1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
10

What is “centrifugal bumble puppy”? why is it important for games to require a complicated apparatus?

Computers and Technology
2 answers:
kirill115 [55]3 years ago
7 0

Centrifugal Bumble Puppy is a game in which a bunch of kids throw a ball on top of a steel tower, the ball rolls into the interior, and onto a rotating disk and is hurled through one or other of the numerous apertures, and is meant to be caught. The purpose of games these days is to require complicated apparatus; something that needs to be bought in order to increase consumption. In this case, machinery is needed for the game.

MrMuchimi3 years ago
3 0
The understudy visit goes outside where they observe a few kids playing a round of Centrifugal Bumble-puppy. The diversion is intricate and requires complex hardware. They discover that the overwhelming dependence on hardware builds utilization of material products and consequently help the economy.
You might be interested in
(in c++):
Ganezh [65]

The program is an illustration of string manipulations

<h3>What are string manipulations?</h3>

String manipulations include calculating the lengths of strings and also performing several operations on the string

<h3>The actual program</h3>

The complete program in C++ is as follows:

#include <iostream>

using namespace std;

int main(){

   string passwordStr;

   cin>>passwordStr;

   if(passwordStr.length() <= 7){

       cout<<"Valid";

   }

   else{

       cout<<"Invalid";

   }

  return 0;

}

Read more string manipulation at:

brainly.com/question/14284563

6 0
2 years ago
Some files appear dimmed in one of the default folders on your computer. What would be the best course of action?
Wittaler [7]
It appears that they might be labeled "Hidden" in the properties of that file. Right Click on Properties and Uncheckmark Hidden<span />
7 0
3 years ago
Uter 110 Marks )
Alexxandr [17]

Answer:

Sent me a message that I was paying R319 for the

4 0
3 years ago
As our use of the internet increases e-safety becomes essential.<br> Discuss why e-safety is needed.
nlexa [21]

Answer:

The answer is described below

Explanation:

E safety means means protection of private information and personal safety when using the internet. E safety involve the protection of private information, passwords against identity theft or property theft. A persons  private information, passwords can be gotten through the use of phishing or malwares.

Also, the use of internet has exposed people to cyber bullying(i.e abuse of an individual), stalking, engaging underage children into sexual relationships and sextortion.

E safety  help protect children from harmful content and services as those listed.

8 0
3 years ago
In this exercise you will debug the code which has been provided in the starter file. The code is intended to take two strings,
vampirchik [111]

Answer:

Here is the corrected program:

import java.util.Scanner; //to accept input from user

public class 02_14_Activity_one { //class name

    public static void main(String[] args) { //start of main method

    Scanner scan = new Scanner(System.in); //creates Scanner class object

  System.out.println("Enter first string"); //prompts user to enter first string

          String s1 = scan.nextLine(); //reads input string from user

  System.out.println("Enter second string"); //prompts user to enter second string

          String s2 = scan.nextLine(); //reads second input string from user

    System.out.println("Enter number of letters from each word"); //enter n

          int n = scan.nextInt(); //reads value of integer n from user

          System.out.println(s1.substring(0,n) + s2.substring(s2.length() - n ));

         } } //uses substring method to print a string made up of the first n letters of s1 and the last n letters of s2.

Explanation:

The errors were:

1.

Scanner scan = Scanner(System.in);

Here new keyword is missing to create object scan of Scanner class.

Corrected statement:

 Scanner scan = new Scanner(System.in);

2.

String s1 = nextLine();  

Here object scan is missing to call nextLine() method of class Scanner

Corrected statement:

String s1 = scan.nextLine();

3.

String s2 = Scanner.nextLine();

Here class is used instead of its object scan to access the method nextLine

Corrected statement:

String s2 = scan.nextLine();

4.

String n = scan.nextLine();

Here n is of type String but n is a whole number so it should be of type int. Also the method nextInt will be used to scan and accept an integer value

Corrected statement:

int n = scan.nextInt();

5.

System.out.println(s1.substring(1,n-1) + s2.substring(s1.length()-n));

This statement is also not correct

Corrected statement:

System.out.println(s1.substring(0,n) + s2.substring(s2.length() - n ));

This works as follows:

s1.substring(0,n) uses substring method to return a new string that is a substring of this s1. The substring begins at the 0th index of s1 and extends to the character at index n.

s2.substring(s2.length() - n ) uses substring method to return a new string that is a substring of this s2. The substring then uses length() method to get the length of s2 and subtracts integer n from it and thus returns the last n characters of s2.

The screenshot of program along with its output is attached.

7 0
3 years ago
Other questions:
  • An effective team would never have​
    9·1 answer
  • Some cars are 100 percent efficient at converting energy from gasoline to energy of motion.
    11·2 answers
  • Whats my screen name?
    9·2 answers
  • Is the cell phone changing our views about polite and impolite behavior? For example,
    15·2 answers
  • What are three ways to call attention to the text on a web page?
    6·2 answers
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • Friedman (1999) argues that "we are wrong to base health promotion in all societies on a Western framework for human development
    11·1 answer
  • Which of the following is not part of the four ways you can avoid problems with email communication?
    12·1 answer
  • Use the drop-down menus to explain what happens when a manager assigns a task in Outlook.
    6·2 answers
  • A cookie is stored on your device's memory or disk in what file format? 1.)video file
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!