1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anastassius [24]
2 years ago
13

I am trying to code a lifting simulator game on ro-blox. These problems listed in the third picture tells you the problems. If y

ou solve this correctly, this is 15 points.

Computers and Technology
2 answers:
alex41 [277]2 years ago
4 0
Can you explain that a little more i don’t understand like huh what
ipn [44]2 years ago
3 0

Answer:

cool

Explanation:

You might be interested in
- What are the different types of clients?
Nataly_w [17]

Answer: Different types of client are 1. Thick 2. Thin 3.Hybrid

Explanation:

A Thick client, also known as a rich client or fat client, is a client that performs the bulk of any data processing operations itself, and does not necessarily rely on the server.

A thin client is a minimal sort of client. Thin clients use the resources of the host computer.

A hybrid client is a mixture of the above two client models. Similar to a fat client, it processes locally, but relies on the server for storing persistent data.

7 0
3 years ago
Help me. thank you very much
Scilla [17]

Answer:

3425236235623523334252362356235233342523623562352333425236235623523334252362356235233362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233  5623523334252362356235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363425236235623523334252362356235233342523623562352332

Explanation:

342523623562352333425236235623523334252362356235233342523 6235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425 5236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523636235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252363623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233342523623562352333425236235623523334252362356235233

4 0
2 years ago
PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
vagabundo [1.1K]

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question

6 0
3 years ago
How can you have a safe browser experience
goldfiish [28.3K]

Most likely the answer is to delete cookies, as it cuts down on the amount of tracking sites can do to you.

6 0
2 years ago
_____ provide a description of the data characteristics and the set of relationships that link the data found within the databas
Karolina [17]

Answer:

The correct answer to the following question will be "Metadata".

Explanation:

Metadata is "information providing information on other data" This is "data about data", in other words.

There are many subareas of metadata, including:

  • Structural metadata
  • Iscriptive metadata
  • Statistical metadata
  • Reference metadata
  • Administrative metadata

Metadata gives a summary of the features of the data and the collection of relationships that connect the data found in the database.

It defines other details, is a prefix in most uses of computing means "an underlying meaning or description. Very simple document metadata are, for example, creator, date generated and date changed and file size.

Therefore, Metadata is the right answer.

6 0
2 years ago
Other questions:
  • How does Hadoop work? It breaks up Big Data into multiple parts so each part can be processed and analyzed at the same time on o
    5·1 answer
  • A(n) ________ is a special value that cannot be mistaken as a member of a list of data items and signals that there are no more
    9·1 answer
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • Nikolas has a idea that he could use the compressed carbon dioxide in a fire extinguisher to propel him on his skateboard. Nikol
    13·2 answers
  • PrimeFactorization.java: Write a program that begins by reading in a series of positive integers on a single line of input and t
    12·1 answer
  • Select the correct answer.
    7·1 answer
  • If you notice that a worksheet displays columns A, B, C, E, and F, what happened to column D?
    9·1 answer
  • I really need help in this!!!
    11·1 answer
  • The most important preinstalled software is the ______ software that allows you to use the computer the first time you turn it o
    7·1 answer
  • Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!