1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
8

Attacker player X is standing still on a corner kick, as the ball is played, he jumps up with his arms flailing above his should

ers to try to head the ball into the goal. He heads the ball and the ball hits his hand by accident and goes into the net. What’s the re-start?
Computers and Technology
1 answer:
Colt1911 [192]3 years ago
5 0

Answer:

Handball

Explanation:

The new football rule disallows a goal scored after a ball hits an attacker or a fellow player on the hand before going into the net. Formerly, if the players does not hand the ball deliberately the goal may stand, but the recent rule totally rules out any goal scored whether the ball hits the hand deliberately or not.

You might be interested in
Why do we need the Domain Name System (DNS)? Given the domain name www.flamingflamingos.eu, what is the top level domain in this
QveST [7]

Explanation:

We need the DNS(Domain Name System) because it connects to the webpage by using an Internet Protocol address and also used to convert the domain name into IP address on the internet.

Top-level domain is .eu

The top-level domain is also known as TLD, and it is the last part of the domain name.

There are 4 different nameservers.

It depends on the internet connection.

When we search for the valid IP address then it will connect us to that webpage whose IP address we search.

8 0
3 years ago
Design and implement an algorithm that gets a list of k integar values N1, N2,...Nk as well as a special value SUM. Your algorit
Fittoniya [83]

Answer:

The algorithm is as follows:

1. Start

2. Input List

3. Input Sum

4. For i = 0 to length of list - 1

4.1 num1 = List[i]

5. For j = i to length of list - 1

5.1 num2 = List[j]

6. If SUM = num1 + num2

6.1 Print(num1, num2)

6.2 Break

The algorithm is implemented in python as follows:

def checklist(mylist,SUM):

     for i in range(0, len(mylist)):

           num1 = mylist[i]

                 for j in range(i+1, len(mylist)):

                       num2 = mylist[j]

                       if num1 + num2== SUM:

                             print(num1,num2)

                                   break;

Explanation:

I'll explain the Python code

def checklist(mylist,SUM):

This line iterates from 0 to the length of the the last element of the list

     for i in range(0, len(mylist)):

This line initializes num1 to current element of the list

           num1 = mylist[i]

This line iterates from current element of the list to the last element of the list

                 for j in range(i+1, len(mylist)):

This line initializes num1 to next element of the list

                       num2 = mylist[j]

This line checks for pairs equivalent to SUM

                       if num1 + num2== SUM:

The pair is printed here

                             print(num1,num2)

                                   break;

6 0
2 years ago
All of the following except one are issues that should be covered in an AUP. Which one is the exception?
Maslowich

Answer:

D) Your computer monitor will not switch on.

Explanation:

A written agreement or a document stipulating constraints and practices that a community computer network or an individual user must agree and adhere to is called an Acceptable Use Policy (AUP). Employees and students are required to sign an AUP when you sign up with an ISP. A good AUP will cover most provisions for network etiquette and indicate clearly the privacy levels of a member. The examples given in the multiple choices above are use cases for AUP apart from option D. If a user is not certain on the actions that should be taken in use cases like these, an AUP should be of great help.

6 0
3 years ago
Name the three basic storage device of a computer​
grigory [225]
Hard disk Drive, random access memory, USB flash memory
7 0
3 years ago
Read 2 more answers
Direct messaging is similar to email, except
fredd [130]
No personal web..............
6 0
3 years ago
Read 2 more answers
Other questions:
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • 10 facts about turbines
    11·2 answers
  • Create a dictionary named letter_counts that contains each letter and the number of times it occurs in string1. Challenge: Lette
    14·1 answer
  • "To take advantage of these developments in the digital world, new approaches, concepts,instruments, and methods are needed, whi
    8·1 answer
  • What's one way to engage teens in technology?
    8·1 answer
  • True or False <br><br> Rootkits are only made by black-hat hackers.
    8·1 answer
  • A chemical mixture that is burned to produce thrust. (Jet engine homework)
    14·2 answers
  • Many bookstores have closed since the rise of the Internet. What type of
    11·1 answer
  • 4.7 Code Practice: Question 2
    7·1 answer
  • What is the optimal number of members for an Agile team?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!