2) find and discuss an example of an internet source for reliable science information (again, preferably astronomy-related, but it's ok to branch out a bit if you find a really good one). what makes this source reliable, in your view? what methods can/should be used to verify the quality of a science-related web site?

Answers

Answer 1

what makes this source reliable :

      A trustworthy source is one that offers a thorough, well-reasoned theory, argument, or discussion based on solid evidence. Scholarly, peer-reviewed articles or books authored by researchers for the benefit of students and researchers. Extensive bibliography, original research.

         Wikipedia some entries are reliable, some are not - it's up to you to evaluate. The authors are anonymous, so there's no way to determine their expertise, or the expertise of the Wikipedia editor who oversees the entry. Wikipedia editors will post warnings if they think the entry has weaknesses.  Wikipedia entries tend to be conservative, reflecting traditional views over newer research.

         The books and articles in GIL, the library catalogue, or a UGA Library database have been reviewed by scholarly or professional peers/editors. This process increases their likelihood of being trustworthy, fact-checked sources. On the Internet, you can find information on almost any subject. The big question for anyone doing web research is whether or not that information is reliable, up to date, and unbiased. Books, magazines, and journal and newspaper articles must adhere to stricter quality control standards, and it is usually easy to determine when print material was published, who published it, and whether or not the information is reliable. It's not quite like that with web-based information. Anyone can create a website, and there are usually no standards in place to assess the quality and accuracy of the information. Internet sources may or may not go through a fact-checking or editorial process. You must determine your own dependability. When evaluating a website, six criteria should be used: authority, accuracy, objectivity, currency, coverage, and appearance.

To learn more about source reliable refer :

https://brainly.com/question/27131572

#SPJ4

Answer 2

A trustworthy source is one that offers a thorough, well-reasoned theory, argument, or discussion based on solid evidence

what makes this source reliable : A trustworthy source is one that offers a thorough, well-reasoned theory, argument, or discussion based on solid evidence. Scholarly, peer-reviewed articles or books authored by researchers for the benefit of students and researchers. Extensive bibliography, original research.The books and articles in GIL, the library catalogue, or a UGA Library database have been reviewed by scholarly or professional peers/editors. This process increases their likelihood of being trustworthy, fact-checked sources. On the Internet, you can find information on almost any subject. The big question for anyone doing web research is whether or not that information is reliable, up to date, and unbiased. Books, magazines, and journal and newspaper articles must adhere to stricter quality control standards, and it is usually easy to determine when print material was published, who published it, and whether or not the information is reliable. It's not quite like that with web-based information.Anyone can create a website, and there are usually no standards in place to assess the quality and accuracy of the information. Internet sources may or may not go through a fact-checking or editorial process. You must determine your own dependability. When evaluating a website, six criteria should be used: authority, accuracy, objectivity, currency, coverage, and appearance.

To learn more about source reliable refer to :

brainly.com/question/27131572

#SPJ4


Related Questions

During the bench press a lifter may double bounce the bar at the bottom of the lift as long as the press command has not been given. True False

Answers

The given statement "During the bench press, as long as the press command hasn't been given, a physical athlete, the lifter, may double bounce the bar at the bottom of the lift" is false because the lifter must wait for the head judge to give the press command before pressing the bar back up.

In powerlifting, the bench press is one of the three competition lifts, along with the squat and the deadlift. The bench press is a test of upper body strength, in which the lifter lies on a bench and lifts a barbell from the chest to arm's length above the chest.

During the bench press, the lifter must bring the bar down to their chest and pause until the bar is motionless on the chest. At this point, the lifter must wait for the head judge to give the press command before pressing the bar back up. The press command indicates that the lifter can begin the upward motion of the bar.

According to the rules of powerlifting, a lifter is not allowed to double bounce the bar during the bench press, regardless of whether or not the press command has been given. The bar must come to a complete stop on the lifter's chest before it can be pressed back up, and any bouncing or rebounding of the bar is not allowed.

Once the bar is motionless on the lifter's chest, the lifter must wait for the head judge to give the press command before pressing the bar back up. Failing to wait for the press command or bouncing the bar during the bench press can result in the lift being disqualified.

Learn more about physical athlete here:

https://brainly.com/question/13490156

#SPJ11

what is bit and byte in computer​

Answers

A bit is the smallest unit of information a byte is to see how many bits need to be represented (letters/characters)

Hope this helps

which nec article covers premises-powered optical fiber-based broadband communications systems that provide any combination of voice, video, data, and interactive services through an optical network terminal?

Answers

In NEC, Article 840 covers premises-powered optical fiber-based broadband communications systems that provide any combination of voice, video, data, and interactive services through an optical network terminal (ONT).

The National Electrical Code (NEC) is a regionally adoptable standard for the safe installation of electrical wiring and equipment in the United States. It is part of the National Fire Codes series that is published by the National Fire Protection Association (NFPA).

An optical network terminal (ONT) is a piece of customer premises equipment (CPE) that connects to an optical network that provides Ethernet services to end users. The ONT converts optical signals to electrical signals and vice versa. It offers a high-speed internet connection, as well as phone and video services.

You can learn more about National Electrical Code (NEC) at: brainly.com/question/30757813

#SPJ11

Elton started his own tree trimming business. When a tree limb accidentally fell on a customer’s house, they sued Elton for a million dollars and won. Elton lost everything in the lawsuit—his home, his car, and his life savings. What type of business structure did Elton MOST likely use?

A.
limited liability partnership (LLP)

B.
limited liability company (LLC)

C.
corporation

D.
sole proprietorship

Answers

Answer:

D

Explanation:

What is computer task bar

Answers

Answer:

It is a bar where you can see all of your tasks or pinned items.

Explanation:

it is the small bar across the bottom of your computer screen with pinned apps or tabs, usually white

How does a cell phone change the
incoming signals from a caller into sound that
you can hear

Answers

Answer:

they send electrical signals to the buzzer. The buzzer changes those electrical signals into sound. You hear the buzzer sound and know that someone is calling you.

Explanation:

Answer: Cell phone or any electric device you can say changes the electric signal to radio waves at transmitting end which is converted back to electric signal and perceived as sound waves at receiving end

Explanation:

Ramesh goes to market for buying some fruits and vegetables .He

purchases Apple, Mango and Tomato from a shop. Write an algorithm to

help Ramesh find the total amount to be paid to the shopkeeper if he

buys 2 kgs of apples, 2 kgs of mangoes and 1 kg tomatoes.​

Answers

Answer:

The algorithm is as follows

1. Start

2. Input Apple unit price

3. Input Mango unit price

4. input Tomato unit price

5. Total = Apple Price * 2 + Mango Price * 2 + Tomato Price

6. Display Total

7. End

Explanation:

Start the algorithm

1. Start

The next three lines gets input for the price of each fruit

2. Input Apple unit price

3. Input Mango unit price

4. input Tomato unit price

This calculates the total price

5. Total = Apple Price * 2 + Mango Price * 2 + Tomato Price

This displays the total price

6. Display Total

Stop the algorithm

7. End

In C++, user-defined functions can be used to optimize programs for which specific built-in function are not present in any library like iostream, math.
TRUE or FALSE

Answers

The given statement is "In C++, user-defined functions can be used to optimize programs for which specific built-in functions are not present in any library like iostream, math." TRUE.

User-defined functions in C++ allow programmers to create custom functions to perform specific tasks, making it easier to optimize programs when built-in functions in libraries like iostream and math do not meet their requirements. By creating these functions, programmers can improve code readability, maintainability, and efficiency.

A function is a block of code that performs a specific task. Suppose we need to create a program to create a circle and color it. We can create two functions to solve this problem:

a function to draw the circle

a function to color the circle

Dividing a complex problem into smaller chunks makes our program easy to understand and reusable.

There are two types of function:

Standard Library Functions: Predefined in C++

User-defined Function: Created by users

In this tutorial, we will focus mostly on user-defined functions.

C++ User-defined Function

C++ allows the programmer to define their own function.

A user-defined function groups code to perform a specific task and that group of code is given a name (identifier). When the function is invoked from any part of the program, it all executes the codes defined in the body of the function.

To know more about c++ , user defined functions : https://brainly.com/question/14278516

#SPJ11

Name this Cartoon character and just get points I guess because I have no actual questions for the smart people out there so this question can help the people who aren't so smart because it's about cartoons!

Name this Cartoon character and just get points I guess because I have no actual questions for the smart

Answers

Answer:

Baby PEPE

Explanation:

I gave it a name bc its cute

Answer:

BABY PEPE

Explanation:

what are the advantages of using oil paint filter on adobe photoshop?​

Answers

Answer:

The advantage is that your picture can easily be transformed into an amazing painting instantly. Say you want an oil painting of a house. Instead of buy oil paints, and then spending hours painting a house, you can just go on Photoshop, pull up an image of a house and apply the filter.

The harm of stereotypes are likely to be aggravated in

Answers

Answer:

conflict situations

Answer:

B. Conflict situations

Hope this helps!

Explanation:

(Maximum 400 words) Describe how this period of Coronavirus (COVID-19) will influence and affect the STEM (Science, Technology, Engineering, and Mathematics) fields.

Answers

The period of coronavirus will have both negative and positive impacts on STEM fields.

However, the STEM (Science, Technology, Engineering, and Mathematics) fields have shown significant changes and impacts.

Here is how this period of COVID-19 will affect the STEM fields.

1. Technology

The current situation has increased the use of technology in various fields. Remote work and online meetings are becoming more popular, and this has led to increased technology usage. Technological advancements are expected in the future, leading to new business models that are more efficient.

2. Biomedical research

The COVID-19 pandemic has sparked the need for more biomedical research and led to an increase in research funding. Scientists are researching vaccines, treatments, and diagnostic tools, which is expected to lead to a better understanding of viruses and other infectious diseases.

3. Education

The pandemic has affected the education system globally, with many institutions closing and students learning from home. Teachers and educators are now incorporating technology in teaching, and the pandemic has accelerated the adoption of e-learning platforms. This has led to the development of new ways to learn and teach, and new online learning platforms are expected to emerge in the future.

4. Engineering

The pandemic has led to an increase in demand for essential supplies such as ventilators, personal protective equipment (PPE), and other medical devices. This has led to the development of new designs and manufacturing processes that are more efficient. The need for innovation has also led to the development of new solutions, such as 3D printing of medical supplies.

5. Mathematics

Mathematical models are used to understand the transmission of diseases, and the COVID-19 pandemic has led to the development of new models to understand the spread of the virus. These models help policymakers and public health officials make decisions to control the pandemic.

In conclusion, the COVID-19 pandemic has impacted STEM fields significantly, leading to new developments and innovations. With increased technology adoption, biomedical research, e-learning platforms, and engineering, the STEM fields are expected to change and adapt to the new normal. It is crucial to keep up with these changes and find ways to take advantage of the opportunities presented by the pandemic.

learn more about STEM fields here:

https://brainly.com/question/30082530

#SPJ11

In the video game Animal Crossing: New Horizons, villagers are organized by Personality and Hobby.


The 8 Personalities are:


Normal

Lazy

Sisterly

Snooty

Cranky

Jock

Peppy

Smug


The 6 Hobbies are:


Education

Fashion

Fitness

Music

Nature

Playing


Create a program that allows the user to create their own Animal Crossing villager. The user should be able to enter a name, after which the program will choose a random Hobby and Personality for the villager:


"Please enter a Villager Name:

>> Betsy

Betsy is Snooty and into Nature"


The program should store both the Hobbies and Personalities in lists, and when creating a villager it should randomly choose from each list for the personality.



Requirements:

· Both Personalities and Hobbies must be stored in lists

· You must generate a different random number to determine the hobby and personality (that is, don't generate 1 random number and use it for both lists, as that prevents many combinations)

· In randomizing, you should make sure that all combinations are possible (that is, make sure you don't accidentally leave out a personality or hobby from random generation)

· The program shouldn't crash

Answers

The video game program is an illustration of randomization and lists

Randomization involves generating random numbers or selecting random optionsLists are variables that hold multiple values

The video game program

The video game program written in Python, where comments are used to explain each action is as follows:

#This imports the random package

import random

#This creates a list for personalities

Personality = ["Normal","Lazy","Sisterly","Snooty","Cranky","Jock","Peppy","Smug"]

#This creates a list for hobbies

Hobbies = ["Education","Fashion","Fitness","Music","Nature","Playing"]

#This gets input for name

name = input("Please enter a Villager Name: ")

#This generates a random number for personality

personalityNum = random.randint(0, 7)

#This generates a random number for hobbies

hobbiesNum = random.randint(0, 5)

#This prints the the required output

print(name,"is",Personality[personalityNum],"and into",Hobbies[hobbiesNum])

Read more about Python programs at:

https://brainly.com/question/16397886

which of the following would be the best to keep the data on a laptop safe if the laptop is lost or stolen?

Answers

Answer:

two things:

Store all the files in the cloud or store them in your thumb drive (USB)

__________ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.
A) NIDPSs
B) HIDPSs
C) AppIDPSs
D) SIDPSs

Answers

HIDPSs (Host Intrusion Detection and Prevention Systems) are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.

A host-based IDS is an intrusion detection system that monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior. An HIDS gives you deep visibility into what’s happening on your critical security systems. With it, you can detect and respond to malicious or anomalous activities that are discovered in your environment.

On its own, host intrusion detection does not give you a complete picture of your security posture. You must be able to correlate your HIDS log data with other critical security data and with the latest real-world threat intelligence.

AlienVault® Unified Security Management® (USM) eases security analysis and correlation by combining host-based IDS along with network- and cloud-based IDS, and other essential security capabilities in a single,

learn more about Host Intrusion Detection and Prevention Systems here:

https://brainly.com/question/28289473

#SPJ11

D) SIDPSs (Signature-based Intrusion Detection and Prevention Systems) are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations. They analyze network traffic for known attack signatures and take action to prevent or block attacks based on those signatures.

What is SIDPSs ?

SIDPSs (Signature-based Intrusion Detection and Prevention Systems) are security devices that analyze network traffic for known attack signatures and take action to prevent or block attacks based on those signatures. These systems are usually passive devices that can be deployed into existing networks with little or no disruption to normal network operations.

SIDPSs compare traffic against a database of pre-configured signatures or patterns to identify known threats. When a signature match is found, the system can take various actions to prevent or mitigate the threat, such as dropping or blocking the traffic, alerting security personnel, or resetting connections.

While SIDPSs can be effective at detecting and preventing known threats, they may struggle to identify new or unknown attacks that do not match any existing signature in their database. Additionally, attackers may attempt to evade detection by modifying their attack traffic to avoid detection by signature-based systems. As a result, many modern intrusion detection and prevention systems incorporate additional techniques, such as behavior-based analysis or machine learning, to better detect and prevent both known and unknown threats.

To know more about SIDPSs (Signature-based Intrusion Detection and Prevention Systems) visit:

https://brainly.com/question/29738486

#SPJ11

For a Python program that reads every third integer in a list, which arguments of the range function should you specify?

A start, a stop, and a step argument
A start and a stop argument
No arguments
One stop argument

Answers

Answer:

A start, a stop, and a step argument

Explanation:

the range function takes three arguments: a start, a stop, and a step.

Zoey wants to change the margins in her Word document but is not sure how to do it. What tab should she select to find directions?
OHelp
O Home
O Layout
O View

Answers

Answer:

I believe that it is layout

if i don't convert type to outlines in illustrator, does the viewer need to have the fonts installed? Yes/No

Answers

Yes, if you don't convert the type to outlines in Illustrator and the viewer does not have the fonts installed on their computer, the text will not display correctly.

This is because when you create text in Illustrator, it uses the fonts installed on your computer to display the characters. If you send the file to someone who does not have those fonts installed, their computer will substitute a different font, which may not match the original design.

However, if you convert the text to outlines, the font is no longer required and the text will be displayed as a graphic, which can be viewed correctly regardless of the viewer's installed fonts. It's important to note that converting text to outlines can make it more difficult to make edits later, so it's recommended to keep a copy of the original file with the live text intact.

Learn more about fonts here:

https://brainly.com/question/14934409

#SPJ11

what is a subnet means ?

Answers

A subnet, or subnetwork, is a smaller network that is a part of a larger network. It is created by dividing a larger network into smaller sections, each with its own IP address range.

Subnets are used to organize and manage a network, as well as to control the flow of network traffic. For example, a large company may have a network with multiple subnets, each designated for a different department or purpose. This allows for better organization and management of the network, as well as the ability to control access and security for each subnet.

In addition, subnets can also be used to divide a network into smaller sections to improve performance and reduce congestion. By dividing a network into smaller subnets, network traffic can be better managed and controlled, resulting in improved performance and reduced congestion.

In summary, a subnet is a smaller network that is a part of a larger network, used for organization, management, and control of network traffic.

Learn more about subnets: https://brainly.com/question/29527004

#SPJ11

Does white space have visual weight? Yes or No

Answers

Answer:

no. (more info below)

Explanation:

white space appears to have no visual weight because it's seen as empty. Every body put in the room will appear to be heavier because of the volume surrounding it.

hope this helped!

Answer:

no

Explanation:

it's because it appears to be empty.

what is 5ed4 - 07a4 when these values represent unsigned 16-bit hexadecimal numbers?

Answers

When considering the given unsigned 16-bit hexadecimal values 5ed4 and 07a4, their subtraction results in the hexadecimal value 56d0 after converting them to decimal and back to hexadecimal.

The given values are 5ed4 and 07a4. In order to calculate 5ed4 - 07a4 when these values represent unsigned 16-bit hexadecimal numbers, we have to do the following steps: Convert the hexadecimal numbers to decimal.

Subtract 07a4 from 5ed4. Convert the answer back to hexadecimal. The first step is to convert the hexadecimal numbers to decimal. We can use the place-value system to do this. 5ed4 = 5*16³ + 14*16² + 13*16 + 407a4 = 0*16³ + 7*16² + 10*16 + 4.

Evaluating, we get: 5ed4 = 24,05207a4 = 1,956. Now we can subtract 07a4 from 5ed4: 5ed4 - 07a4 = 24,052 - 1,956 = 22,096. Finally, we convert 22,096 back to hexadecimal:22,096 = 56d0.

Therefore, 5ed4 - 07a4 = 56d0 when these values represent unsigned 16-bit hexadecimal numbers.

Learn more about hexadecimal : brainly.com/question/11109762

#SPJ11

EASY QUESTION! WILL MARK BRAINLIEST!
Can somebody please explain what this code does?

EASY QUESTION! WILL MARK BRAINLIEST!Can somebody please explain what this code does?

Answers

The while loop runs while userVal is greater than or equal to 0. Then, the user is asked to enter a positive integer to continue the while loop or enter a negative integer to break out of the while loop. An if statement checks to see if userVal is greater than or equal to 0 and if that's the case, a function named "sumOfDigits" is called, the parameter being userVal. From the name of the function, we can assume it gets the sum of all the digits of a number. The return value of the funciton is added to a variable called sd. Then userVal is checked to see if it is divisible by 5 or three and if this is true, userVal is added to a variable called sumDiv. userVal is checked to see if its prime and if this is the case, 1 is added to the variable cntPrime and the userVal is added to a variable called sumPrime. The while loop will continue asking the user for numbers until the user enters a negative number.

9.4 Code Practice: Your task is to determine whether each item in the array above is divisible

by 3 or not. If an item is divisible by 3, then leave that value as-is in the

array, but if it is not divisible by 3, then replace that value in the array with a

o. Remember that you will need to use modular division from Unit 2 to

determine if a value is divisible by 3. Finally, print out the array in the

format as seen in the sample run below.

(Can someone please help me?)

Answers

Answer:

Explanation:

The following Python code is a function that takes in an array as a parameter, it then loops through the array determining if the element is divisible by 3. If it is it leaves it alone, otherwise it changes it to a 0. Then ouputs the array. A test case is shown in the attached image below using a sample array.

def divisible_by_three(array):

   for x in array:

       if x % 3 == 0:

           pass

       else:

           array[array.index(x)] = 0

   return array

9.4 Code Practice: Your task is to determine whether each item in the array above is divisibleby 3 or

In this exercise we have to use the knowledge of computational language in python to describe the code, like this:

We can find the code in the attached image.

What is an array for?

After wondering what an array is, you might wonder what it's for. The main purpose is to store information in an orderly way, that is, for each line, one piece of information. An example of an array is when storing names of people present in a classroom.

The code can be written more simply as:

def divisible_by_three(array):

  for x in array:

      if x % 3 == 0:

          pass

      else:

          array[array.index(x)] = 0

  return array

See more about python at brainly.com/question/26104476

9.4 Code Practice: Your task is to determine whether each item in the array above is divisibleby 3 or

a company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. the firm sends a team to perform penetration tests to the company network. why would the team use packet sniffers?

Answers

The team from the network security firm would use packet sniffers during the penetration testing of the company's network to capture and analyze the network traffic to identify vulnerabilities and security issues.

Packet sniffers are tools used to intercept and analyze network traffic, allowing the security team to examine the data being transmitted over the network, identify potential security threats and locate security vulnerabilities. By capturing and analyzing the packets, the team can gain insight into the traffic patterns and protocols being used in the network, identify any malicious traffic, and understand the potential impact of an attack on the network. This information can then be used to improve the security of the network by patching vulnerabilities and implementing additional security controls.

To learn more about network security
https://brainly.com/question/28581015
#SPJ11

What is the keyboard shortcut for the Undo command?
Choose the answer.
CTRL+X
CTRL+Z
CTRL+U
CTRL+V​

Answers

Answer:

CTRL+Z is Undo

Explanation:

CTRL+X: Cut

CTRL+Z: Undo

CTRL+U: Underline

CTRL+V: Paste

at the request of management, a senior server engineer deploys a proxy server for all users in the organization. the proxy provides many benefits for a uniform user experience and for it management. of the choices, which statements describe features the proxy provides? (select all that apply.)

Answers

Content Filtering and caching of Web Contents describe the features the proxy provides.

What are the features of proxy?

A proxy server is an intermediary server between the client and the internet.

Proxy servers offer the following basic functionalities:

Firewall and network data filtering.Network connection sharing.Data caching

What is the purpose of proxy and content filtering?

Proxy and content filtering use programs or even firewalls to screen traffic coming and going on the network in an effort to block access to objectionable, questionable, or explicit content.

Which is the purpose of web caching on a proxy server?

Web proxy caching stores copies of frequently accessed Web objects (such as documents, images, and articles) close to users and serves this information to them. Internet users get their information faster, and Internet bandwidth is freed for other tasks.

Thus, content filtering and caching of web content are the correct option.

To know more about proxy server:

https://brainly.com/question/24115426

#SPJ4

how to find the volume of cube in computer in QBASIC program ​

Answers

Answer:

QBasic Programming

REM PROGRAM TO DISPLAY VOLUME OF CUBE. CLS. INPUT “ENTER LENGTH”; L. ...

USING SUB PROCEDURE.

DECLARE SUB VOLUME(L) CLS. INPUT “ENTER LENGTH”; L. ...

SUB VOLUME (L) V = L ^ 3. PRINT “VOLUME OF CUBE ”; V. ...

USING FUNCTION PROCEDURE.

DECLARE FUNCTION VOLUME (L) CLS. ...

FUNCTION VOLUME (L) VOLUME = L ^ 3.

PLS HURRY!!!

which of the following is NOT a benefit of using modules in programming?

A. modules can help break the problem down into smaller pieces

B. modules are reusable

C. modules do not contain syntaxes errors

D. modules save the programmer time instead of rewriting code.

Answers

I believe the answer is c. Modules do contain syntaxes errors
The correct answer is:

C. modules do not contain syntax errors

I have a final project in codehs, where we have to make our own game. I decided to do a game like ping pong, where it hits the paddles and adds points. If you touch the top or the bottom of the screen, you die and it restarts. I need help with adding points, and having it have the “you win”! Screen and restarting the points and positioning the ball in the middle of the screen. Any help would be deeply appreciated. Here’s the code I have :
var PADDLE_WIDTH = 80;
var PADDLE_HEIGHT = 15;
var PADDLE_OFFSET = 10;
var paddle;
var paddle2;
var setPosition;
var rectangle;

var Score;
var point = 0


var setPosition;

var txt = new Text("Can't touch the top or bottom. Get to 20!", "9pt Arial");

var BALL_RADIUS = 15;
var ball;
var dx = 4;
var dy = 4;


function start(){
drawBALL(BALL_RADIUS, Color.black, getWidth()/2, getHeight()/2);
mouseMoveMethod(yay);
paddle = new Rectangle(PADDLE_WIDTH, PADDLE_HEIGHT);
paddle.setPosition(100, 100);
mouseMoveMethod(yay);

Score = new Text("Score : ");
Score.setPosition(0, 35);
add(Score);

txt.setPosition(3, 15 );
txt.setColor(Color.blue);
add(txt);

checkWalls();

paddle2 = new Rectangle(PADDLE_WIDTH, PADDLE_HEIGHT);
paddle2.setPosition(500, 100);
add(paddle2);
}



function drawBALL(BALL_RADIUS, color, x, y){
ball = new Circle (BALL_RADIUS);
ball.setPosition(200, 200);
add(ball);
setTimer(draw, 0);
}

function draw(){
checkWalls();
ball.move(dx, dy);
}



function pop(e){
Score.setText("Score:" + point);

}





function checkWalls(){
if(ball.getX() + ball.getRadius() > getWidth()){
dx = -dx;
if (elem != null) {
dy = -dy;
}
}

if(ball.getX() - ball.getRadius() < 0){
dx = -dx;
if (elem != null) {
dy = -dy;
}
}

if(ball.getY() + ball.getRadius() > getHeight()){
dy = -dy;
if (elem != null) {
dy = -dy;
point = point - 1;
pop();
}

} if(ball.getY() - ball.getRadius() < 0){
dy = -dy;
if (elem != null) {
dy = -dy;
point = point - 1;
pop();
}
}
var elem = getElementAt(ball.getX(), ball.getY() - ball.getRadius());
if (elem != null) {
dy = -dy;
}
elem = getElementAt(ball.getX(), ball.getY() + ball.getRadius());
if (elem != null) {
dy = -dy;
}
}




function yay(e){
paddle.setPosition(e.getX(), getHeight() - 25);
paddle.setColor("#c48ed4");
add (paddle);
paddle2.setPosition(e.getX(), getHeight() - 430);
paddle2.setColor("#c48ed4");
add (paddle2);
}

I have a final project in codehs, where we have to make our own game. I decided to do a game like ping

Answers

Answer:

var elem = getElementAt(ball.getX(), ball.getY() - ball.getRadius());

if (elem != null) {

dy = -dy;

}

elem = getElementAt(ball.getX(), ball.getY() + ball.getRadius());

if (elem != null) {

dy = -dy;

}

}

function yay(e){

Peterson's solution works on modern computer architectures.Select one:a. Trueb. False

Answers

True.

It is true that Peterson's solution works on modern computer architectures. a

Peterson's solution is a classic algorithm for mutual exclusion that works by using two shared variables and busy waiting to prevent multiple threads from accessing a shared resource simultaneously. a

It may not be the most efficient solution for modern multi-core architectures, it can still work on them, and the basic principles of the algorithm are still used in more modern synchronization mechanisms.

It is true that Peterson's solution works on modern computer architectures.

Peterson's approach is a well-known mutual exclusion algorithm that utilises busy waiting and two shared variables to stop several threads from concurrently accessing a resource.

Even though it may not be the most effective solution for contemporary multi-core systems, the algorithm's fundamental ideas are nevertheless applied in more advanced synchronisation techniques.

Peterson's method does indeed function on contemporary computer architectures.

For similar questions on Architecture

https://brainly.com/question/16135742

#SPJ11

Other Questions
what problem was the team presented within this episode? What problem mine they have thought they should solve if they hadnt listen carefully? which of the following statements is true: a. information system (is) and information technology (it) refer to the same concept b. information technology is a subset or component of an information system c. an information system is a subset or component of information technology d. information systems and information technology are not related Since education gets in the way of mental health would it be structural functionalism because of the amount of pressure society and people around us put on us students? Or would it be social conflict or symbolic interaction? Can Someone help me find the value of X newton's method for nonlinear systems why do i get a different answers after choosing a diff initial point The neurons are guided in their migration to their final destination by their attraction to specific ________ what type of ensemble was created out of the need for more sound to fill large dance halls? if you refuse to take a blood alcohol test which law are you violating? News Corp. is a major corporation that owns Fox Broadcasting, Fox News, DirecTV, more than 40 other cable channels, several major newspapers including the Wall Street Journal, several weekly magazines, and a variety of film studios. News Corp. is an example of what media concept which line on the graph below has a slope of 0? I need to know what triangles are similar to ABC! PLEASEEEE HELP THIS IS DUE IN TEN MINS! Determine the t critical value for a two-sided confidence interval in each of the following situations. (Round your answers to three decimal places.) in USE SALT (a) Confidence level = 95%, df = 5 (b) Confidence level = 95%, df = 20 (c) Confidence level = 99%, df = 20 (d) Confidence level = 99%, n = 10 (e) Confidence level = 98%, df = 23 (f) Confidence level = 99%, n = 34 Which of these trials would expect the lactase enzyme to function properly a) milk & water b) milk & lactase solution c) sucrose solution & lactase solution d) milk & lactase solution with acid e) milk & lactase solution (boiled previously)? Write a paragraph that analyzes the results of the indicator test and explain why the enzyme did/did not function. The king or queen has the ultimate authority to make decisions and direct the state in a(n) __________.A.constitutional republicB.constitutional monarchyC.parliamentary republicD.absolute monarchy Your task is to output k elements of equally-spaced ranks (n/k, 2n/k, . . . , (k 1)n/k, n.) You can use k as a parameter in your running time.(A) How fast can you solve it naively using the linear-time median-finding algorithm as a black box? Use k in your running time.(B) Can you do better than that? Hint: Come up with a DNC recurrence on k. Be rigorous with why your recurrence is what you say. You pick a card at random. 1234 what is p(divisor of 49)? write your answer as a percentage. Identify two areas of private life in which you think government should not interfere. Explain why you think government should not intrude in these areas. find the strength of the net force produced by a 34-n force and a 21-n force in each of these cases. What is the length of the line segment that joins (3, -2) and (3, 9) A piece of chalk, CaCO3, has an initial mass of 43.5 grams. The mass of the chalk decreased to 39.6 grams after use. How many moles of chalk were used?