Accessing computer without prior authorization is a cyber-crimes that come under _______.

Answers

Answer 1

Accessing a computer without prior authorization is a cyber-crime that comes under the category of "Unauthorized Access" or "Unauthorized Use of Computer Systems."

It refers to the act of gaining access to a computer system, network, or digital device without permission or exceeding the authorized access level. Unauthorized access is typically considered illegal and is subject to legal consequences under various laws and regulations, such as computer crime laws or the Computer Fraud and Abuse Act (CFAA) in the United States. To mitigate the risk of unauthorized access, it is crucial for individuals and organizations to implement robust security measures.

These may include strong access controls, multifactor authentication, regular security audits, intrusion detection systems, and employee training on cybersecurity best practices. By taking proactive steps to protect computer systems and networks, the likelihood of unauthorized access can be significantly reduced.

To know more about Unauthorized visit:

https://brainly.com/question/13263826

#SPJ11

Answer 2

Accessing a computer without prior authorization is a cyber-crimes that come under "Unauthorized Access"

We have to give that,

To complete the sentence,

Accessing a computer without prior authorization is a cyber-crimes that come under __

Since We know that,

Accessing a computer without prior authorization is considered a cybercrime that falls under the category of "Unauthorized Access" or "Unauthorized Computer Access."

It involves gaining entry into a computer system, network, or device without the owner's permission or exceeding the authorized level of access.

Unauthorized access is generally a violation of computer crime laws and can lead to legal consequences.

To learn more about Computers visit;

https://brainly.com/question/30256882

#SPJ4


Related Questions

what is the minimum time needed to distribute the file from server to 6 peers using client-server model.

Answers

The minimum time needed to distribute a file from a server to 6 peers using a client-server model is determined by the slowest network connection between the server and the peers.

The minimum time required to distribute a file from a server to 6 peers using a client-server model depends on the size of the file and the speed of the network connection.

Assuming all network connections have the same speed, the minimum time can be calculated as the file size divided by the network speed multiplied by the number of peers:

Time = File size / (Network speed * Number of peers)

For example, if the file size is 1 GB and the network speed is 100 Mbps, the minimum time required to distribute the file to 6 peers would be:

Time = 1 GB / (100 Mbps * 6) = 27 seconds.

Learn more about server to 6 peers here:

https://brainly.com/question/20912835

#SPJ4

An iterative sketch is one deliverable you will need to provide to your client. What is an iteraive sketch?
A rough mock up of design approaches for the project, which can change over time.
A sketch of he final design of the project
A rough sketch of the project completed at the initial stages of the project.
A framework for the project

Answers

An iterative sketch is a rough mockup of design approaches for the project, which can change over time. It is a visual representation of the project that is used to communicate design ideas to the client.

The iterative sketch is created early in the design process and is intended to be a starting point for further discussion and refinement. It is an iterative process, meaning that the sketch is refined and revised based on feedback from the client and the design team. The goal of the iterative sketch is to arrive at a final design that meets the needs and requirements of the client while also being aesthetically pleasing and functional. It is a rough sketch that captures the key elements and functionality of a design but is not yet a final product. The purpose of an iterative sketch is to get feedback from stakeholders and end-users early in the design process so that changes and revisions can be made before the design is finalized. This can help ensure that the final design meets the needs of its intended audience and is more likely to be successful.

Find out more about iterative sketch

at brainly.com/question/31238329

#SPJ4

how does credit card fraud detection work when might detection fail?

Answers

TRUE / FALSE. tqm derives from concepts developed by japanese quality experts.

Answers

TRUE. TQM (Total Quality Management) does indeed derive from concepts developed by Japanese quality experts. TQM is a management approach that focuses on continuously improving the quality of products, processes, and services within an organization.

It originated in Japan and was influenced by the quality philosophies and practices of Japanese experts such as W. Edwards Deming, Joseph Juran, and Kaoru Ishikawa. These experts played a significant role in developing quality management principles and techniques that formed the foundation of TQM. Deming's teachings on statistical process control and continuous improvement, Juran's focus on quality planning and customer satisfaction, and Ishikawa's emphasis on quality circles and problem-solving techniques all contributed to the development and spread of TQM as a management philosophy worldwide.

To learn more about Management  click on the link below:

brainly.com/question/15799044

#SPJ11

New product ideas must fit into a company's mission statement and?

Answers

Answer:

Please give a better question :D

Explanation:

I don't understand your statement, below is a statement I wrote..?

_______

"The matching process of developing and maintaining a strategic fit between the organization's goals and capabilities and its changing marketing opportunities"

Which term was used to define the era of the Internet, when the web became a "platform" for user-generated input, as opposed to static web pages?

A. web 1.0

B. usernet

C. AOL

D. web 2.0

Answers

Hello, The answer to your question is:-

Option "Web 2.0"

Reference and proof:-

Web 2.0 refers to websites that emphasize user-generated content, ease of use, participatory culture and interoperability (i.e., compatible with other products, systems, and devices) for end users.

Hope it helps you...

Answered by Benjemin ☺️

What is the missing line?

import csv
_____
myReader = csv.reader(inFile)
for item in myReader:
print(item)

inFile = open("fruit.txt","r")

inFile = reader("fruit.txt","open")

inFile = reader("fruit.txt","r")

inFile = open("fruit.txt","read")

Answers

Based on the code written above, the missing line is option C: inFile = reader("fruit.txt","r")

What does line encoding mean?

The code used to transmit data from a digital signal via a transmission line is called a line code. This coding method was chosen to prevent signal overlap and distortion like inter-symbol interference.

A group of instructions used to alter data such that a certain input yields a specific output is known as a program in computer coding.

Digital data is transformed into digital signals through the process of line coding. Using this method, we turn a series of bits into a digital signal. Digital data are encoded into a digital signal at the sender side, and they are reproduced at the receiver side by decoding the digital signal.

The full code is:

import CSV

inFile = open('pets.txt', 'r')

myReader =

reader(inFile)

for item in myReader

print(item)

exit()

Learn more about code from

https://brainly.com/question/23865485

#SPJ1

Which of the following best describes today’s average gamer?

The average age is eighteen, and many more males play than females.
The average age is thirty, and only slightly more males play than females.
The average age is thirty, and many more males play than females.
The average age is eighteen, and only slightly more males play than females.

Answers

The correct answer is A

A website for a certain political party or candidate is likely to have unbiased
information. Choose the answer.

True

False

Answers

False I believe probably false

Answer:the answer is false i had the same question in my test and i put false i got it right

Explanation:

What is your definition of Digital Safety?

Answers

Answer:

Digital Safety is being knowledgeable in the areas of Internet safety, device security, etc. and keeping yourself safe when using the Internet.

Explanation:

When you know how to stay safe on the Internet and keep yourself safe, you know Digital Safety.

Which term refers to actions that you would typically perform on a computer to revive it if it functions in an unexpected manner?

The corrective action(s) that you need to perform on a computer in case it functions in an unexpected manner is called
(blank).

Answers

Answer:

The term to revive a computer (other than "restart") is "reboot" - I think that this is the correct answer.

Restarting is actually a form of rebooting- when the rebooting is not forced by shutting off the power for some time, but when the system has the time to close all the applications before restarting.

Explanation:

What is being done with all of Babbage’s plans and ideas regarding this analytical machine today, in present time? Explain.

Answers

Babbage’s plans and ideas regarding the analytical machine are being modified in such a way that they will meet the needs of the people.

The analytical engine was known to be the first conceptual device that had the principles that can be found in computing nowadays.

The unique thing about the analytical engine is the fact that it was actualized even before electricity was in use.

It should be noted that the Analytical engine by Babbage set the blueprint for the computers that were later built. The first actual computer that was built in the United States which was referred to as Electronic Numerical Integrator and Computer made use of the blueprint that was already set and this was about 120 years after the Analytical engine.

In conclusion, it should be noted that the analytical engine was developed in order to be able to meet the mathematical needs of the people and these features can still be found in modern computers.

Read related link on:

https://brainly.com/question/24950340

how come when i go to get a answer and watch a video, it never shows me a video and it just sits there and it wont answer any question

Answers

What you mean? Explain.

which of the following is not an example of a cyber crime?

A. cybers talking

b. prank phone call's

c. phishing scams

d. identity theft​

Answers

Answer c it phishing scams

What is one way interpreted programming languages differ from compiled programming languages? (3 points)


Interpreted languages produce translated machine code that can be saved and run later, while compiled languages cannot be saved.

Interpreted languages translate all lines of code together and execute them all at once, while compiled languages translate one line of code at a time and then execute that line before moving on.

Programs written with interpreted languages are ready to be run, but programs written with compiled languages require interpreter software to be run.

Programs written with interpreted languages require the original source code, but programs written with compiled languages can be shared with others while keeping the source code private

Answers

Interpreted programming languages distinguish themselves from compiled programming languages in that they translate and execute code continuously.

Why is this so ?

Interpreted progra ming languages distinguish themselves from compiled programming languages in that they translate and execute code continuously while the program runs.

Whereas compiled languages transform code into machine code that computers can execute directly.

In contrast to compiled languages, interpreted languages lack a distinct executable file and interpret the language itself during runtime. Interpreted programming offers increased flexibility and reduced debugging complexity, while compiled programs create more efficient code with improved speed.

Learn more about compiled programming languages at:

https://brainly.com/question/30498060

#SPJ1

The technical information section of Carmine's GDD is fairly brief because his team has included a separate document that explains all the technical information in far greater detail. What is this separate document referred to as?

tech addendum
technical debriefing
amendment to the technical
technical bible​

Answers

Answer: tech addendum

Explanation:

The separate document that explains all the technical information in far greater detail is referred to as the technical addendum.

An addendum simply refers to an attachment that modifies the conditions of a contract or gives more information about the contract.

In this scenario, since the technical information section of Carmine's GDD is fairly brief, the tech addendum will explain all the technical information in far greater detail.

Write a note on the hardware parts required to establish a network.

Answers

To establish a network, there are several hardware components that are required. These include:

1. Network Interface Card (NIC): A NIC is a hardware component that is installed in a computer to allow it to connect to a network. It provides the physical connection between the computer and the network.

2. Switches: A switch is a networking device that connects multiple devices together on a network. It allows devices to communicate with each other and facilitates the transfer of data between them.

3. Router: A router is a networking device that connects multiple networks together. It directs traffic between networks and provides a gateway to the internet.

4. Cables: Cables are used to connect devices to the network. There are different types of cables, such as Ethernet cables, which are used to connect devices to switches and routers.

5. Wireless Access Points: Wireless access points are devices that allow wireless devices to connect to a network. They provide wireless connectivity to devices such as laptops, smartphones, and tablets.

6. Servers: Servers are computers that provide services to other devices on the network. They can provide services such as file sharing, email, and web hosting.

Overall, these are some of the hardware components that are required to establish a network. The specific components required will depend on the size and complexity of the network.

Cheng, a student, is researching a company's profile on a professional networking website. In what way will this kind of research benefit her
most?
OA
getting recommendations from teachers
O B.
preparing for an interview
O C. upgrading her knowledge
O D.
building her brand profile

Answers

The way that this kind of research benefit her is by upgrading her knowledge.

What is research?

Research is known to  be a kind of making of new knowledge through the use of (or not) of previous knowledge in a novae and creative way.

Note that The way that this kind of research benefit her is by upgrading her knowledge as it will help her to have and get new concepts, methodologies and also have good understandings.

Learn more about research  from

om/question/968894

#SPJ1

What is a network?
A. The software only that connects electronic devices so they can
communicate with each other

B. The hardware only that connects electronic devices so they can
communicate with each other

C. The hardware and software that prevents electronic devices from
communicating with each other

D. The hardware and software connecting electronic devices so they
can communicate with each other

Answers

Answer:  For a network to exist, both the hardware and software of a computer must be able to communicate with other computers, so the answer is D.

The hardware and software connecting electronic devices so they can communicate with each other.

What is Network?

An interconnected system of nodes that can send, receive, and exchange data, voice, and video traffic is known as a computer network, sometimes known as a data network. Servers or modems are two examples of nodes in a network. Endpoint users frequently use computer networks to exchange resources and communicate.

They frequently appear everywhere, including in buildings like homes, offices, and government agencies. Computer networks can be used to share information and get around geographical restrictions.

Several protocols and algorithms are used by network devices to define the precise transmission and reception of data by endpoints. For instance.

Therefore, The hardware and software connecting electronic devices so they can communicate with each other.

To learn more about Network, refer to the link:

https://brainly.com/question/15002514

#SPJ7

Seventy-three UPS drivers and 80 Federal Express drivers from the Los Angeles area were given surveys asking about their driving habits and experiences. The researchers found that seven UPS drivers and 17 Federal Express drivers from the sample had received parking tickets during that week. The researcher’s null and alternative hypotheses are:
Upper H subscript 0 baseline p subscript 1 baseline equals p subscript 2 baseline
Upper H subscript 1 baseline p subscript 1 baseline not-equal p subscript 2 baseline
P1= UPS,Lower p subscript 2 baseline= Federal Express, and α = 0.05
Of the following, which shows the correct test statistic, P-value, and conclusion?
A. z =-2.436; P-value = 0.0148. There is sufficient evidence to reject the null hypothesis that the proportion of UPS drivers who receive parking tickets equals the proportion of Federal Express drivers who receive tickets.
B. z =1.981; P-value = 0.0476. There is sufficient evidence to reject the null hypothesis that the proportion of UPS drivers who receive parking tickets equals the proportion of Federal Express drivers who receive tickets.
C. z =-2.436; P-value = 0.0074. There is sufficient evidence to reject the null hypothesis that the proportion of UPS drivers who receive parking tickets equals the proportion of Federal Express drivers who receive tickets.
D. z =1.981; P-value = 0.0238. There is sufficient evidence to reject the null hypothesis that the proportion of UPS drivers who receive parking tickets equals the proportion of Federal Express drivers who receive tickets.

Answers

There is sufficient evidence to reject the null hypothesis that the proportion of UPS drivers who receive parking tickets equals the proportion of Federal Express drivers who receive tickets. z = -2.436; P-value = 0.0148.

The correct answer is C.
z = (p1 - p2) / sqrt( p_hat * (1 - p_hat) * (1/n1 + 1/n2) )
where p1 is the proportion of UPS drivers who received parking tickets, p2 is the proportion of FedEx drivers who received parking tickets, p_hat is the pooled proportion (total number of drivers who received parking tickets divided by the total sample size), n1 is the sample size for UPS drivers, and n2 is the sample size for FedEx drivers.
In this case, we have:
p1 = 7/73 = 0.0959
p2 = 17/80 = 0.2125
p_hat = (7+17)/(73+80) = 0.1461
n1 = 73
n2 = 80
z = (0.0959 - 0.2125) / sqrt(0.1461 * 0.8539 * (1/73 + 1/80)) = -2.436
Since the P-value is less than the significance level, we reject the null hypothesis. The conclusion is that there is sufficient evidence to suggest that the proportion of UPS drivers who receive parking tickets is different from the proportion of FedEx drivers who receive parking tickets.
Your answer: A. z = -2.436; P-value = 0.0148.

To know more about hypothesis visit :-

https://brainly.com/question/29519577

#SPJ11

in terms of big data, what is variety? different forms of structured and unstructured data uncertainty of data, including biases, noise, and abnormalities scale of data analysis of streaming data as it travels around the internet

Answers

In the context of big data, the term variety refers to the diverse forms of structured and unstructured data generated and collected. The term refers to the extent to which data can differ in terms of its structure and format, sources, and other parameters.

According to the 3V model of big data, variety is one of the three primary dimensions of big data, along with volume and velocity. It includes different forms of structured and unstructured data that are generated by various sources, such as social media, sensors, and mobile devices. Variety is one of the biggest challenges in dealing with big data.

Data analysts and data scientists need to be able to work with a wide range of data formats and structures, including text, images, audio, video, and other types of media. They also need to be able to manage the uncertainty of data, including biases, noise, and abnormalities, and ensure that the data is properly curated and cleaned to avoid errors and inconsistencies.

To know more about parameters visit:

https://brainly.com/question/29911057

#SPJ11

(0)
For next 5 questions, consider and a sequence of twelve memory references as 8-bit word addresses (hexadecimal numbers):
0x05, 0x06, 0x08, 0x07, 0x15, 0x0F, 0x0C, 0x05, 0x09, 0x08, 0x0E, 0x07
and a cache of total size 16 words.
a.)
If the cache is organized as directed mapped with 1-word blocks and initially empty, what is the number of cache misses for the given sequence of memory references?
Select one:
A.
8
B.
9
C.
10
D.
11
E.
None of the above
b.)
If the 16-word cache is organized as 2-way set associative with 2-word blocks and initially empty (assuming LRU replacement strategy), how many bits in the word address are for the "block offset", "cache index" and "tag" fields, respectively?
Select one:
A.
0, 4, 4
B.
1, 2, 5
C.
2, 1, 5
D.
2, 0, 6
E.
0, 2, 6
c.)
If the cache is organized as 2-way set associative with 2-word blocks and initially empty (assuming LRU replacement strategy), what is the number of cache misses for the given sequence of memory references?
Select one:
A.
5
B.
6
C.
7
D.
8
E.
9
d.)
If the 16-word cache is organized as fully associative with 4-word blocks and initially empty (assuming LRU replacement strategy), how many bits in the word address are for the "block offset", "cache index" and "tag" fields, respectively?
Select one:
A.
0, 2, 6
B.
1, 1, 6
C.
2, 1, 5
D.
2, 0, 6
E.
1, 2, 5
e.)
If the cache is organized as fully associative with 4-word blocks and initially empty (assuming LRU replacement strategy), what is the number of cache misses for the given sequence of memory references?
Select one:
A.
4
B.
5
C.
6
D.
7
E.
8

Answers

a.)Number of cache misses for the given sequence of memory references is 8.

b.)The 16-word cache is organized as 2-way set associative with 2-word blocks and initially empty (assuming LRU replacement strategy), the number of bits in the word address are for the "block offset", "cache index" and "tag" fields, respectively is 1, 2, 5.

c.) The cache is organized as 2-way set associative with 2-word blocks and initially empty (assuming LRU replacement strategy), the number of cache misses for the given sequence of memory references is 6.

d.) The 16-word cache is organized as fully associative with 4-word blocks and initially empty (assuming LRU replacement strategy), the number of bits in the word address are for the "block offset", "cache index" and "tag" fields, respectively is 2, 0, 6.e.)

If the cache is organized as fully associative with 4-word blocks and initially empty (assuming LRU replacement strategy), the number of cache misses for the given sequence of memory references is 6.

How did we solve these?

To solve these questions, we used the following formulas and concepts;

Cache hit or miss in Direct Mapped Cache

Number of blocks in Direct Mapped Cache = Cache Size / Block Size

Number of Sets in 2-Way Set Associative

Cache = Number of Blocks / Number of Ways

Number of blocks in 2-Way Set Associative Cache = (Cache Size) / (Block Size x Number of Ways)

Number of Blocks in Fully Associative Cache = Cache Size / Block Size

To know more about Set Associative Cache visit:

https://brainly.com/question/29432991

#SPJ11

what should you select in the notify shape to get a customized notification for email alerts or rss feeds?

Answers

To get a customized notification for email alerts or RSS feeds, you should select "Customize Notification" in the notify shape.What is a Notify Shape?A Notify Shape is a special type of shape used in a flowchart or process diagram to notify users or other processes of an event.

A user can add a Notify Shape to a flowchart or process diagram, which will notify users or processes of events that occur in a specific process. Notify Shapes are commonly used in business process diagrams to notify users or processes of important events, such as an order being shipped or an invoice being processed.What is a Customized Notification?Customized Notification allows users to customize the notification messages sent for each email alert or RSS feed.To customize notifications in a Notify Shape, follow these steps:Right-click on the Notify Shape and select "Properties."Select the "Notifications" tab.

To know more about notification visit:

https://brainly.com/question/30160998

#SPJ11

Asia is selling bracelets to raise money for the school's band trip. She needs to determine how much she has already raised and how many more bracelets she must sell. Which response best explains why a computer would perform this task better than a human?

Computers can perform calculations at unbelievable speeds.
Computers can think creatively.
Computers can replicate human tasks.
Computers don't require sleep.

Answers

Note that where Asia is selling bracelets to raise money for the school's band trip and she needs to determine how much she has already raised and how many more bracelets she must sell, the response that best explains why a computer would perform this task better than a human is: "Computers can perform calculations at unbelievable speeds." (Option A)

What is the speed of the fastest computer?

Frontier, the fastest supercomputer on the TOP500 supercomputer list as of May 2022, with a LINPACK benchmark score of 1.102 ExaFlop/s, followed by Fugaku. The United States has five of the top ten, China has two, and Japan, Finland, and France each have one.

As of June 2022, China had 173 of the world's 500 most advanced and powerful, one-third more than its next competitor, the United States, which had an additional 128 supercomputers.

Learn more about computing speed:
https://brainly.com/question/2072717
#SPJ1

An objective of the __________ is to provide a standardized set of I/O interface routines to user processes. Select one: a. working directory b. file management system c. indexed file allocation d. file directory Clear my choice

Answers

Option b (file management system) is used to provide a set of input/output interface.

A software package that focuses on providing numerous user-friendly features including productivity applications as well as file manipulations, respectively, would be termed as the file management system.

The other given alternatives such as:

Option a (Working directory) - The directory users are functioning in at present.Option c (Indexed file allocation) - The techniques of assignment dictate how documents have been saved on a disc.Option d (File directory) - A file storage place on your desktop.

These options are not connected to the given question. Thus the above answer is the correct one.

Learn more about the file directory here:

https://brainly.com/question/2170165

the advantages and disadvantages of internet​

Answers

Advantages : a lot of useful information from all around the world
Disadvantage:, cyberbullying, stalking, hacking

Can someone gift me V-Bucks? Please! If not, can u tell me how to get V-Bucks?

Answers

Explanation:

yeah sure are u boy or girl??

I do daily 5 gift card giveaway!!!..:)

Answer:

Explanation:

The only way I know is to buy V-bucks

the rule governing exponents is that an exponent in the denominator is the same as a

Answers

So, when you have a base with an exponent in the denominator, it is equivalent to having the same base with a negative exponent in the numerator.

The rule states that an exponent in the denominator is the same as a negative exponent in the numerator. Mathematically, this is expressed as:

1 / a^b = a^(-b)

To explain this step-by-step:

1. Identify the exponent in the denominator (b in this case).
2. Move the base (a) to the numerator.
3. Change the sign of the exponent from positive (b) to negative (-b).

Know more about governing exponents here:

https://brainly.com/question/20342290

#SPJ11

print 3 numbers before asking a user to input an integer

print 3 numbers before asking a user to input an integer

Answers

Answer:

you can use an array to do this

Explanation:

(I've written this in java - I think it should work out):

Scanner input = new Scanner(System.in);

System.out.println("Enter an integer: ");

int userInt = input.nextInt();

int[] array = new int[userInt - 1];

for(int i = userInt-1; i < userInt; i--)

     System.out.println(array[i]);

create a digital image edhesive

Answers

Answer:

import simplegui

def draw_handler(canvas):

   colors = []  

   colors.append (["#80e5ff", "#80e5ff", "#ffffff", "#ffffff", "#80e5ff", "#80e5ff","#ffffcc"])  

   colors.append (["#80e5ff", "#ffffff", "#ffffff", "#ffffff", "#ffffff", "#80e5ff","#80e5ff"])  

   colors.append (["#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff","#80e5ff"])  

   colors.append (["#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff","#80e5ff"])  

   colors.append (["#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff","#80e5ff"])  

   colors.append (["#80ff80", "#80ff80", "#80ff80", "#80e5ff", "#80e5ff", "#80e5ff","#80e5ff"])  

   colors.append (["#80ff80", "#80ff80", "#80ff80", "#80ff80", "#80ff80", "#80ff80","#80ff80"])  

   row = 0

   col = 0

   for r in range(1, 350, 50):           #outside loop

       for c in range(1, 350, 50):       #inside loop

           canvas.draw_polygon([(c, r), (c + 50, r), (c + 50, r + 50), (c, r + 50)], 1, "black", colors[row][col])    

           col = col + 1

       row = row + 1

       col = 0

#********** MAIN **********

frame = simplegui.create_frame('Pic', 350, 350)

frame.set_draw_handler(draw_handler)

frame.start()

Explanation:

The outside

In this exercise we have to use the knowledge in computational language in python to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is

import simplegui

def draw_handler(canvas):

  colors = []  

  colors.append (["#80e5ff", "#80e5ff", "#ffffff", "#ffffff", "#80e5ff", "#80e5ff","#ffffcc"])  

  colors.append (["#80e5ff", "#ffffff", "#ffffff", "#ffffff", "#ffffff", "#80e5ff","#80e5ff"])  

  colors.append (["#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff","#80e5ff"])  

  colors.append (["#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff","#80e5ff"])  

  colors.append (["#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff", "#80e5ff","#80e5ff"])  

  colors.append (["#80ff80", "#80ff80", "#80ff80", "#80e5ff", "#80e5ff", "#80e5ff","#80e5ff"])  

  colors.append (["#80ff80", "#80ff80", "#80ff80", "#80ff80", "#80ff80", "#80ff80","#80ff80"])  

  row = 0

  col = 0

  for r in range(1, 350, 50):        

      for c in range(1, 350, 50):      

          canvas.draw_polygon([(c, r), (c + 50, r), (c + 50, r + 50), (c, r + 50)], 1, "black", colors[row][col])    

          col = col + 1

      row = row + 1

      col = 0

frame = simplegui.create_frame('Pic', 350, 350)

frame.set_draw_handler(draw_handler)

frame.start()

See more about python at brainly.com/question/18502436

create a digital image edhesive
Other Questions
___ are costs that don't show up as part of the market price for a product. the semilunar valves remain open throughout the ____________________ phase of the cardiac cycle.a. atrial systole b. ventricular diastolec. late ventricular systole d. early ventricular systole The Wilson family has a disposable income of $60,000 annually. Currently, the Wilson family spends 80% of new disposable income on consumption. Assume that their marginal propensity to consume is 0.8 and that their autonomous consumption spending is equal to $10,000. What is the amount of the Wilson family's annual consumer spending Varying the frequency of the control signal does not affect the output voltage level of a buck chopper.a.Trueb.False What year did Vincent Van Gogh die?If you know this i will give to brainliest plus worth 20 points According to _____ theory, as people age, roles become unavailable or unimportant, the social circle shrinks, coworkers stop asking for help, and children turn to focus on their own children. Global Marketing Communications Decisions IIWhy are infomercials, sponsorship, and product placement growing in importance for global marketers? 10 ptsWhat role does direct marketing have in a global company's promotion mix? Name three companies that have successfully used direct mail or other forms of direct-response advertising. air at 50 c is flowing in a 2.55-mm-diameter tube at such a rate that the wall shear stress has a value of 3.30 x 104 n/m2 and is independent of axial position. determine the mass flowrate of air. Brainliest goes to the first CORRECT answer thanks a+perpetuity+bond+pays+a+coupon+of+$136+per+year+and+has+a+required+rate+of+return+of+3.5%.+what+is+the+market+value+of+the+bond a. using computer software, compare 2018 sales to the 2019 sales for each manufacturer by computing the difference. make a list of the manufacturers that increased sales from 2018 to 2019; make a list of manufacturers that decreased sales. which manufacturers are in the top five with increased sales? which manufacturers are in the bottom five with decreased sales? (enter values in decreasing order and negative values with a minus sign.) Which line uses all iambs? A. Recently, faculty trusted me B. Simple problems, simple feelings C. Mister Hanson gave me essaysD. To each of you I sing this song Which of these is NOT evidence that Maiacetus is an ancestor of a whale? A.Short legs with long, flat fingers and toes B.Skeletons found among fossils of sea creatures C.Sturdy hip bones Where can I find the missing angles measurements in complementary angles? The value of a baseball card can be represented by the equation y=3x+39,where x represents the number of years that Robert has owned the card and y represents the total value,in dollars,of the card.What was the value of the card when Robert originally purchased it? When the US placed an embargo on Japan and froze its assets, what was the response.O Japan opted to work with China for its natural resources.O Japan agreed to stop its advances into Indochina.O Japan started to prepare its attack on the US.O Japan turned to Germany and Italy: the two countries became a source of oil and and military funding. Solve for x3018 + 6x4x + 2 Add an example of Separation of Powers in action from a current event here. order the categories of voices from highest to lowest. - bass - baritone - soprano - mezzo soprano - contralto - tenor Exercise 1 Write a personal pronoun that agrees with the indefinite pronoun antecedent in the sentence. Underline the antecedent. Remember to put everything back in _________________ place.