how many rows of aliens are there usually at the start of a ‘space invaders’ game?

Answers

Answer 1

The usual number of rows of aliens at the start of a 'Space Invaders' game is four.

In the classic 'Space Invaders' game, the player faces a formation of aliens descending from the top of the screen. The aliens are arranged in rows, and at the beginning of the game, there are typically four rows of aliens. Each row contains a different type of alien, and as the player progresses in the game, the aliens move faster and their formations become more challenging.

The four rows of aliens provide an initial level of difficulty for the player to overcome. As the player successfully eliminates the aliens, new waves of aliens appear, often with different movement patterns and increased speed. This progression adds to the excitement and challenge of the game.

know more about Space Invaders here:

https://brainly.com/question/10941943

#SPJ11


Related Questions

If the timer is started on November 17 at 4:00 pm and stopped three seconds later, what will display under Time elapsed:

Answers

If the timer is started on November 17 the thing that display under Time elapsed is that  seconds is undefined.

Which is an undefined variable?

An undefined variable is known to be a kind of a variable that is often used in a kind of a program that was said to be not previously declared in a source code.

In a lot of programming languages, this can lead to an error. Hence, If the timer is started on November 17 the thing that display under Time elapsed is that  seconds is undefined.

See full question below

Code Example 11-1

from datetime import datetime, time

def main():

input("Press Enter to start...")

start = datetime.now()

month = start.strftime("%B")

day = start.strftime("%d")

hours = start.strftime("%I")

minutes = start.strftime("%M")

am_pm = start.strftime("%p")

print("Start time:",month,day,"at",hours,":",minutes,am_pm)

input("Press Enter to stop...")

stop = datetime.now()

month = stop.strftime("%B")

day = stop.strftime("%d")

hours = stop.strftime("%I")

minutes = stop.strftime("%M")

am_pm = stop.strftime("%p")

print("Stop time: ",month,day,"at",hours,":",minutes,am_pm)

elapsed_time = stop - start

new_days = elapsed_time.days

new_minutes = elapsed_time.seconds // 60

new_hours = new_minutes // 60

new_minutes = new_minutes % 60

print("Time elapsed: ")

if new_days > 0:

print("days:",new_days)

print("hours:", new_hours, ", minutes:", new_minutes)

if __name__ == "__main__":

main()

Refer to Code Example 11-1: If the timer is started on November 17 at 4:00 pm and stopped on November 18 at 6:30 pm, what is the value of seconds at the end of the program?

a. 95400

b. seconds is undefined

c. 1800

d. cannot tell

Learn more about Code from

https://brainly.com/question/22654163

#SPJ1

A project manager has designed a new secure data center and has decided to use multifactor locks on each door to prevent unauthorized access. Compare the following types of locks that the project manager may use to determine which example the facility is utilizing.

Answers

The types of locks that the project manager may use to determine which example the facility is utilizing is said to be a lock that needs an employee to be able to use a smart card and also a  pin to enter at the same time.

How does multi-factor authentication work?

Multi-factor Authentication (MFA) is known to be a kind of an authentication method that needs the user to give two or a lot of verification factors to be able to have access to a given resource e.g. application.

Note that it is said to be a vital aspect of a strong identity and access management (IAM) policy and therefore, the types of locks that the project manager may use to determine which example the facility is utilizing is said to be a lock that needs an employee to be able to use a smart card and also a  pin to enter at the same time.

Learn more about multifactor locks from

https://brainly.com/question/27560968

#SPJ1

What is the current situation of drone technology in emergency rescue and recovery

Answers

Drones are now being used by researchers, notably those at the University of Montana, to forecast how to respond to disasters, particularly forest fires. Drones are equipped with sensors that can monitor wind speed and direction, position, location, humidity, and temperature. Major utility companies are looking into how technologies like drones and artificial intelligence may help to lower the likelihood of future fires and for infrastructure assessment to help minimize fire risk. Drones are now being used by California's emergency services to help find forest fires, which can help determine the kind and quantity of supplies needed on the site. Drones can be equipped with thermal detection sensors, which utilize infrared light to identify heat signatures and aid first responders find hotspots for fires.

What port on a name server is used for user datagram protocol (udp) name request packets?

Answers

The port name that is used on the server is port 53 over UDP for name resolution communications.

What is datagram protocol?

A datagram protocol is a member of the internet protocol. With this system, we can send messages and texts to the other protocol systems in applications, and other hosts on internet data protocol.

Port 53 is used for sending requests to other ports, and it is a single request service used by UDP. It requires a single UDP request from the clients.

Thus, port 53 on a name server is used for user datagram protocol.

To learn more about datagram protocol, refer to the below link:

https://brainly.com/question/27835392

#SPJ1

What is the advantage of 2023 murano’s available intelligent awd working in conjunction with vehicle dynamic control?.

Answers

The advantage of 2023 Murano's available intelligent awd working in conjunction with vehicle dynamic control is that helps the driver to be able to stand or maintain cornering control.

What is cornering stability control?

The Cornering Stability Control is known to be the kicks in a car that if it senses that the car is going on a sharp corner, it can help to monitor the amount of braking force that is exerted on each wheel and help the car keep a straight line.

Hence, The advantage of 2023 Murano's available intelligent awd working in conjunction with vehicle dynamic control is that helps the driver to be able to stand or maintain cornering control.

Learn more about vehicle dynamic control from

https://brainly.com/question/14312189

#SPJ1

Which type of network is best for shayne?

Answers

PAN is known to be the type of network  that is best for shayne.

What is PAN in a network?

A personal area network (PAN) is known to be a form of an interconnection that is made by information technology devices and it is one that is found in the range of a specific person.

Hence, based on the above scenario, PAN is known to be the type of network  that is best for shayne.

See options below

Shayne keeps his home office computer on his desk. He wants to use a wireless keyboard and mouse, and to send output to his printer and receive input from his scanner wirelessly. Which type of network is best for Shayne?

WAN

PAN

MAN

LAN

Learn more about PAN from

https://brainly.com/question/14704303

#SPJ1

Define a function ConvertVolume() that takes one integer parameter as total Quartz, and two integer parameters passed by reference as gallons and quarts. The function converts total Quarts to gallons and quarts. The function does not return any value. Ex: If the input is 23, then the output is: 5 gallons and 3 quarts Note: totalQuarts / 4 computes the number of gallons, and totalQuarts % 4 computes the remaining quarts.

Answers

The program that illustrates the function ConvertVolume() that takes one integer parameter is illustrated below.

How to illustrate the program?

The program based on the information will be:

#include<iostream>

using namespace std;

void ConvertVolume(int totalTablespoons, int &cups, int &tablespoons) {

   // compute the cups and tablespoons

   // as they are passed by reference,

   // the change will also reflect in the main function

   cups = totalTablespoons / 16;

   tablespoons = totalTablespoons % 16;

}

int main() {

   int usrCups;

   int usrTablespoons;

   int totalTablespoons;

   

   // user input

   cin>>totalTablespoons;

   

   // call the function

   ConvertVolume(totalTablespoons, usrCups, usrTablespoons);

   

   // print the output

   cout<<usrCups<<" cups and "<<usrTablespoons<<" tablespoons"<<endl;

   

   return 0;

}

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

The five components of accounting systems are source documents, input devices, information processors, information storage, and output devices. Group startsTrue or False

Answers

Answer:

True

Explanation:

Source documents are business documents that track business transactions.

Input devices, like bar code scanners, keyboards, and modems, are tools used to enter transaction information into the accounting system.

Information processors take the raw data from the input devices and post it to ledgers, journals, and reports.

Information storage is the component of the system that stores the reports and ledgers created by the information processors.

Output devices like monitors, printers, and projectors are any devices that take information from the system storage and display it in a useful way.

These components are all what help an accounting system gather financial data, translate it into useful information, and communicate it with decision makers.

Answer:

true cause they are used to process information

A data analyst uses the SMART methodology to create a question that encourages change. This type of question can be described how

Answers

A data analyst uses the SMART methodology to create a question that encourages change, which can be described as an action-oriented question.

What is a data analyst?

A data analyst is a professional that studies information in order to obtain any type of outcome.

In computers, data analysts can use the SMART methodology which includes diverse criteria to increase the chances of success.

In conclusion, a data analyst uses the SMART methodology to create a question that encourages change, which can be described as an action-oriented question.

Learn more about data analysts here:

https://brainly.com/question/27960551

#SPJ1

Data Blank______ is the collection of data from various sources for the purpose of data processing. Multiple choice question. summary management aggregation

Answers

Answer: data aggregation

Explanation:

data aggregation

The ____________ layer of the osi model is responsible for data format translation

Answers

Answer:

Presentation

Explanation:

The sixth layer of the OSI model, responsible for translation, encryption, authentication, and data compression.

what are the uses of recycle bin​

Answers

Answer:

use of recycle bin-

It provides users the option to recover deleted files in Windows operating systems

What is an effective fully automated way to prevent malware from entering your system as an email attachment

Answers

An effective fully automated way to prevent malware from entering your system as an email attachment is to ensure that all security patches and updates are installed.

What is malware?

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes with the user's computer security and privacy.

Effective fully automated way to prevent malware

The following ways can be used to prevent malware;

Make sure all security patches and updates are installedInstall updates and patches as soon as possible to protect against malware and other digital threats. Turn on automatic updates whenever possible. use unique and strong passwords to secure your account.

Thus,  an effective fully automated way to prevent malware from entering your system as an email attachment is to ensure that all security patches and updates are installed.

Learn more about malware here: https://brainly.com/question/399317

#SPJ1

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol

Answers

In order to assist an end user, a help desk technician can use the network protocol with a default TCP/IP port number of 3389.

What is the TCP/IP protocol suite?

The TCP/IP protocol suite is an abbreviation for Transmission Control Protocol and Internet Protocol and it's a standard framework for the transmission (prepare and forward) of information on digital computers over the Internet.

In the Transmission Control Protocol and Internet Protocol (TCP/IP) suite, a help desk technician can use the network protocol with a default TCP/IP port number of 3389 to assist an end user by opening a graphical user interface to connect with the end user's Windows computer.

Read more on TCP here: brainly.com/question/17387945

#SPJ1

Write a while loop that adds 5 to userNum while userNum is less than 20, displaying the result after each addition. Ex: For userNum

Answers

#The loop that adds 5 to userNum while userNum is less than 20, displaying the result after each addition is given below.

What is a loop?

A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met.

The sample code related to the above function is given as?

// declaring variable userNum

var userNum = 5;

// variable ans to store all answers and print them in single line

// (as expected in sample output)

var ans = "";

// while loop, while userNum is <= 20

// (to get output 25 on screen, we need to run loop till less-than-equal) while(userNum <= 20) {

  userNum += 5;

  ans += userNum + " ";

}

// displaying final output on console

console.log(ans);  

Learn more about loops at;
https://brainly.com/question/26568485
#SPJ1

Which are the three most used languages for data science?

Answers

Answer: python, JavaScript, scala

Explanation:

When charlie attaches a file to an email message, the computer's __________ is responsible for managing his access to the location where the file is stored.

Answers

Answer:Operating system

Explanation:

When charlie attaches a file to an email message, the computer's File Management System is responsible for managing his access to the location where the file is stored. Data files are managed using file management software systems, sometimes known as file managers or file tracking software. Even though it is made to manage individual or group files, including records, office documents, and similar data, its capabilities are somewhat limited.

How files are stored on the computer?

Folders and drives both contain storage for files and folders. A storage device is a piece of equipment that can keep data safe long after the computer has been turned off. Here are a few illustrations of storage units. A device that reads and writes data to the hard disk is a hard disk drive.

For file maintenance (or management) tasks, a file management system is utilized. It is a kind of software that controls how computer systems' data files are organized. A file management system, which is meant to manage individual or group files, such as unique office papers and records, has limited capabilities.

Learn more about File Management systems here:

https://brainly.com/question/13013721

#SPJ2

In a DTP project, Fiona is looking for a way to make a page layout attractive to readers. Help Fiona pick the correct word to complete the sentence.
You’ll need a(n) _____ to capture the attention of your audience. It can be an illustration, a photograph, a block of bold text, or a quote in a column of white space.

Answers

You’ll need a(n)  a block of bold text to capture the attention of your audience.

How do you make text bold in pages?

First one need to select Format  and then Font and then Bold.

Note that  by bolding a selected text, it can capture the mind of the people to the page layout.

Hence, You’ll need a(n)  a block of bold text to capture the attention of your audience.

Learn more about  page layout  from

https://brainly.com/question/12129748

#SPJ1

The crosstab query wizard asks you to select fields for the _____, column headings, and values

Answers

The crosstab query wizard asks you to select fields for the row headings, column headings, and values.

What is crosstab?

Image result for Crosstab Query Wizard prompts you to select the fields for the row titles, column titles and values. A crosstab query is a type of query. When you run a crosstab query, the results are displayed in a datasheet that has a different structure than other types of datasheets.

The row heading or row header is the gray-colored column located to the left of column 1 in the worksheet containing the numbers (1, 2, 3, etc.) used to identify each row in the worksheet.

See more about crosstab at brainly.com/question/23716013

#SPJ1

An application is hosted on an EC2 instance in a VPC. The instance is in a subnet in the VPC, and the instance has a public IP address. There is also an internet gateway and a security group with the proper ingress configured. But your testers are unable to access the instance from the Internet. What could be the problem

Answers

In this scenario, the most likely problem is to: D. add a route to the route table, from the subnet containing the instance, to the Internet Gateway.

What is RIP?

RIP is an acronym for Routing Information Protocol and it can be defined as an intradomain routing protocol which is typically designed and developed based on distance vector routing.

The types of RIP.

In Computer networking, there are two main types of Routing Information Protocol (RIP) and these include:

RIP version 1.RIP version 2.

RIP version 2 such as an EC2 instance in a VPC are generally designed and developed to include subnet masks. This ultimately implies that, the most likely solution to the problem is to add a route to the subnet’s routing table, which is from the subnet containing the instance and then to the Internet Gateway.

Read more on routing protocol here: https://brainly.com/question/24812743

#SPJ1

Complete Question:

An application is hosted on an EC2 instance in a VPC. The instance is in a subnet in the VPC, and the instance has a public IP address. There is also an internet gateway and a security group with the proper ingress configured. But your testers are unable to access the instance from the Internet. What could be the problem?

A. Make sure the instance has a private IP address.

B. Add a route to the route table, from the subnet containing the instance, to the Internet Gateway.

C. A NAT gateway needs to be configured.

D. A Virtual private gateway needs to be configured.

(Convert decimals to fractions) Write a program that prompts the user to enter a decimal number and displays the number in a fraction. Hint: read the decimal number as a string, extract the integer part and fractional part from the string, and use the BigInteger implementation of the Rational class in Programming

Answers

The given program that prompts the user to enter a decimal number and displays the number in a fraction is:

import java.math.BigInteger;

import java.util.Scanner;

public class Exercise_13_19 {

/** Main method */

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 // Prompt the user to enter a decimal number

 System.out.print("Enter a decimal number: ");

 String[] decimal = input.nextLine().split("[.]");

 // Create a Rational object of the integer part of the decimal number

 Rational r1 = new Rational(new BigInteger(decimal[0]), BigInteger.ONE);

 // Create a Rational object of the fractional part of the decimal number

 Rational r2 = new Rational(new BigInteger(decimal[1]), new BigInteger(

  String.valueOf((int)Math.pow(10, decimal[1].length()))));

 // Display fraction number

 System.out.println("The fraction number is " +

  (decimal[0].charAt(0) == '-' ? (r1).subtract(r2) : (r1).add(r2)));

}

}

Read more about java programming here:

https://brainly.com/question/26952414

#SPJ1

What is the correct term for files copied to a secondary location for preservation purposes?.

Answers

The correct term for files copied to a secondary location for preservation purposes is backup.

What is a Backup?

This refers to the movement of files from one location to another for storage purposes.

Hence, we can see that this is done in order to preserve the files so that should the first memory location get compromised, it can be easily retrieved and this helps to prevent data loss.

Read more about backups here:

https://brainly.com/question/27960592

#SPJ1

Enter a formula in cell C13 to look up the registration fee for the first vehicle. Use the vehicle type in cell C4 as the Lookup_value argument. Use the RegistrationFees named range as the Table_array argument. The registration fees are located in column 2 of the data table. Require an exact match.

Answers

The formula that depicts the registration fee on the computer is Formula at C13 : =VLOOKUP(C4,Data!$B$10:$C$17,2,0)

How to illustrate the information?

A computer program is a sequence or set of instructions in a programming language for a computer to execute.

Computer programs are one component of software, which also includes documentation and other intangible components. A computer program in its human-readable form is called source code

In this case, enter a formula in cell C13 to look up the registration fee for the first vehicle.

Then, one can use the vehicle type in cell C4 as the Lookup_value argument and then use the RegistrationFees named range as the Table_array argument.

Learn more about computer on:

https://brainly.com/question/24540334

#SPJ1

Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused about the difference between latency and jitter. What is the BEST way to explain the difference

Answers

The best way to explain the difference is option A: Jitter is the up and down variation in latency.

What are VoIP services?

Voice over Internet Protocol (VoIP), is known to be a form of a technology that gives one room to be able to make voice calls via the use of a broadband Internet connection.

In the case above, The best way to explain the difference is option A: Jitter is the up and down variation in latency as it is the only best option.

See options below

Jitter is the up and down variation in latency.

Latency is the up and down variation in jitter.

Jitter is caused by an inadequate codec.

Latency is caused by sampling; jitter is not.

Learn more about latency from

https://brainly.com/question/27013190

#SPJ1

Modify the CharacterInfo class shown in Figure 7-3 so that the tested character is retrieved from user input.

Answers

The tested character is modified as given below. See the definition of tested character below.

What is characterization testing?

Michael Feathers created the phrase "characterization testing."

A characterization test (also known as Golden Master Testing) in computer programming.

It is a method of describing (characterizing) the actual behavior of an existing piece of software and thereby protecting legacy code against unwanted modifications through automated testing.

What is the modified characterInfo class?

Run on java, the modified characterInfo class is given as follows:

//import packages

import java.util.Scanner;

//Java class

public class InputCharacterInfo {

   //entry point of the program , main method

   public static void main(String[] args) {

       //creating object of Scanner class

       Scanner sc=new Scanner(System.in);

       //asking user to enter character

       System.out.print("Enter a character : ");

       //reading character

       char aChar=sc.next().charAt(0);

       System.out.println("The character is "+aChar);

       if(Character.isUpperCase(aChar))

           System.out.println(aChar+" is uppercase");

       else

           System.out.println(aChar+" is not uppercase");

       if(Character.isLowerCase(aChar))

           System.out.println(aChar+" is lowercase");

       else

           System.out.println(aChar+" is not lowercase");

       aChar=Character.toLowerCase(aChar);

           System.out.println("After toLowerCase(), aChar is "+aChar);

       aChar=Character.toUpperCase(aChar);

           System.out.println("After toUpperCase(), aChar is "+aChar);        

   }

}

Learn more about characterization testing in programming at;
https://brainly.com/question/13142406
#SPJ1

What tool allows you to search external competitive intelligence research?

Answers

Answer:

SocialPeta

Explanation:

Which type of loop is specifically designed to initialize, test, and increment or decrement a counter variable

Answers

A type of loop which is specifically designed and written to initialize, test, and increment or decrement a counter variable is referred to as a for loop.

What is a for statement?

A for statement can be defined as a type of statement (loop) that is designed and written by a computer programmer to repeat an action or event in a software program for a specific number of time.

In Computer programming, a for statement is a type of loop which contains three expressions and these include the following:

InitializationTestUpdate (increment or decrement).

In conclusion, we can infer and logically deduce that a for loop is a type of loop which is specifically designed and written to initialize, test, and update (increment or decrement) a counter variable

Read more on statements here: brainly.com/question/18736215

#SPJ1

Variables that can take only 2 variables are referred to as which one of the following?

Answers

Answer:

Binary variable

Explanation:

These are variables that can only take 2 values.

When a variable has only two possible levels, it is referred to as binary or dichotomous. Most of the time, these variables can be asked in a “yes/no” manner. A binary variable is something like a person's smoking status.

What Variables that can take only 2 variables?

Numerical and categorical. Then, each category is divided into two subcategories: discrete or continuous for numeric variables, and nominal or ordinal for categorical variables.

In their investigations, psychologists frequently use several dependent variables. The main justification for this is that it makes it simple for them to quickly and cheaply respond to more study inquiries.

A naming scale is one in which variables are merely “named” or labelled, without regard to their order. Beyond just identifying them, the variables on an ordinal scale have a precise order.

Therefore, Labels, an order, and a specified interval are provided for each of the variable possibilities in an interval scale.

Learn more about variables here:

https://brainly.com/question/17344045

#SPJ2

Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of access control is Ed concerned about

Answers

The phase of access control that one can say that Ed is more concerned about is called Accountability.

What is accountability?

Accountability is known to be one that removes the time and effort you that is used on distracting activities and a lot of unproductive behavior and it makes one to be more focused.

Hence, The phase of access control that one can say that Ed is more concerned about is called Accountability.

Learn more about Accountability from

https://brainly.com/question/27958508

#SPJ1

Compared with a large-scale integrated multi-purpose computer, a quantum computer is a ____ computer.

Answers

Answer:

Compared with a large-scale integrated multi-purpose computer, a quantum computer is a high-powered multipurpose application of a quantum computer.

Other Questions
ALOT OF POINTS PLZ HURRYQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQWhat does Newton's third law say about why momentum is conserved in collisions?A: Equal Forces act in equal times, so the change in momentum for both objects must be equal.B: Unequal forces act for unequal times, so the change in momentum for both objects must be unequal.C: Equal forces act for unequal times, so the change in momentum for both objects must be equal.D: Unequal forces act for equal times, so the change in momentum for both objects must be equal. If a varies directly as the cube root of b and if a=3 and b=64.find the formula connecting the variables hence find b when a=15/4 The Senate and Assemblies in Ancient Rome was like what American government bodies today? aThe Congress bThe Consul cThe Twelve Tables dPresidential Veto A cab company charges a $3.95 flat fee for rides up to 15 miles. For rides over 15 miles, the company charges the $3.95 flat fee and $1.25 per mile for every mile over 15 miles up to 75 miles. For rides over 75 miles the company charges a flat fee of $78.95 and $0.75 per mile over 75 miles. Using this information, write an equation that represents the total cost of the trip as a function of the number of miles traveled. (Remember: Identify your input and output variables, and use proper notation I recommend you handwrite your function and add a picture in to this document) Define dietary energy consumption: How do I make the pain go away? Each unit on the grid represents 5feet. About how far, in feet, is thedrinking fountain fromthe bench?A. 8.5 feetB. 37.1 feetC. 33.5 feetD. 42.7 feet When a number is increased by 9.5%, the result is 58. What is the original number to the nearest tenth?(I've seen other questions like this, but the answer is wrong. It's not 50 or 52.49 or 52.5.) Complete each sentence with the correct form of the most logical item from the word bank Only need last 4Will mark brainlist!! Sarah has $1000 in the bank. she took out $50 to buy supplies. What percentage of savings did she take out? Name one organism that produces glucose through the process of chemosynthesis. Explain why it cannot produce glucose using photosynthesis. Please help me one more time Please help! Which of the following sentences does not belong in this illustrationparagraph?The Hound of the Baskervilles is a masterpiece amongclassic mysteries. Sir Arthur Conan Doyle would havepreferred to write historical fiction. Doyle keeps theaudience riveted as he unfolds the terrible tale of thedevilish dog on the moors of Dartmouth. As he unfolds themystery of the terrifying dog and the murders for which itis responsible, the reader cannot help but be caught up inthe terror of the black nights on the moor where evil ispresent. In this novel, Doyle truly creates a detective tourde force.A. The Hound of the Baskervilles is a masterpiece among classicmysteriesB. In this novel. Dovle truly creates a detective tour de force.C. Sir Arthur Conan Doyle would have preferred to write historical fiction.D. All of the above in the paragraph. I don't know this question. I REALLY NEED HELP!!! Tell whether the ordered pair is a solution to the system of linear equations. 1 point(-2,-1); 2x 4y= -86x + 5y = -7YesNoMaybeTell whether the ordered nair is a solution to the Do you guys mine lending me a hand? Write code to take two words from the user. The program should convert these to lower case, then compare them: printing a positive number if string1 appears after string2 alphabetically, a negative number if string1 appears before string2 alphabetically and zero if the two strings are identical. Make sure your program does not produce any additional numerical output other than this number or it may not be graded correctly. What is Exploring technology? As every amusement park fan knows, a Ferris wheel is a ride consisting of seats mounted on a tall ring that rotates around a horizontal axis. When you ride in a Ferris wheel at constant speed, what are the directions of your acceleration and the normal force on you (from the always upright seat) as you pass through (a) the highest point and (b) the lowest point of the ride Elizabeth and McKenna are going to the county fair on free student admission night. Elizabeth and McKenna will be able to get in the fair for free however the fair charges $2 per ride. The girls want to know how many ride they can ride and how much will it cost them.WRITE AN EQUATION TO SHOW THE REALTIONSHIP between the independent and dependent variables?!?! ASAP I NEED ANSWER