1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
2 years ago
14

Write a program that represents a popular kid’s toy that teaches them about different shapes and colors.

Computers and Technology
1 answer:
SVEN [57.7K]2 years ago
7 0

Answer:

blue circle

Explanation:

You might be interested in
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
2 years ago
Trying to make the baseplate red and turn off can collide then the game waits 5 seconds and turns on can collide, making the bas
kenny6666 [7]

Answer:

Explanation:

yes

but dont forget to call makeBasePlateGreen

maybe you would call it at the end of the program?

by the way you have a typo at the end

make the O lowercase

myBlasePlate.BrickColor = BrickColor.Green()

and then add this to the end

makeBasePlateGreen()

so you call the function and actually use it.

4 0
2 years ago
Write the following numbers in binary. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25
AfilCa [17]
0 1 10 11
Explanaition:
4 0
2 years ago
Which of these might be an example of an advertisers target group
Eduardwww [97]
Where are the examples?

3 0
3 years ago
Select all the correct answers.
inysia [295]

Answer:

Buyers can source products from anywhere in the world.

Your purchases are delivered to the location you specify.

Explanation:

E-commerce refers to the process of buying and selling goods and services through the internet or the virtual world. The economic and business transaction done through this process constitutes electronic commerce or e-commerce.

Two advantages for buyers are that the <u>buyer can source the goods and products from all over the world and also get them delivered at the location specified</u>. This allows for an easy and effortless transaction and also saves the buyer's time and energy. With things available at just a touch of an electronic screen, the buyer can get products from anywhere and get them delivered at his/ her doorstep or for that matter, anywhere he/she wished it delivered, with no extra effort from his side.

Thus, the correct answers are the third and fourth options.

4 0
2 years ago
Other questions:
  • "the file that specifies how netbeans builds and deploys the application when you run the application is called the ____________
    8·1 answer
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • Write a method called printRange that accepts two integers as arguments and prints the sequence of numbers between the two argum
    6·1 answer
  • my airpods just do not seem to connect if i try to pair them, reset them, they have this continuous green light, please help me
    12·1 answer
  • Create a datafile called superheroes.dat using any text-based editor, and enter at least three records storing superheroes’ name
    9·1 answer
  • How do you determine which type of operating system that best supports your computer or mobile device?
    5·1 answer
  • The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1
    11·1 answer
  • 12. When computer professionals take on jobs, they may not enter into relationships with which of the
    6·1 answer
  • Software that requires excessive disk space or memory.
    15·1 answer
  • Explain how files can be identified as entities on the magnetic surface?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!