

 string state;

 unsigned int i;

 vector<StatePair <int, string>> zipCodeState;

 vector<StatePair<string, string>> abbrevState;

 vector<StatePair<string, int>> statePopulation;

 inFS.open("zip_code_state.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file zip_code_state.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <int, string> temp;

     inFS >> zip;

     if (!inFS.fail()) {

         temp.SetKey(zip);

     }

     inFS >> abbrev;

     if (!inFS.fail()) {

         temp.SetValue(abbrev);

     }

     zipCodeState.push_back(temp);

 }

 inFS.close();

 inFS.open("abbreviation_state.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file abbreviation_state.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <string, string> temp;

     inFS >> abbrev;

     if (!inFS.fail()) {

         temp.SetKey(abbrev);

     }

     getline(inFS, state);

     getline(inFS, state);

     state = state.substr(0, state.size()-1);

     if (!inFS.fail()) {

         temp.SetValue(state);

     }

     abbrevState.push_back(temp);

 }

 inFS.close();

 inFS.open("state_population.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file state_population.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <string, int> temp;

     getline(inFS, state);

     state = state.substr(0, state.size()-1);

     if (!inFS.fail()) {

         temp.SetKey(state);

     }

     inFS >> population;

     if (!inFS.fail()) {

         temp.SetValue(population);

     }

     getline(inFS, state);

     statePopulation.push_back(temp);

 }

 inFS.close();

 cin >> zip;

for (i = 0; i < zipCodeState.size(); ++i) {

  }

 for (i = 0; i < abbrevState.size(); ++i) {

  }

 for (i = 0; i < statePopulation.size(); ++i) {

 }

}

Statepair.h

#ifndef STATEPAIR

#define STATEPAIR

#include <iostream>

using namespace std;

template<typename T1, typename T2>

class StatePair {

private:

T1 key;

T2 value;

public:

StatePair()

{}

void SetKey(T1 key)

{

this->key = key;

}

void SetValue(T2 value)

{

this->value = value;

}

T1 GetKey() { return key;}

T2 GetValue() { return value;}

void PrintInfo()

{

cout<<key<<" : "<<value<<endl;

}

};

See more about C code at brainly.com/question/19705654

WILLING TO GIVE 50 POINTS PLS HELP Every appliance has an appliance tag that shows the amount of power the appliance uses. Appliance tags are usually on the bottom of the appliance. Along with other details, the tag gives information about the electric power the appliance consumes per unit of time.

Dorian took a picture of the appliance tag on the bottom of his family's blender, which is a kitchen appliance used to mix and puree foods.



Read the tag, and select the correct value from each drop-down menu.

The tag lists the ______(V) that the appliance runs at and its
_______ in watts (W). According to the tag, Dorian's blender uses
watts ________of power.

Part B
Think about the appliances and electronics you interact with every day. List one appliance that you think uses less power than the blender and one appliance that you think uses more power than the blender. Be sure to explain your reasoning.

Answers

Answer:

Part a: The tag lists the

(voltage)

(V) that the appliance runs at and its

(power)

in watts (W). According to the tag, Dorian's blender uses  (120)

watts of power.

so your answers are voltage, then power, then 120.

c.

b.

b.

Part B:

One appliance that uses less power Then I blender would probably be a microwave. This is because you need to have electricity moving rapidly to move the blades in a blender compared to the microwave which you just need to keep a steady pace. One appliance that I think would use more power than a blender would definitely be an oven. This is because It does use steady current power just like the microwave but it uses it for way longer which takes up more power than rapid power in a blender for a short time.

Explanation:

For example, 150 watts (blender) and 300 watts (oven) have a 150-watt difference, sort of like subtraction in some cases!

Hope This Helps!!

:)

Which header will be the largest?

Hello

Hello

Hello

Hello

Answers

Answer:  

Bye

bye

bye

bye

Explanation:

Answer:

HELLO Hello thank you for your points...

In the code snippet below, pick which instructions will have pipeline bubbles between them due to hazards.

a. lw $t5, 0($t0)
b. lw $t4, 4($t0)
c. add $t3, $t5, $t4
d. sw $t3, 12($t0)
e. lw $t2, 8($t0)
f. add $t1, $t5, $t2
g. sw $t1, 16($t0)

Answers

Answer:

b. lw $t4, 4($t0)

c. add $t3, $t5, $t4

Explanation:

Pipeline hazard prevents other instruction from execution while one instruction is already in process. There is pipeline bubbles through which there is break in the structural hazard which preclude data. It helps to stop fetching any new instruction during clock cycle.

Circle class
private members
double radius
double xPos
double yPos
public members
double diameter()
get the diameter of the Circle. It returns a value, diameter.
double area()
calculate the area of the Circle
double circumference()
calculate the circumference of the circle
double getRadius()
returns the radius
double getX()
returns the xPos value
double getY()
returns the yPos value
void setX(double x)
sets xPos, no requirements
void setY(double y)
sets yPos, no requirements
double distanceToOrigin()
returns the distance from the center of the circle to the origin
HINT: Find out how to calculate the distance between two points and recall the origin is at (0,0)
bool insersect(const Circle& otherCircle)
Take another Circle by const reference (see more notes below)
Returns true if the other Circle intersects with it, false otherwise
bool setRadius(double r)
sets the radius to r and returns true if r is greater than zero, otherwise sets the radius to zero and returns false
Remember, you will need a header file (.h) and an implementation file (.cpp)
You'll also need to update your Makefile
NOTE: The Circle class should not do any input or output.
CircleDriver class
private members
Circle circ1;
Circle circ2;
void obtainCircles()
Talk with the user to obtain the positions and radii for two Circles from the user. Repeats prompts until the user gives valid values for the radii
It does not validate the values, but rather checks the return value from a call to Circle's setRadius method
void printCircleInfo()
Prints the following information about each of the Circles to the screen:
The location of the Circle's center (xPos, yPos), the distance from the origin, each area, circumference, diameter
Lastly print whether or not the two circles intersect
Sample output from printCircleInfo().
Information for Circle 1:
location: (0, 50.0)
diameter: 200.0
area: 31415.9
circumference: 628.318
distance from the origin: 50.0
Information for Circle 2:
location: (50.0, 0)
diameter: 200.0
area: 31415.9
circumference: 628.318
distance from the origin: 50.0
The circles intersect.
public membersvoid run()
run merely calls all the other methods. Here's your definition for run()
//This will go in your CircleDriver.cpp
void CircleDriver::run()
{
obtainCircles();
printCircleInfo();
}
main
Main does very little. In fact, here is your main:
int main()
{
CircleDriver myDriver;
myDriver.run();
return(0);
}

Answers

Answer:

What was the actual the question? I am confused.

Explanation:

Is there any difference beetween the old version of spyro released on the origional and the newer ones??? or is it only change in graphix does that mean that the game had to be remade to fit a new console?

Answers

Answer:

yes and no.

Explanation:

the graphics have changed, but there have also been remastered versions of spyro and completely new spyro games

i recommend playing spyros reignited trilogy its three newer spyro games for console

Of the following field which would be the most appropriate for the primary key in a customer information table?

A: Customer Name B: Customer Number C: Phone Number D: Customer Address

Answers

Answer:

Customer Number

Explanation:

Suppose a TCP segment is sent while encapsulated in an IPv4 datagram. When the destination host gets it, how does the host know that it should pass the segment (i.e. the payload of the datagram) to TCP rather than to UDP or some other upper-layer protocol

Answers

Answer and Explanation:

A host needs some datagram where TCP is encapsulated in the datagram and contains the field called a protocol. The size for the field is 8-bit.

The protocol identifies the IP of the destination where the TCP segment is encapsulated in a datagram.

The protocol field is 6 where the datagram sends through TCP and 17 where the datagram is sent through the UDP as well

Protocol with field 1 is sent through IGMP.

The packet is basic information that is transferred across the network and sends or receives the host address with the data to transfer. The packet TCP/IP adds or removes the field from the header as well.

TCP is called connection-oriented protocol as it delivers the data to the host and shows TCL receives the stream from the login command. TCP divides the data from the application layer and contains sender and recipient port for order information and known as a checksum. The TCP protocol uses the checksum data to determine that data transferred without error.

Explain the five generations of computer

Answers

Answer:

1 First Generation

The period of first generation: 1946-1959. Vacuum tube based.

2 Second Generation

The period of second generation: 1959-1965. Transistor based.

3 Third Generation

The period of third generation: 1965-1971. Integrated Circuit based.

4 Fourth Generation

The period of fourth generation: 1971-1980. VLSI microprocessor based.

5 Fifth Generation

The period of fifth generation: 1980-onwards. ULSI microprocessor based.

The phrase "generation" refers to a shift in the technology that a computer is/was using. The term "generation" was initially used to describe different hardware advancements. These days, a computer system's generation involves both hardware and software.

Who invented the 5th generation of computers?

The Japan Ministry of International Trade and Industry (MITI) launched the Fifth Generation Computer Systems (FGCS) initiative in 1982 with the goal of developing computers that use massively parallel computing and logic programming.

The generation of computers is determined by when significant technological advancements, such as the use of vacuum tubes, transistors, and microprocessors, take place inside the computer. There will be five computer generations between now and 2020, with the first one starting around 1940.

Earlier models of computers (1940-1956)Computers of the Second Generation (1956-1963)Computers of the Third Generation (1964-1971)Computers of the fourth generation (1971-Present)Computers of the fifth generation

Learn more about generations of computers here:

https://brainly.com/question/9354047

#SPJ2

11. First featured in Donkey Kong, the jump button let to the creation of a new game category known as __________
a) the jumper
b) the performer
c) the platformer
d) the actioner

Answers

Answer:

C

Explanation:

what is the output of this line of code?
print("hello"+"goodbye")
-"hello"+"goodbye"
-hello + goodbye
-hello goodbye
-hellogoodbye

Answers

The first one
“hello” + “goodbye”

Answer:

“hello” + “goodbye”

Explanation:

Write a program that creates a list (STL list) of 100 random int values. Use the iterators to display all the values of the list in order and in reverse order. Use the sort function to sort the list of values and output the list. g

Answers

Answer:

The program is as follows:

#include <bits/stdc++.h>

#include <iostream>

using namespace std;

int main(){

  list <int> myList;

  for(int i=0;i<100;i++){  

      myList.push_back(rand()%100);       }

   list <int> :: iterator it;

   cout<<"Forward: ";

   for(it = myList.begin(); it != myList.end(); ++it){

       cout <<*it<<" ";    }

   

   cout<<"\nReversed: ";

   std::copy(myList.rbegin(),myList.rend(),std::ostream_iterator<int>(std::cout, " "));

        myList.sort();  

   cout<<"\nSorted: ";

   for(it = myList.begin(); it != myList.end(); ++it){

       cout <<*it<<" ";    }

   return 0;

}

Explanation:

This declares the list

  list <int> myList;

The following iteration generates 100 random integers into the list

  for(int i=0;i<100;i++){  

      myList.push_back(rand()%100);       }

This initializes an iterator

   list <int> :: iterator it;

This prints the header "Forward"

   cout<<"Forward: ";

This iterates through the list and prints it in order

   for(it = myList.begin(); it != myList.end(); ++it){

       cout <<*it<<" ";    }

    This prints the header "Reversed"

   cout<<"\nReversed: ";

This uses ostream_iterator to print the reversed list

   std::copy(myList.rbegin(),myList.rend(),std::ostream_iterator<int>(std::cout, " "));

This sorts the list in ascending order

        myList.sort();

This prints the header "Reversed"  

   cout<<"\nSorted: ";

This iterates through the sorted list and prints it in order

   for(it = myList.begin(); it != myList.end(); ++it){

       cout <<*it<<" ";    }

Which are examples of ribbon customizations?

linking Ribbon categories, rearranging Ribbon commands, replacing Ribbon drop-down menus
replacing Ribbon drop-down menus, adding new Ribbon tabs, deleting Ribbon tools
renaming Ribbon tabs and categories, adding new Ribbon tabs, rearranging Ribbon commands
rearranging Ribbon commands, replacing Ribbon drop-down menus, deleting Ribbon tools

Answers

Answer:the third one

Explanation:

what is the rate of defualt frame?​

Answers

Answer:

the default frame rate is based on the frame rate of the display ( here also called *refresh rate" which is set to 60 frames per second on the most computers. A frame rate of 24 frames per second (usual for movies) or above will be enough for smooth animations

describe how sodium ammonium chloride can be separated from a solid mixture of ammonium chloride and anhydrous calcium chloride​

Answers

Answer:

There are way in separating mixtures of chlorides salts such as that of sodium chloride and ammonium chloride. It can be done by crystallization, filtration or sublimation. If we want to separate the mixture, we have to heat up to 330-350 degrees Celsius and collect the gas that will be produced.

What is the result of executing the following code? You can assume the code compiles and runs. #include using namespace std; void factorial(int n) { cout << n << '*'; factorial(n-1); } int main() { factorial(4); return 0; }

Answers

Answer:

The result of executing the code is 24.

Explanation:

Factorial of a number:

The factorial of a number is the multiplication of a number by all it's previous numbers until one. For example:

0! = 1

1! = 1

2! = 2*1 = 2

3! = 3*2*1 = 6

4! = 4*3*2*1 = 24

In this question:

This is a C++ code, which is a recursive function to calculate a factorial of a number.

The input, given by factorial(4), is 4, so the result of executing the code is 24.

cout << n << '*'; factorial(n-1);

This means for each input, until n = 1, the output is the factorial of the number. This is the recursive function.

Please assist with the following questions:
2. Many successful game companies have adopted this management approach to create successful and creative video games.
a) Creating a creative and fun workspace for employees
b) Offering free lunches and snacks.
c) Having a good design idea to start with.
d) Having enough material and human resources to work with.

4. The concept of high score was first made popular in which of the following games?
a) Pong
b) Space Invaders
c) Pac-Man
d) Magnavox Odyssey

5. Which of the following people is credited with creating the first successful video game?
a) Al Alcorn
b) Ralph Baer
c) Shigeru Miyamoto
d) Nolan Bushnell

7. Zork featured a tool which allowed players to write commands in plain English called _____.
a) language parser
b) language commander
c) zork speech
d) Babble fish

Answers

Answer:

c. A. D.B.

Explanation:

6. Which of the following games will most likely appeal to a casual player?
a) Wii Sport
b) Contra
c) Farmville
d) Both A and C

Answers

Answer:

A

Explanation:

Wii sports is a good game for a casual player. :)

15. Feelings (maps, coins, clues, etc.) and the invisClue books were some innovative ways used to keep __________ players engaged with the game when not playing.
a) Smirk
b) zork
c) The Legend of Zelda
d) Pong

Answers

Answer:

pong i could be wrong i think its right tho

Explanation:

Pong i thinks its right

Write a script called pow.sh that is located in your workspace directory to calculate the power of two integer numbers (e.g. a ^ b); where a and b are passed as parameters from the command line (e.g. ./pow.sh 2 3). The result should be echoed to the screen as a single integer (e.g. 8).

Answers

Answer:

#! /usr/bin/bash

echo $[$1**$2]

Explanation:

(a) The first line of the code is very important as it tells the interpreter where the bash shell is located on the executing computer.

To get this on your computer, simply:

1. open your command line

2. type the following command: which bash

This will return the location where the bash shell is. In this case, it returned

/usr/bin/bash

(b) The second line is where the actual arithmetic takes place.

The variables $1 and $2 in the square bracket are the first and second arguments passed from the command line. The ** operator raises the left operand (in this case $1) to the power of the second operand (in this case $2).

Then, the echo statement prints out the result.

(c) Save this code in a file named as pow.sh then run it on the command line.

For example, if the following is run on the command line: ./pow.sh 2 3

Then,

the first argument which is 2 is stored in $1 and;

the second argument which is 3 is stored in $2.

The arithmetic operator (**) then performs the arithmetic 2^3 which gives 8.

Write a script called fact.sh that is located in your workspace directory to calculate the factorial of a number n; where n is a non-negative integer between 1 and 20 that is passed as a parameter from the command line (e.g. ./fact.sh 5). The result should be echoed to the screen as a single integer (e.g. 120).
NOTE: Do not include any other output, just output the single integer result.
Submit your code to the auto-grader by pressing Check-It!
NOTE: You can submit as many times as you want up until the due date.

Answers

Answer:

hope this helps

Explanation:

In an employee database, an employee's ID number, last name, first name, company position, address, city, state, and Zip Code make up a record. true false

Answers

Answer:

false

Explanation:

Other Questions
A pickup truck traveled 12 miles in the same amount of time it took a school bus to travel 8 miles along the same route. The school bus was traveling 15 miles per hour slower than the pickup truck. Write and solve a rational equation that can be used to determine how fast was each vehicle traveling. pickup truck's speed: mph bus's speed: mph https://www.biomanbio.com/HTML5GamesandLabs/LifeChemgames/bioagentshortpage.html THIS LINK IS A LINK TO THE WEBSITEHELP ANSWER THESE QUESTIONS CalculatorThe ages of people at a concert are normally distributed with a mean of 24 years and a standard deviation of 3.2years.What is the age of a concert attendee with a z-score of -1.32Enter your answer, rounded to the nearest tenth, in the box.years convert 23pi/12 into degrees Please give answers Spanish 2 Mandatos formalesWrite formal commands based on the elements provided. Include the object pronouns in your answers. If you are on offense but do not have the ball, what should you be doing? Can you help me on both of this problems Find the percent of increase from 40 gallons to 89 gallons. Round to the nearest tenth of a percent if necessary.percent of increase? A recipe includes 6 cups of flour and 3 cup of shortening. Write the ratio of the amount of flour to the amount of shortening as a fraction in simplest form any two way to prevent asthma The Asian elephant is an endangered species with a current population of 45,000. This species is said to be experinceing a decline of 4.5% per year. After how many years should we expect the Asian elephant poputation ot be approximately 35,746? Si Cervantes muri el ao antes de la publicacin de su obra Los trabajos de Persiles y Seguismunda En qu aomuri Cervantes?1616C. 1613b. 1614d. 1617a.Please select the best answer from the choices provided A fox and an owl both eat forest mice. Which type of relationship does the fox have with mice?parasitismmutualismcommensalismcompetitionpredation6) Select the best answer.A type of green algae lives on the back of a spider crab. The algae gets a place to live and the spider crab gets camouflaged by the green algae. Which type of relationship does the algae have with the spider crab?predationcommensalismmutualismparasitismcompetition quick answer plz [tex]{ \huge {\underline {\underline {\mathtt {\gray{question : }}}}}}[/tex][tex] \sqrt{ \dfrac{0}{999} } [/tex] Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.This is an excerpt from You drop a 10 kg bowling ball off a 2 story building, what is the force generated bythe bowling ball when it hits the ground Real answer please and thanksWhy is it so much easier for others to find one specific job and I can't even narrow down my choices by a bit when it comes to a career?I don't know I think about random stuff like this all the time.() () Hi! I immediately need help with number 1 - 5. I put the questions for anyone who might be confused with what I need help on, all I need is the answers to them. By the way these are multiple choice questions that's all I need help with. It would be easier if you would just put the letters to whatever answer it might be like for example: number 1 would be A. There are also images I uploaded. I will Mark brainly. I won't be able to do it as soon as possible but thank you for your help and I really would appreciate it I will Mark brainly as quick as I can. Sorry if I sound a little too desperate lol Francois fastened upon him an arrangement of straps and buckles. It was a harness, such as he had seen the grooms put on the horses at home. And as he had seen horses work, so he was set to work, hauling Francois on a sled to the forest that fringed the valley, and returning with a load of firewood. Though his dignity was sorely hurt by thus being made a draught animal, he was too wise to rebel. He buckled down with a will and did his best, though it was all new and strange.The Call of the Wild,Jack LondonWhich sentence best supports the prediction that Buck will continue to fight against being a sled dog?His dignity was sorely hurt by thus being made a draught animal.And as he had seen horses work, so he was set to work.Francois fastened upon him an arrangement of straps and buckles.He buckled down with a will and did his best. How did the Inca empire use roads?Only the nobles used roads to travel.The merchant class used roads for trade.The armies used roads to travel quickly.The Inca used roads to cross deep canyons.