1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
13

Is anyone a robIox moderator?

Computers and Technology
2 answers:
vaieri [72.5K]3 years ago
6 0

Answer:

Why would you need a Rob-lox mod to help you make a game?

You got this! Just put you and your friends creativity and you'll make one of the best games in the world! :)

I am not a mod, so sorry I couldn't help you.

Explanation:

I used the - in the middle of ROB-LOX because I wouldn't be able to submit my answer.

alexandr402 [8]3 years ago
3 0
Sry but I hope u have a great Christmas
You might be interested in
A person who has a been exposed to technology at a young age is?
Dahasolnce [82]
Ok if lets say a young child at the age of like 6-7 was allowed to play grand theft auto by his/her parents maybe the child would understand incorrectly and start doing what the people do in the game this may cause to serious trouble jail time or even death. In this case dont let your kids play underrated games or watch underrated movies.
Hope that helped you understand more.
7 0
4 years ago
In reference to computer communications, what does the term noise mean?
jeka94
Noise usually means static.
6 0
3 years ago
Read 2 more answers
How do you find the exterior angle measure of any regular polygon? (The degree in which to turn the turtle to draw a shape)
Diano4ka-milaya [45]

Answer:

360/number of sides

Explanation:

all the exterior angles add up to 360°

so to find each angle mesure, divide the 360 by the number of sides the figure has.

7 0
3 years ago
Write a function with this prototype:
sp2606 [1]

Answer:

Following are the code to this question:

#include <iostream> //defining header file  

using namespace std;

void numbers(ostream &outs, const string& prefix, unsigned int levels); // method declaration

void numbers(ostream &outs, const string& prefix, unsigned int levels) //defining method number

{

string s; //defining string variable

if(levels == 0) //defining condition statement that check levels value is equal to 0

{

outs << prefix << endl;  //use value

}

else //define else part

{

for(char c = '1'; c <= '9'; c++) //define loop that calls numbers method

{

s = prefix + c + '.'; // holding value in s variable  

numbers(outs, s, levels-1); //call method numbers

}

}

}

int main() //defining main method

{

numbers(cout, "THERBLIG", 2); //call method numbers method that accepts value

return 0;

}

Output:

please find the attachment.

Explanation:

Program description:

  • In the given program, a method number is declared, that accepts three arguments in its parameter that are "outs, prefix, levels", and all the variable uses the address operator to hold its value.
  • Inside the method a conditional statement is used in which string variable s and a conditional statement is used, in if the block it checks level variable value is equal to 0. if it is false it will go to else block that uses the loop to call method.
  • In the main method we call the number method and pass the value in its parameter.  

5 0
3 years ago
A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
kondor19780726 [428]

The Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

<h3>The Network Mapper (Nmap) commands.</h3>

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

Read more on penetration test here: brainly.com/question/25813524

6 0
2 years ago
Other questions:
  • Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. Th
    11·1 answer
  • Which one is correct?
    7·2 answers
  • Banking Account
    9·1 answer
  • What is also known as a visual aid in presentation
    15·1 answer
  • What is output? Select all that apply.
    15·1 answer
  • Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his ma
    7·1 answer
  • Using the employment websites, search for part-time jobs that relate to the career fields you are interested in pursuing or to y
    12·2 answers
  • The symbol located to the left of a code number that identifies a code description that has been revised is _____.
    12·1 answer
  • The purpose of Appetizers on the menu​
    6·2 answers
  • Why do relational databases use primary keys and foreign keys?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!