It indicates if the canary word has been altered when the function returns that the program has detected a buffer overflow or other memory corruption caused by an external intruder attempting to exploit a vulnerability in the code.
What does it indicate if the canary word has been altered when the function returns?The canary word technique is a security mechanism used to detect buffer overflow attacks. By appending a canary word at the end of a buffer, the program can check whether the buffer has been overwritten beyond its allocated size.
If the canary word has been altered when the function returns, it indicates that a buffer overflow has occurred and that the program has been compromised.
The altered canary word triggers an intruder alert, which can be logged in the system's syslog for further analysis.
The program then halts to prevent any further damage from occurring. This technique is commonly used in programming languages such as C and C++ to protect against buffer overflow attacks.
Learn more about canary
brainly.com/question/1414562
#SPJ11
write the importance of software In computer
Answer:
Microsoft word, Excel, Access, Power point, Microsoft windows...........
Explanation:
I SERIOUSLY NEED HELP ON THIS WILL GIVE BRAINLIEST TO WHOEVER ANSWERS THIS RIGHT
Fill in the blanks to complete the “rows_asterisks” function. This function should print rows of asterisks (*), where the number of rows is equal to the “rows” variable. The number of asterisks per row should correspond to the row number (row 1 should have 1 asterisk, row 2 should have 2 asterisks, etc.). Complete the code so that “row_asterisks(5)” will print:
*
* *
* * *
* * * *
* * * * *
def rows_asterisks(rows):
# Complete the outer loop range to control the number of rows
for x in range(___):
# Complete the inner loop range to control the number of
# asterisks per row
for y in range(___):
# Prints one asterisk and one space
print("*", end=" ")
# An empty print() function inserts a line break at the
# end of the row
print()
rows_asterisks(5)
# Should print the asterisk rows shown above
The function should use a nested loop to print rows of asterisks, with the outer loop controlling the number of rows and the inner loop controlling the number of asterisks per row. The number of asterisks per row should correspond to the row number.
The given code demonstrates the implementation of a function named "rows_asterisks", which takes an integer variable "rows" as an argument. The purpose of this function is to print rows of asterisks, where the number of rows is equal to the "rows" variable, and the number of asterisks per row should correspond to the row number.
The function contains two for-loops, one for controlling the number of rows, and the other for controlling the number of asterisks per row. The first for-loop uses the range function to create a sequence of numbers from 0 to rows-1. This sequence is used to control the number of rows. The second for-loop uses the range function to create a sequence of numbers from 0 to x. This sequence is used to control the number of asterisks per row.
Within the second for-loop, the print function is used to print an asterisk and a space, with the "end" argument set to " ". This causes each asterisk to be printed on the same line, separated by a space. After the inner loop completes, an empty print function is used to insert a line break at the end of the row, before moving on to the next row.
When the function is called with an argument of 5, it should print the asterisk rows shown in the prompt.
Learn more about asterisks here:
brainly.com/question/29515279
#SPJ1
what transition documentation component is meant to assist local service providers in surmounting developing challenges?
Note that the transition documentation component is meant to assist local service providers in surmounting developing challenges is "expected future problems"
What is Transition Documentation?A transition plan details your present tasks and responsibilities to teach your successor how to execute your work properly and to assist you to move out of your position seamlessly.
A transition plan outlines your usual activities and responsibilities, as well as current projects, forthcoming deadlines, and essential contacts.
The goal of transition evaluations is to advise young people and their families about what to expect in the future so that they can prepare for adulthood. Transition evaluations should take place at the appropriate moment for the young person or caregiver to reach their goal.
Learn more about Transition Documentation:
https://brainly.com/question/1862731
#SPJ1
list some desirable characteristics of an ids.
Sure, here are some desirable characteristics of an Intrusion Detection System (IDS): Accuracy: An IDS should be able to accurately detect potential security breaches without producing too many false positives.Timeliness: An IDS should be able to detect and respond to security threats in a timely manner to prevent damage or loss.
Reliability: An IDS should be able to function reliably and consistently over a long period of time. Flexibility: An IDS should be able to adapt to new threats and be flexible enough to accommodate changes in the network infrastructure. Scalability: An IDS should be able to handle large amounts of data and scale to meet the needs of larger networks. Ease of use: An IDS should be easy to set up and use, with intuitive interfaces and clear reporting mechanisms.
Compatibility: An IDS should be compatible with other security tools and systems in the network. Cost-effectiveness: An IDS should be cost-effective and provide a good return on investment. Integration: An IDS should be able to integrate with other security tools and systems in the network to provide a comprehensive security solution. High accuracy: An effective IDS should accurately detect intrusions and minimize false alarms, ensuring that it can distinguish between normal traffic and potential threats. Real-time detection: An IDS should be capable of monitoring and analyzing network traffic in real time, allowing for prompt detection of intrusions and swift response to potential threats.
To know more about Intrusion Detection System visit :
https://brainly.com/question/31444077
#SPJ11
Jonah has finished his assignment and now wants to save his work with the title "Renaissance."
Which steps should Jonah follow to accomplish this?
navigate to the Quick Access bar, click the Save icon
navigate to the backstage view, click the Save As icon
click the File tab, click Save, type in the title, click Save
click the File tab, click Save As, type in the title, click Save
Answer:
Your answer is D.click the File tab, click Save As, type in the title, click Save
Explanation:
Answer:
C
Explanation:
took the quiz
Which mode is a stream algorithm taht concatenates an incrementing value with a nonce
The mode that concatenates an incrementing value with a nonce in a stream algorithm is called Counter Mode (CTR).
In CTR mode, a counter value is used as the input to a block cipher to generate a stream of key stream bits. This key stream is then XORed with the plaintext to produce the ciphertext. The nonce is a random value that is combined with the counter to create a unique input for each block of plaintext.
Here's an example to illustrate how CTR mode works:
Let's say we have a plaintext message "Hello, World!" and a nonce value of 123. The counter starts at 0 and increments by 1 for each block of plaintext.
1. The first block of plaintext is XORed with the key stream generated by encrypting the nonce and counter:
Plaintext: "Hello, Wo"
Key stream: (encryption of nonce + counter)
Ciphertext: (XOR of plaintext and key stream)
2. The second block of plaintext is XORed with the key stream generated by encrypting the nonce and counter + 1:
Plaintext: "rld!"
Key stream: (encryption of nonce + counter + 1)
Ciphertext: (XOR of plaintext and key stream)
To know more about algorithm visit:
https://brainly.com/question/33268466
#SPJ11
On a Windows 7 PC, the arp -a command is used
To view the current ARP cache, which contains a mapping of IP addresses to physical addresses on the network.
The arp -a command is a Windows command prompt command used to display the current ARP cache table. ARP (Address Resolution Protocol) is used to map an IP address to a physical (MAC) address on a network. When a device on the network needs to communicate with another device, it first checks its ARP cache table to see if it has the MAC address for the corresponding IP address. If not, it sends an ARP request to obtain the MAC address. Using the arp -a command allows you to view the current ARP cache on your Windows 7 PC.
learn more about ARP here:
https://brainly.com/question/31439874
#SPJ11
On a Windows 7 PC, the arp -a command is used_______.
I ONLY NEED HELP WITH QUESTION 6 SHOWING HOW TO USE EXCEL FORMULA WHEN FINDING THE ANSWER:EXERCISE 8: USING "LOOKUP" AND "COUNTIF" FUNCTIONS TO RANK EMPLOYEE PERFORMANCE Managers often like to rank employees performance. One scheme called "20-70-10," or more disparagingly as "Rank and Yank," categorizes the top 20 percent of employees as "Best," the middle 70 percent of employees "Near Best," and the bottom 10 percent as "Below Best." Go to the "Excel Student Spreadsheets BUS 2000" and click on the tab/worksheet labeled "Lookup". There you will find the performance ratings—on a ten-point scale—for 20 employees. Each employee has 3 performance ratings. • In the 5th Column, or Column E, calculate the average performance rating for each employee to one decimal place. • Then, in the 6th Column, or Column F, use the LOOKUP function below to classify the employees. o =LOOKUP(E2,{0,4,9,10},{"Below Best", "Near Best", "Best"}) The Lookup formula is structured as follows: • E2 is the Cell containing the data for which the calculation should be made. • 0 to 4 is the classification of "Below Best". • 4 to 9 is the classification of "Near Best". • 9 to 10 is the classification of "Best". • The words "Below Best", "Near Best", and "Best" are placed for each of the three classifications according to an employee’s average rating. Using the results, do the following: 1. List the names of the "Best" employees 2. List the names of the "Near Best" employees 3. List the names of the "Below Best" employees Next, redefine the Lookup function to classify employees as "Above Average" and "Below Average" based on whether they scored above or below an average of 5 in their three performance scores. Place the results in the 7th Column, or Column G. Next, we’re going to count how many employees were categorized as either "Above Average" or "Below Average". Place the following results in cells B23 and B24. 4. How many people scored "Above Average?" 5. How many people scored "Below Average?"To answer these questions, use the COUNTIF function. Its form is =COUNTIF(G2:G21, "Above Average"), where G2:G21 is the range of cells. In this example, the function counts the number of employees that were "Above Average" according to the former classification.Lastly, you will notice that more people scored "Above Average" than "Below Average" using 5 as the cut point. Redefine the LOOKUP formula so that a roughly equal number of employees are classified as "Above Average" and as "Below Average." 6. What is the new cutoff point?
The new cutoff point to classify employees as "Above Average" or "Below Average" is 4. This ensures a roughly equal distribution of employees in both categories, taking into account an average score of 5 as the dividing point.
To determine the new cutoff point in order to classify an equal number of employees as "Above Average" and "Below Average," we need to adjust the ranges in the LOOKUP function. Let's walk through the steps to find the new cutoff point
Step 1: Calculate the average performance rating for each employee in Column E.
Step 2: Use the LOOKUP function in Column F to classify employees as "Below Best," "Near Best," or "Best" based on their average rating. The formula is as follows:
=LOOKUP(E2, {0, 4, 9, 10}, {"Below Best", "Near Best", "Best"}
Step 3: List the names of the employees classified as "Best" in one column, the names of the employees classified as "Near Best" in another column, and the names of the employees classified as "Below Best" in a third column.
Step 4: Redefine the LOOKUP function in Column G to classify employees as "Above Average" or "Below Average" based on whether they scored above or below an average of 5 in their three performance scores. The formula is as follows:
=LOOKUP(E2, {0, 5, 10}, {"Below Average", "Above Average"}
Step 5: Use the COUNTIF function to count the number of employees categorized as "Above Average" and "Below Average." Place the results in cells B23 and B24. The formulas are as follows
B23: =COUNTIF(G2:G21, "Above Average")
B24: =COUNTIF(G2:G21, "Below Average")
Step 6: Compare he counts of employees classified as "Above Average" and "Below Average." If there are more employees classified as "Above Average," we need to adjust the cutoff point to achieve a roughly equal distribution.
To find the new cutoff point, we can adjust the ranges in the LOOKUP function in Column G. We want to divide the range of scores evenly between "Below Average" and "Above Average." Let's say we have N employees in total, and we want to divide them equally.
The new rnges in the LOOKUP function can be calculated as follows:
"Below Average" range: 0 to (5 - 1)
"Above Average" range: (5 - 1) to 1
Here, (5 - 1) represents the new cutoff point. We subtract 1 because we want to exclude the exact average score of 5 from either classification.
Therefore, the new cutoff point is 4.
To know more about EXCEL visit :
https://brainly.com/question/32047461
#SPJ11
Write programs in python to display “Valid Voter”. (condition : age of person should be
>=18).
Answer:
X = int(input("Age = ")
if (X >= 18):
print('Valid Voter')
Else:
return 0
Try it and let me know. :)
do you feel me?
take a look inside my brain
the people always different but it always feels the same
thats the real me
pop the champagne
the haters wanna hurt me and im laughin at the pain
It shows a larger thumbnail of the selected design and any available settings can be changed.
A. Margin guides
B. Customizable guides
C. Guides
D. Task pane
Answer:
customizable guides
thank u ❤
x = 10
y = 20
x > y
print("if statement")
print("else statement")
The way information is represented by humans and the way it is entered at the keyboard is known as the ____ of information. a. external representation c. user input b. internal representation d. user output
The way information is represented by humans and the way it is entered at the keyboard is known as the user input of information. So option c is the correct answer.
User input refers to the act of providing data or commands to a computer system through input devices like a keyboard.
It involves the process of users interacting with the system by entering information or commands to perform specific tasks or operations.
User input is a crucial aspect of human-computer interaction, allowing individuals to provide instructions or convey information to the computer system for processing and further action.
So the correct answer is option c. user input.
To learn more about information: https://brainly.com/question/24858866
#SPJ11
what is the difference between relay controls and communicating controls?
Explanation:
Control Relay is more commonly used in control circuits which are single phase circuits. Contactors are typically built for switching 3-phase load. A Contactor consists of a minimum one set of three phase power contacts and in some cases additional in built auxiliary contacts are also provided.
the first step in the sdlc is to define the problems to be addressed by the it system, examine different alternatives, and report the findings. this is called the step.
The first step in the SDLC is to define the problems to be addressed by the IT system, examine different alternatives, and report the findings. This is called the analysis step.
What is SDLC?The SDLC, or Systems Development Life Cycle, is a methodology for developing software applications. The Systems Development Life Cycle is a systematic approach to software development. This approach entails many stages, each with its objectives and outcomes. The five phases of the SDLC are planning, analysis, design, implementation, and maintenance. The analysis step is the second phase of the SDLC.
What happens in the analysis stage of the SDLC?The analysis step of the SDLC is where the development team examines the requirements gathered in the planning stage. The goal of the analysis phase is to comprehend the organization's requirements and objectives for a new system, as well as to determine whether or not a new system is required. The team examines current systems, identifies issues, and proposes potential solutions during the analysis phase. They are essentially analyzing the gathered requirements and evaluating them against the existing system to determine whether the suggested solution is feasible or not. The analysis stage of the SDLC concludes with a report summarizing the findings, and the team makes a recommendation on whether to proceed with the next phase or abandon the project.
Learn more about Systems Development Life Cycle here: https://brainly.com/question/14143685
#SPJ11
contrast the performance of the three techniques for allocating disk blocks (contiguous, linked, and indexed) for both sequential and ran-dom file access.
Linked allocation is suitable for random access as it allows flexibility in block placement. Each block contains a pointer to the next block, enabling easy navigation between blocks. However, it can result in slower access times due to the need to traverse the linked list.
Indexed allocation uses a separate index block to store pointers to individual disk blocks. It offers efficient random access as the index provides direct access to the required blocks. It also avoids external fragmentation. However, it introduces additional overhead for maintaining the index block.
Overall, the choice of allocation technique depends on the nature of file access (sequential or random) and the trade-offs between efficiency, flexibility, and fragmentation management.
Learn more about trade-offs between here:
https://brainly.com/question/30860238
#SPJ11
How do I do this?
Someone Please help
Answer:
I am done solving there was a synthetic error very sorry I tried to help for 30mins
What method do wireless networks use to determine if other nodes are currently broadcasting?
a. CSMA/CD
b. CSMA/CA
c. Dipole antenna
d. MIMO
CSMA/CA is the most common method used by wireless networks to determine if other nodes are currently broadcasting.
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is a method used by wireless networks to determine if other nodes are currently broadcasting. It works by having each node listen for a carrier signal before transmitting. If a node hears a carrier signal, it knows that another node is currently broadcasting and it waits for the other node to finish before transmitting. This prevents collisions, which can damage data.
CSMA/CA is more efficient than CSMA/CD (Carrier Sense Multiple Access with Collision Detection) because it prevents collisions from happening in the first place. CSMA/CD works by having each node listen for a carrier signal before transmitting. If a node hears a carrier signal, it knows that another node is currently broadcasting and it waits for a random amount of time before transmitting again. This can lead to collisions if two nodes both try to transmit at the same time after waiting for a random amount of time.
Dipole antennas are used to transmit and receive radio waves. They are not used to determine if other nodes are currently broadcasting.
MIMO (Multiple Input, Multiple Output) is a technology that uses multiple antennas to transmit and receive data. It can improve the performance of wireless networks by increasing the data rate and reducing the latency.
CSMA/CA is the most common method used by wireless networks to determine if other nodes are currently broadcasting. It is more efficient than CSMA/CD because it prevents collisions from happening in the first place.
To learn more about CSMA, visit here:
https://brainly.com/question/30637734
#SPJ11
help me and i'll mark brainliest
Answer: Help you with what
Explanation: This is so random lol but i guess im getting brain points or sum like that
People who make money investing in the stock market.....
A) get certain tax breaks.
B) should sell quickly to avoid taxes.
C) have to pay a fee to keep a stock.
D) must pay taxes on profits.
The answer is D ^^^
Answer:
D must pay taxes on profits.
Explanation:
what effect does the standby 2 track serial 0/0 25 interface configuration command have? (select two.)
The standby 2 track serial 0/0 25 interface configuration command has the effect of making Router A the backup router if the Serial 0/0 interface fails. You have two routers, A and B, and they should be setup for gateway redundancy.
What is an interface configuration command?Interface configuration instructions change how the interface works. A global configuration command that defines the interface type is always followed by an interface configuration command.
To reach interface configuration mode, use the interface interface-id command. The new popup indicates that you are in interface setup mode.
The show interface command displays the interface state of the router. This output includes, among other things, the following: Status of the interface (up/down) The interface's protocol state.
The interfaces configuration file at /etc/network/interfaces may be used to configure the bulk of the network. Here, you may assign an IP address to your network card (or use DHCP), define routing information, create IP masquerading, establish default routes, and much more.
Learn more about Routers:
https://brainly.com/question/13600794
#SPJ1
Construct an algorithm to print the first 20 numbers in the Fibonacci series (in mathematics) thanks
Answer:
0+1=1
1+1=2
1+2=3
2+3=5
3+5=8
5+8=13
Explanation:
// C++ program to print
// first n Fibonacci numbers
#include <bits/stdc++.h>
using namespace std;
// Function to print
// first n Fibonacci Numbers
void printFibonacciNumbers(int n)
{
int f1 = 0, f2 = 1, i;
if (n < 1)
return;
cout << f1 << " ";
for (i = 1; i < n; i++) {
cout << f2 << " ";
int next = f1 + f2;
f1 = f2;
f2 = next;
}
}
// Driver Code
int main()
{
printFibonacciNumbers(7);
return 0;
}
Which network topology is the most reliable and why?
OA. Ring topology, because data flows in one direction from node to
node around the ring
B. Star topology, because the server manages all network traffic in
one location, making it convenient
C. Bus topology, because on large networks it is easy to fix if a cable
fails and all nodes lose connection
о
D. Fully connected mesh topology, because it provides a connection
from each node to every other node in the network
Answer: D. Fully connected mesh topology, because it provides a connection from each node to every other node in the network
Explanation:
PACIFIC NORTHWEST
TREE OCTOPUS
Frem EXTORTION
TINE PACIO NORTINVEST TREE DOTOPUS
GERALONE
6. Which site is most likely to provide balanced information on eating a balanced
diet? (This is a question to think about and not actually visit these websites.)
Pork Producers Nutrition Page
Tufts University Nutrition Web Page
The Eat What You Want Page
Answer:
b) Tufts University Nutrition Web Page
Explanation:
The site that most likely provides a balanced information on eating a balanced diet is the Tufts University Nutrition Web Page
Tufts University is a moderate size, leading private research American higher education institution located in Massachusetts that offers degree programs on Food and Nutrition Policy and Programs
By comparison with the other sites which are;
a) Pork Producers Nutrition Page, which is expected to be related with pork production pork producers and pork consumers, based on the title focus, the information provided by the page is therefore, not meant for general use and therefore not meant to be balanced
c) The Eat What You Want Page, based on the of the page title literally which suggest the liberty for a user to eat what they want to eat does not appear to call for the input of an expert advice on nutrition, and therefore is not balanced.
what makes the young love tec
On their computers or mobiles. There essential communication and ind info tools.
Answer:
because it distracts them from realitiy plus its entertaining
Explanation:
When we are learning to count in school, which method do we use?
A: 9 numeral system
B: 10- base decimal method
C: Binary Number System
D: Advanced Counting System
Answer:
option no. c
Explanation:
To set the cookie in php for the variable 'name' with value 'bob', you need to call the _____________ function.
To set the cookie in php for the variable “name” with value “bob”, you need to call the functions setcookie(“name”, “bob”).
Php allows users to set cookies for the variables with specific values. The setcookie() function in php is the function that is called to set cookie values for any variable. To set a cookie in which the value “bob” is assigned to the variable “name”, the setcookie() function with two parameters is called. The first parameter is for the variable “name” that assigns name to cookie, and the second parameter is used to set the “value” of the named variable.
The syntax is:
setcookie (name, value);
Now according to the question’s requirement, the first parameter “name” remains unchanged because “name” is the variable for which you are required to set the value “bob”. Thus, the second parameter i.e., “value” is replaced with “bob”.
Now we can write it as:
setcookie (“name”, “bob”);
This is the required function in php to be called to set a cookie for the variable “name” with the value “bob”.
You can learn more about cookies at
https://brainly.com/question/14252552
#SPJ4
why are laptop and Planet of computers popular these days
Answer:
Laptop and palmtop are popular these days coz it is convenient 2 use .It is more flexible and powerful than desktop
Read more at Answer.Ya.Guru – https://answer.ya.guru/questions/9136472-why-are-laptop-and-planet-of-computers-popular-these-days.html
Explanation:
I need major help! The question is, Johnny Appleseed walked "n" feet in "m" minutes and then walked "f"
feet in (2m-5) minutes. At this average rate, how long would it take him to
travel 30 feet?
It would take (30 * (2m - 5)) / (n + f) minutes for Johnny Appleseed to travel 30 feet at the given average rate.
To determine the time it would take for Johnny Appleseed to travel 30 feet, we need to consider the average rate at which he walks. Given that he walked "n" feet in "m" minutes and then walked "f" feet in (2m-5) minutes, we can calculate the average rate using the formula: average rate = total distance / total time.
Since he walked a total distance of n + f feet in a total time of m + (2m-5) minutes, the average rate would be (n + f) / (m + (2m-5)) feet per minute.
To find the time it would take for him to travel 30 feet, we divide the distance by the average rate: time = distance/rate. Substituting the values, we get (30 * (2m - 5)) / (n + f) minutes.
Therefore, it would take (30 * (2m - 5)) / (n + f) minutes for Johnny Appleseed to travel 30 feet at the given average rate.
learn more about average rate here:
https://brainly.com/question/17650284
#SPJ11
The word add is used to add another item to a list.
True
False
A list is a data structure used to organize data.
True
False
Which tag would you use to end a section of bolded text?
The body tag is used to indicate the actual content of a webpage.
True
False
Planning can help reduce logic errors in programs.
True
False
When creating a list in Python, you should enclose each item in the list in parentheses.
True
False
Which tag should be placed after a link to another webpage?
Which tag provides information about the document as well as links to other scripts?
The World Wide Web and the internet are two different terms that refer to the same thing.
True
False
Every HTML document needs to begin with which of the following tags?
Fatima is creating a program. She wants to ask the user a question and then have a 30-second pause before the user is allowed to input an answer. Which line of code should Fatima use?
time.wait(30)
sleep.time(30)
time.pause(30)
time.sleep(30)
The internet existed before the World Wide Web.
True
False
If you are using an incrementing variable to iterate over a list, the variable should be set to zero before the loop begins.
True
False
Which of the following shows the correct way to make an image display at 50% of its original size?
img (height:50%;width:50%;)
img [height:50%;width:50%;]
img {height:50%width:50%}
img {height:50%;width:50%;}
Mark
What is the type of data in the list [103, 405, 527, 396, 503]?
Booleans
strings
integers
alphanumeric
Which of the following is an example of a membership operator?
%
IN
IF
=
Which of the following statements allows you to check on whether a certain item is in a list?
within
query
IN
included
What would be the result of running these three lines of code?
lunch = [“pizza”, “salad”, “sandwich”, “soup”, “tacos”]
# print(lunch[0])
print(lunch[1])
soup or salad
salad
pizza
pizza salad
A program should end if the number of the player’s lives is equal to zero. Which of the following lines of code would do that?
if lives = 0:
exit()
if lives == 0:
exit()
if lives < 0:
exit()
if lives == 0:
end()
Lei is creating a webpage that includes this line of code: The Universe of Skateboarding . Lei runs it and realizes that the entire page (not just the header) is in very large letters. How can Lei change this?
Remove the second .
Change the first to .
Change the second to .
Add a / to the final tag.
Answer:
WORD PROBLEMS
1. False
2. True
3. </b> or </strong>
4. True
5. True
6. False (unless the items are strings)
7. </a>
8. <head></head>
9. False (World Wide Web are the websites which communicate via the Internet. The Internet is a network that allows websites to communicate with each other)
10. <html>
11. time.sleep(30)
12. True
13. True
14. img {height:50%;width:50%;}
15. Integers
16. IN
17. IN
18. salad
19. if lives == 0:
exit()
20. maybe you can post a picture of it? I'm not quite understanding.
PICTURE PROBLEMS
1. + 1
2. gold -= 100
3. skill = skill - 2
4. time.sleep(60)
5. treasures.remove("silver")
Explanation:
Hope this helps