Web designers need to be proficient in Front-end coding languages in addition to good design sense.
Web designers build or redesign websites. They understand what it takes to make a website functional and easy to use, but also understand what is needed to make it aesthetically appealing to the user.
Web designers need to be proficient in Front-end coding languages in addition to good design sense.
Find out more on web design at: https://brainly.com/question/8391970
HELP ME PLEASE
explain 2 threats to data that can arise when a pc is not connected to the Internet
Explanation:
Threats
Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats
Types of Computer Security Threats
There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.
COMPUTER VIRUS
A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.
COMPUTER WORMS
A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.
SCAREWARE
Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.
KEYLOGGER
Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.
ROOTKIT
A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.
Tips for Best Computer Security
For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.
# I need help with my python code, it won't work, and no matter what I try, I can't get it to run properly. Every time I try top run it, it gives me an error saying:
# syntaxError, bad input on line 43, I am not very good at programming, and I just started. I wanted to ask if you guys could help me.
# Here's my code, the purpose of it is to be a rock paper scissors game:
```
import random
def welcome_prompt():
print ("Rock paper Scissors game")
print ("Rules: Rocks beats Scissors, Scissors beats Paper, Paper beats Rock")
def get_player_move():
print ('Round ' + str(round))
print ("Please play one of the following")
move = raw_input(" 1) [R]ock, 2) [P]aper, 3) [S]cissors:")
if get_player_move == ("R"):
print ("You used Rock!")
return 1
elif get_player_move == ("P"):
print ("You used Paper!")
return 2
elif get_player_move == ("S"):
print ("You used Scissors!")
return 3
else:
print "Invalid input, please use capitalized initial (R,P,S)"
return get_player_move()
def get_computer_move():
get_computer_move = random.randint(1,3)
if get_computer_move == 1:
print ("Computer used Rock!")
return 1
elif get_computer_move == 2:
print ("Computer used Paper!")
return 2
elif get_computer_move == 3:
print ("Computer used Scissors!")
return 3
def compare_moves(get_player_move, get_computer_move):
if (get_player_move == 1 and get_computer_move == 1) or (get_player_move
== 2 and get_computer_move == 2) or (get_player_move == 3 and
get_computer_move == 3):
print ("It's a tie!")
return 0
elif (get_player_move == 1 and get_computer_move == 3) or
(get_player_move == 2 and get_computer_move == 1) or (get_player_move ==
3 and get_computer_move == 2):
print ("You win the round!")
return 1
elif (get_player_move == 1 and get_computer_move == 2) or
(get_player_move == 2 and get_computer_move == 3) or (get_player_move ==
3 and get_computer_move == 1):
print ("You lose the round!")
return -1
elif (get_player_move == 4):
print ("You didn't put in correct input, computer gets a free win")
return -1
player_score = 0
comp_score = 0
round = 0
welcome_prompt()
('Round ' + str(round))
while round< 10:
round = round + 1
get_player_move()
get_computer_move()
compare_moves(get_player_move, get_computer_move)
if compare_moves == 1:
player_score = player_score + 1
print 'Player Score'+ str(player_score)
print 'Computer Score'+ str(player_score)
elif compare_moves == -1:
comp_score = comp_score + 1
print 'Player Score'+ str(player_score)
print 'Computer Score'+ str(player_score)
print ("Game Over")
Answer:
hmm i would assume your syntax code has a hidden error that's messing up your code that you are trying to input inside your computers field matrix to do the game. question is where is that error?
Explanation:
Not every design choice in your game interface requires having a thought process behind it.
True
False
Answer:
true
Explanation:
cause every design have it's own thought process and we also have our choice
Answer:
true
i agree with the person that answerd
you receive a text from your boss, who’s on vacation. it says she can’t connect to the network and urgently needs you to send a file using an enclosed link. what type of social engineering attack is being used here?
The type of social engineering attack that is being used here is phishing. It exploits human errors.
Phishing is a type of social engineering attack that requires human errors to obtain credentials and/or spread malicious malware.
This type of attack (phishing) represents the most common type of social engineering attack.
Phishing generally involves email attachment files or links that are infected with malicious malware.
Learn more about phishing here:
https://brainly.com/question/23021587
The WordPress Widgets submenu is located where on the WordPress site?
Themes
Appearances
Background
Customize
Answer:
Appearances
Explanation:
In your dashboard, click on Appearance → Customize → Widgets. Choose the location where you'd like to place the widget on your site. Common options here include the Footer and Sidebar, but this may be different depending on your theme..
Go to Appearance > Widgets in the WordPress Administration Screens. Choose a Widget and either drag it to the sidebar where you wish it to appear, or click the widget, (select a destination sidebar if your theme has more than one) and click the Add Widget button.
[ RevyBreeze ]
Select all that apply
photoshop question
Form is gives the object this look?
a. Flat
b. Textured
c. Dark
D. 3d
how does microsoft label mac addresses in the windows utilities that show you the mac address?
Based on computer analysis, Microsoft labels mac addresses in the windows utilities "by showing the MAC address in the 'Physical Address' field."
What is MAC Address?MAC Address is the acronym for media access control address. A distinct identifier is allocated to a network interface controller (NIC).
MAC address is used as a network address in communications within a network component.
There are two ways to check for a MAC address in the Windows Utilities which is either through Command Prompt or Network Setting.
Hence, in this case, it is concluded that the correct answer is "by showing the MAC address in the 'Physical Address' field."
Learn more about MAC Address here: https://brainly.com/question/24812654
akira has a mobility impairment that makes it difficult to type on a keyboard. what technology can she use to create written documents without using a keyboard?
The screen reader technology she can use to create written documents without using a keyboard if Akira has a mobility impairment that makes it difficult to type on a keyboard.
What is Screen reader technology?An assistive technology known as a screen reader reads text, such as the document you see on your screen.
The audio output of screen reader technology is used to describe the information on the screen. A screen reader may narrate the operations of the computer or device as well as read aloud webpages and documents.
When reading text on a screen, a screen reader employs a Text-To-Speech engine to convert it to speech.
Thus, the screen reader technology she can use to create written documents without using a keyboard if Akira has a mobility impairment that makes it difficult to type on a keyboard.
Learn more about the Screen reader technology here:
https://brainly.com/question/7600315
#SPJ2
what types of activities are ideal for a robot to perform?
The type of activities that are ideal for a robot to perform are; Repetitive tasks
Robots are machines that are programmable by a computer which have the capacity of automatically carrying out a complex series of actions.
Now, robots are used in a wide array of industries which include manufacturing, assembly and packaging, transport, earth and space exploration, e.t.c.
The most common use are found primarily in the automobile industry where they are used to carry out repetitive tasks and those that are difficult or hazardous for humans.
Read more about robots at; https://brainly.com/question/9145476
Helena set the price of her scarves at $20. How is she using money?
Helena is using money as a unit of account.
Money is anything that is accepted and used as a means of payment for products and it used to repay debts.
Functions of money
Unit of account : it is used to value goods and services. Helena values her scarves as $20. Medium of exchange : money can be used to exchange for goods and services. For example, the person who buys the scarves for $20 uses money as a medium of exchange. Store of value : money can be kept for extended periods and it would not lose its value.To learn more about store of value, please check: https://brainly.com/question/25965295
Which of the following described a global network connecting billions of computers and other
devices?
A) WiFi
B
ISP
C
World Wide Web
D
Internet
What does an arrow after a command indicate
Answer:
the command still has to be carried out.
What Pre-Built PC should I get? I don't have a lot of money so I'm looking for cheap options.
Answer:
for a gaming pc i recommend better graphic cards and for streaming gpu you can find some good options online not exactly sure what model.
I know this isn't the right platform for this question, but where should I go to get a good PC and a good monitor? I'm thinking about becoming a streamer.
Answer: Alienware is really good if you are into fps games such as call of duty but it depends on your price I know alien ware can be pretty expensive so it's up to you.
Which of the following adds digital elements to a live view, often by using the camera on a smartphone? O Augmented reality O Forecasting O Problem-solving O Virtual reality
Answer:
augmented reality
Explanation:
think "pokemon go" when youre relaxing with your buddy and you feed it berries
Draw truth table for the following logic circuit:
(Please I really need help with this)
Keep Scrolling! :D
[tex] \rule{999pt}{66646pt}[/tex]
I have a problem. I can't cycle between game packs on my strike pack, I've watched so many vids I'm on Xböx and I'm holding the left button and clicking right paddle and it does nothing! If you could help it would be appreciated
if anyone knows how to help please do some people might not even know what a strike pack is only respond if you do please
Answer:
Maybe if u put the disk back in, or restart it if it doesn't do anything hope this helped.
Explanation:
Maybe if u put the disk back in, or restart it if it doesn't do anything hope this helped.
in ____ orientation, a page is taller than it is wide.
Answer:
portrait
Explanation:
12. Your project specifications call for a business rule that the database design can't
enforce. What tool should you use to enforce this business rule?
A. Trigger
B. Weak entity
C. Exception
D. Lookup entity
A lot of business rules needs to be triggered so as to run.
In making of business rule, one can select triggers to run some specific events or run using some particular specified frequency.
The trigger options differs based on the type of rule you are interested in. One can also use multiple triggers when using a single rule.
Learn more about rules from.
https://brainly.com/question/5707732
Which of these is an off-site metric for social media marketing?
a. the amount of return you get on the investment made
b. customer engagement
c. the number of followers on Twitter
d. bounce rates for your web page
It should be noted that the off-site metric for social media marketing is the number of followers on Twitter.
According to this question, we are to to discuss off-site metric for social media marketing and how this affect social marketing.
As a result if this we can see that off-site metric serves as any means of social marketing outside the site of that organization which makes followers on Twitter the right answer
Therefore, off-site metric for social media marketing is the number of followers on Twitter..
Learn more about social media marketing at:
https://brainly.com/question/14457086
Technical skills are also called soft skills.
Question 9 options:
True
False
The statement is false, technical skills are those that serve to perform a specific function and are also called hard skills.
Technical skills are skills that include knowledge in the mechanical, computer, mathematical or scientific area that will allow a good performance of specific tasks.
A person with technical or hard skills is able to apply specific methods, procedures and techniques in a specialized field.Soft skills refers to the characteristics and personal competencies that show how a person copes with others, it is related to emotional intelligence.Therefore, we can conclude that technical or hard skills are the practical knowledge necessary to perform specific tasks, while soft skills are those skills associated with the ability to interact effectively on a personal level.
Learn more about technical skills here: https://brainly.com/question/10976877
Within a master slide template, you can create a custom slide layout. Place the steps to complete this task in the correct order.
Answer: yes the above is correct
1. In the slide master tab, select insert layout.
2. Click rename, and name the new layout.
3. Choose new elements with Insert Placeholder.
4. Save the Changes.
5. Confirm by selecting Home, then Layout.
When a custom slide layout is created, the steps to complete this task in the correct order are as follows:
What do you mean by layout?A layout refers to the parts of something that are arranged or laid out.
The steps to complete this task are as follows:
In the slide master tab, select insert layout.Click rename and name the new layout.Choose new elements with an Insert placeholder.Save the changes.Confirm by selecting home and then the layout.Learn more about Layout here:
https://brainly.com/question/1327497
#SPJ2
it is defined as the interloping of yarn with the use of a hook to make a design . A smocking B knitting C crocheting D embroidery
Answer:
letter C
Explanation:
because the crocheting is defined as the interloping yarn and use to make and made a design to excellent.
Type the correct answer in the box. Spell all words correctly.
Which method of cooking does the following passage describe?
makes use of a flat-topped plece of equipment to quickly cook food products.
Answer:
I believe that this is frying. When you cook food on a flat-topped piece of equipment you are usually using a frying pan.
Explanation:
_____ is the method of binding instructions and data to memory performed by most general-purpose operating systems.
Execution time binding is the method of binding instructions and data to
memory performed by most general-purpose operating systems.
This type of binding is usually done by the processor. It also generates both
logical and dynamic absolute address. The binding can be delayed if the
process is moved during execution between two or more memory segment.
This generally involves binding of instructions and data to the memory of
the operating system.
Read more about Execution time binding here https://brainly.com/question/19344465
Which phrase will be coded using the element in HTML?
Answer:
The <i> tag is often used to indicate a technical term, a phrase from another language, a thought, a ship name, etc. Use the <i> element only when there is not a more appropriate semantic element, such as: <em> (emphasized text) <strong> (important text)
Explanation:
brainliest please thank you :)#CARRYONLEARNINGCORRECT ME IF IM WRONGCan someone plss help me with this!!
Answer:
Text
Explanation:
There is no text in between the <h1> and </h1> tags.
I hope thats correct.
What is the first step when creating a 3-D range name?
Open the New Range window, and click 3-D.
Press the Shift key while selecting the new sheet .
Open the Name Manager, and click New.
Click a cell to insert the cell reference.
Answer:
Open the Name Manager, and click New.
Explanation:
Why would you add learning inside the app? A. To add contextual help for each page in the app B. To contact Salesforce support C. To link to your company’s onboarding resources D. To add resources about working in Salesforce Classic E. A and C
There are different reasons why there was the addition of learning to the app. The reasons why you would you add learning inside the app is that:
To add contextual help for each page in the app.To link to your company’s onboarding resources.Salesforce Learning Paths is known to result in bringing out the power of learning straight into the app.
It can help companies to update their teams as they function or work in Salesforce.
Through the use of the Learning Paths, firms whether big or small and other industry can update or equip their employees with timely, personalized learning in the flow of work.
This can therefore help employees of all experience levels by boasting their skills and in turn increase their productivity.
Learn more about Salesforce from
https://brainly.com/question/7452075
Which string method returns true if the character is a numeric character?
letter = input("Enter a letter: ")
A. isDigit(letter)
B. isdigit(letter)
C. letter.isDigit()
D. letter.isdigit()
Answer:
It is D. letter.isdigit()
Explanation:
reason being is that there is only very few scenarions that require a capital letter in them and most of those that have scenarions are to input a operation into the program.
In the given options, the method that will return true when an input charater is a numeric is optionC. letter.isDigit()
Methods In ProgrammingBasically what this function does it to check whether the input variable letter is a numeric character, if true then the function returns true.
Hence, the functions input parameter is a string and it returns and boolean
it should be noted that there is a sligth difference between and method and a function in programming.
Learn more about programming here:
https://brainly.com/question/1538272