1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
3 years ago
9

THis took FOREVER! please go check it out, if you have seen my demo to this game, you will like the full version! https://scratc

h.mit.edu/projects/485122429/
Computers and Technology
2 answers:
KonstantinChe [14]3 years ago
8 0

Answer:

The game is great  good job!!

Explanation:

skad [1K]3 years ago
5 0

Answer:

Sure! I'll comment in the comments of this answer on how it was <3

You might be interested in
True are fulse A piece of information that is considered common knowledge does not need a citation
antiseptic1488 [7]
False common knowledge<span> and must always be </span>cited<span>.</span>
4 0
2 years ago
Read 2 more answers
I only want someones opinion on this not anything you would find in a book.
Hoochie [10]
As a missile training device in the 80s to help train the anti missile defense personnel to take down nuclear missiles.
4 0
3 years ago
Which sentence is an example of an I-statement?
g100num [7]
Where are the answer choices?
3 0
3 years ago
A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
Black_prince [1.1K]

Answer:

A(n)  <u>Cipher</u> or crypto-system is an encryption method or process encompassing the algorithm, key(s) or crypto-variable(s), and procedures used to perform encryption and decryption.

Explanation:

  • Cryptography is such a technique that is used for the secure transfer of the information. We make codes for this purpose.
  • Cryptosystem is such a system in cryptography is simply an encryption method that has three algorithms. One algorithm is used for the generation of key, one for encryption and decryption.
  • Encryption is a process of converting the information in a data that is not understandable and decryption, this non-understandable data is converted into information so that we can read it.  
3 0
3 years ago
What will be the value of ans after the following code has been executed?
Lesechka [4]

Answer:

Option B 120

Explanation:

There are three variables,<em> ans, x </em>and <em>y</em> given in the code. In beginning, the variable. <em>ans,</em> holds value of 10.  And variable <em>x</em> and <em>y</em> hold value of 65 and 55, respectively. Since the value held by x is bigger than one held by y, the if condition is met and the statement ans = x + y will run. The execution of this statement will total x with y -> 65 + 55 and the initial value of <em>ans is </em>overwritten by the addition result which is 120.

7 0
3 years ago
Read 2 more answers
Other questions:
  • This provides an easy method for workers to use their computers.
    11·2 answers
  • What is an accessory?
    6·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • Sharing a workbook helps to complete ________ (A, tasks) (B,changes) (C, typing) on time. Multiple people acssessing the workboo
    9·1 answer
  • Insert a function in cell g5 to calculate the first student's monthly payment, using appropriate relative and absolute cell refe
    13·1 answer
  • What functions do these WLAN applications and tools perform on WLANs: airmonng, airodump-ng, aircrack-ng, and aireplay-ng
    10·1 answer
  • Finding information on the Web is easy thanks to _____________, which provide on-screen menus, making navigation of the web as s
    11·1 answer
  • Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router is una
    7·1 answer
  • I just wanna know how many times a day y'all hit the tutor button at the bottom
    10·2 answers
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!