PLEASE HELP. Nobody has been helping me, i need to resolve this code issue for game design

PLEASE HELP. Nobody Has Been Helping Me, I Need To Resolve This Code Issue For Game Design

Answers

Answer 1

Have you tried checking for syntax? Maybe you forgot to define a function. What error is the computer sending you? Is it a syntax error or an incorrect float?


Related Questions

How many pixels are in a picture that is 640 pixels wide and 480 pixels high?.

Answers

Answer:

307200 pixels

Explanation:

Multiply the dimensions:

640 x 480 = 307200

Should spreadsheets be used to write a letter?
YES
NO

Answers

When we are talking about a letter, I am assuming something like an email. A spreadsheet is only good for data collection, writing letters is not a data collection and thus a spreadsheet's use is negated.

Hope that helps!

Im stuck on thiss for the longesttt

Answers

Answer:

i cant understand?,

Explanation:

i know its a sort of coding game but what is the goal of the game/task?

What is logical operator in a basic? Mention its types and explain one of them with its truth table?






Answer this for 20 points pls ​

Answers

Answer:

This indicates an or operation in a logical expression.

Types: And, or and not.

It’s and, or , not logic gates.

a specific type of data stored for a record
options:
A. Table
B. Field
c. Cell

Answers

Answer:

Table

Explanation:

A set of data is stored in a table.

Which attack intercepts communications between a web browser and the underlying os?.

Answers

Answer:

A man-in-the-middle attack.

The attacker is not actually on the network, but instead pretends to be a trusted resource (usually an Internet connection) by intercepting all traffic going to or from that server or service. This means they can read or modify the traffic before it reaches its destination. For example, if a website you are visiting sends your password to another site in cleartext, a man-in-the-middle could intercept this packet and read your password.

Explanation:

My own original answer.

All persons who have access to cji are required to have security training within _____ months of assignment.

Answers

Answer:

At a minimum, all personnel with access to CJI must complete Security Awareness Training within six months of initial assignment and retraining every two years after that.

Explanation:

At a minimum, all personnel with access to CJI must complete Security Awareness Training within six months of initial assignment and retraining every two years after that.

Hoped this helped you out

A brainlyiest is always appreciated

A ______ is a set of step-by-step instructions to complete a task so that users can be sure to complete the task correctly.

Answers

Answer:

Algorithm

Explanation:

An algorithm a process or set of instructions that is created to solve a problem.

write a program that will ask the user to input a number beween 50-60​

Answers

Answer:

def main():

   askUser = int(input("Choose a number between 50-60"))

if askUser >= 50:

    if askUser <= 60:

     print("You've chosen the number " + str(int(askUser)) + "!")

else:

    print("Error, please enter a number between 50-60!")

 

main()  

Explanation:

The program asks the user to pick a number between 50-60. If they enter anything else, an error message will pop up redirecting them to choose a number only from 50-60.

what are the pieces of information that describe the appearance of a cells content

Answers

Answer:

Information about the parts of a cell, its location and role will help describe the appearance of a cell's content.

Organelles are cell structures that include the nucleus, cytoplasm, cell membrane among others. One can view these using a light microscope.

1. Cell Membrane is a fluid mosaic. It is the outer boundary of the cell.

2.Cytoplasm is the fluid inside the cell. It is located between the nucleus and the cell membrane.

3.Nucleus is the control center of the cell and is located at the center.

Which operating system, usually distributed for free, relies on open source software that is developed by volunteers and contains code in the public domain

Answers

Answer:

linux

Explanation:

linux is a unix-like operating system that is open source and free.

find answer.
74 68 69 73 20 69 73 20 77 72 69 74 74 65 6E 20 69 6E 20 68 65 78 20 62 75 74 20 69 74 73 20 6E 6F 74 20 68 61 72 64 20 74 6F 20 66 69 6E 64 20 6F 75 74 20 74 68 61 74

Answers

Answer:

"this is written in hex but its not hard to find out that"

Explanation:

Each two hexadecimal digits represent an ASCII character. I.e.,

74 = t

68 = h

69 = i

73 = s

and so forth...

Look up any ASCII table on the internet that uses hexadecimal numbering, and you can translate by yourself. I attached one below.

You typed the word "weather" when you meant to type the word "whether. " When will Writer or Word flag this as a misspelling or a grammar problem? depends on the rest of the sentence and how you have your settings for grammar and spell checker never all the time.

Answers

The word flag shows misspelling while typing word "weather" instead of "whether"  is depends on the rest of the sentence and how you have your settings for grammar and spell checker.

What is word flag or spell checker?

Word flag or spell checker is the tool or software which helps to identify the misspelling or a grammar problem while typing.

The word "weather"  is typed when there was  to type the word "whether. "

Now, before checking that, when will Writer or Word flag this as a misspelling or a grammar problem, first we have to understand the meaning of both the word.

Word "weather"  is the state of atmosphere for different conditions of temperature, pressure, and humanity. While the word "whether " is the expression of confusion between two things.

The option given for this problem are,

Depends on the rest of the sentence and how you have your settings for grammar and spell checker Never All the time.

Word flag, tells the incorrect word, spelling or grammatical error in a sentence.

To identify a particular word which is misplaced in place of another almost similar spelled word, it checks the other word and sentence.

If the particular word does not match with the sentence, the  word flag or spell checker shows the error.

Hence, the word flag shows misspelling while typing word "weather" instead of "whether"  is depends on the rest of the sentence and how you have your settings for grammar and spell checker.

Learn more about the spell checker here;

https://brainly.com/question/515655

The raw data format, typically created with the Linux ____ command, is a simple bit-for-bit copy of a data file, a disk partition, or an entire drive.

Answers

The raw data format, created with the Linux dd command, is a simple bit-for-bit copy of a data file, a disk partition, or an entire drive.

What are raw data?

Raw data is known to be primary data. They are often collected when they are directly linked to their statistical units.

Raw data can also be called text data as they are stored in a format that is said to be fully independent type of any software and they can be  can be edited. It can be created with the  Linux dd command.

Learn more about raw data format from

https://brainly.com/question/26830274

Draw a flow chart for the examples in selection 1:2:1
Someone help me please.

Answers

Answer:

See picture

Explanation:

Here is an example of a flowchart I found on the web. You use a rhombus shape for a decision, that usually branches into a yes and a no branch.

Without more details, that's about as much that can be said.

Does anyone know how to fix this?

Answers

Answer:

Turn it on

Explanation:

The __ refers to a broad class of physical objects that feature an Internet address and connectivity that communicate between these objects and other Internet-enabled devices and systems. Group of answer choices B2B Internet Internet-of-Things LAN

Answers

Answer:

The answer is C.) Internet-of-Things

Explanation:

The Internet of Things is a fast expanding network of linked items that use embedded sensors to collect and exchange data in real time. I hope this helps! ^-^

Given that n refers to a positive int use a while loop to compute the sum of the cubes of the first n counting numbers, and associate this value with total. Use no variables other than n, k, and total.

Answers

Answer:

first, we have to make value for n.

n = 10

now, use the while loop to cube the numbers.

while n = 10 and k = 4:

k = n ^ 3

lastly, make a total.

total = k

the total should be 10 cubed, given the value.

I hope this helps!

A(n) ________ is a device that enables members of a local network to access the network while keeping nonmembers out of the network. Question content area bottom Part 1 A. firewall B. electronic sensor C. burglar alarm D. fireproof vault

Answers

Answer:

A. firewall

Firewalls filter the traffic in and out of a network and block devices that were set not to be allowed in.

A firewall is a device that enables members of a local network to access the network while keeping nonmembers out of the network. Thus, the correct option for this question is A.

What do you mean by Local network?

A Local network may be characterized as a sequence of computers that are significantly linked together in order to form a network in a circumscribed location. The computers within a local network connect to each other via TCP/IP ethernet or Wi-Fi.

The Firewall riddles all the members of the local network with respect to nonmembers. It works on all sorts of traffic that are found inside and outside of a network. It also blocks the devices of local members that were commanded not to be allowed in.

Therefore, a firewall is a device that enables members of a local network to access the network while keeping nonmembers out of the network. Thus, the correct option for this question is A.

To learn more about Firewalls, refer to the link:

https://brainly.com/question/13693641

#SPJ5

list any four features of second generation of computer on point​

Answers

Answer:

Given below:

They used transistor as main component.Their are operating speed was up to microsecond.They used magnetic core memory as internal storage.They could understand assembly and high level language.

A tropical storm has been moving at 15 miles

Answers

where’s the rest of the question?

How to transfer bookmarks from one computer to another.

Answers

Answer:Plug a flash drive into your computer.

Open Firefox on your computer.

Press Ctrl+⇧ Shift+B.

Click Export Bookmarks to HTML.

Navigate to the location where you want to save the bookmarks

Explanation:i tried it and it worked

Gina manages four sets of databases for the University; one with student name and address information, and one with student billing information, one with academic records for all students and one for current student enrollment status for the semester. She has been asked to use one common field to link the databases. What BEST identifies this particular type of field name?

Answers

Answer: In short words, be awesome like the star you truly are.

-this is why with Potato

Explanation: - learn with brainly

You have just finished installing a network adapter and booted up the system, installing the drivers. You open File Explorer on a remote computer and don't see the computer on which you installed the new NIC. What is the first thing you check

Answers

Answer:

to make sure everything is plugged in and turned on

Explanation:

I do this every day at work, there's always one wire that got missed

please help our cause by spreading this flag all over brainly

What does it mean when apple music says request timed out?.

Answers

Answer:

Your internet connection is bad, or you VPN is on when your not connected to WIFI

Explanation:

Learned from experience, HOPE THIS HELPS!!

Cam's computer has been crashing lately. He's on a deadline and has been losing important work when he saves it to his laptop. Where should cam save his data?

Answers

Answer:

Save it to the server, then click Done.

Please click the heart, it shows appreciation.

A software development _____________ provides a framework for designing, writing, and testing software.

Answers

I think methodology

(50 points!!) 2.6.5: Response: Creative Commons
Directions: Referring to the previous inforgraphic, give a short description of each of the following license types in your own words.

CC BY
CC BY-SA
CC BY-ND
CC BY-NC
CC BY-NC-SA
CC BY-NC-ND
Of the six licenses, which type is the most restrictive in terms of how you can use the work? Which type is the least restrictive? Answer in complete sentences.

Answers

A short description of each of the following license types in my own words are:

CC BY- This means that the creator must be given the credit.CC BY-SA- This allows users to be able to distribute and make changes to the original work, as long as credit is given to the original owner.CC BY-ND- This refers to the freedom to use a work and is a non-derivative license.CC BY-NC- This means that a reader must get specific permission from the creator to reuse their work.CC BY-NC-SA- This allows other people to make use of a work non-commercially and make edits as long as they give credit to the owner. This is the least restrictive.CC BY-NC-ND- This is the most restrictive as it allows a user to only redistribute the material but not to make any changes to the original.

What is Creative Commons License?

This refers to a type of copyright which allows a user to make use of another's work provided that he gives credit or in some cases, to only make use of the material based on specific permission from the owner.

Read more about creative commons license here:
https://brainly.com/question/17542186

Why is a second ALU needed in the Execute stage of the pipeline for a 5-stage pipeline implementation of LC-2200

Answers

Answer:

Those stages are, Fetch, Decode, Execute, Memory, and Write. The simplicity of operations performed allows every instruction to be completed in one processor cycle.

I am the biggest and most important part of data storage hardware. I am about the size of a small book and store critical things like the OS, software titles, and other files. What am I

Answers

Answer:

HDD (Hard drive disk) or SSD (Solid state drive)

Explanation:

Other Questions
Which method of accounting for uncollectible accounts receivable uses an estimate based on a percent of sales?a. Direct write-off methodb. Allowance methodc. Sales factor methodd. Estimated method Solutions on how to prevent young people from poverty The author of a book was told that he would have to cut the number of pages by 7% for the book to sell at a popular price and still make a profit If the finished book contained 330 pages, how many pages were cut? Round your answer to the nearest integer. what can i add 1.2 with to get 11.2 Which of these is not a test for evaluating a website?O currency/recencyO purpose country of originO objectivityO writing style write short notes on four ancient towns in Ghana Brainliest if correct Question 9 of 10____________is a mandatory payroll deduction that includes Social Security andMedicare.A. 501(c)(3)B. FICAC. 401(k)D. State withholdingSUBMIT Javier, the owner of Javier's Tacos, has noticed that residents of his town are flocking to a new taco truck in increasing numbers. After doing some research, Javier learns that consumers enjoy the food truck because almost all the taco ingredients are locally sourced. Javier decides to add locally sourced ingredients to his menu. This is an example of ______. A. substitution B. direct imitation C. resource immobility D. a value chain Standard sea level pressure is about _____ lb/in 2 (pounds per square inch).15121314 Part B Dario decides to take each one of the 4 pieces and share it equally among the 5 of them. First, he divides one piece into 5 equal parts and shares it, then the next one, and so on. What fraction of the party size sub did each person get after all the parts were shared out? Briefly explain your reasoning 8. A company sells a product for $15.99 each.The expenses to make the product this monthtotaled $25,000. If they make a profit of $5,381this month, how many products did they sell? Help pls help me with homework If two cards are drawn from a regular shuffled deck, what is the probability that both cards will be diamonds? Hi please help Ill give brainiest! Imagine that there is a spinner with equal sections, and also a standard number cube. You spin the spinner and roll the cube. This is a situation that involves 2 parts (the spinner and the cube) and has atotal of 30 outcomes in the sample space can anyone help me with this? im confused How many committees can be formed by choosing 4 men from an organization of a membership of 15 men? how much work was done on a charge of 3.0 to move it through 12v electric potential difference any.one up ?here .answer quickthose from california These are the _____________ Mountains.A) RockyB) AndesC) Himalayan