1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
1 year ago
5

Write a program that draws an 8 8 chess board, with alternating gray and white squares. You can use the SetTextColor and Gotoxy

procedures from the Irvine32 library
Computers and Technology
1 answer:
Kitty [74]1 year ago
7 0

Using the knowledge in computational language in C code it is possible to write a customized chess code.

<h3>Writting the C code as:</h3>

<em>Wait      PROTO</em>

<em>Write     PROTO</em>

<em>CrLf          PROTO</em>

<em>Delay         PROTO</em>

<em>Clrscr        PROTO</em>

<em> PROTO times:byte, color:dword</em>

<em>PROTO times:byte, color:dword</em>

<em>ROTO color:dword</em>

<em> PROTO color:dword</em>

<em>UpdateColor   PROTO</em>

See more about C code at brainly.com/question/15301012

#SPJ1

You might be interested in
True or False <br> Hebrew Bible and the Koran were first written in English.
lilavasa [31]

Answer:

<h2>FALSE </h2>

THE TWO HOLY BOOK, QUR AN AND HEBREW BIBLIE WAS WRITTEN IN THEIR NATIVE LANGUAGES, FOR EXAMPLE, KORAN IS WRITTEN IN ARABIC AND THE BIBLE WAS WRITTEN IN GREEK AND HEBREW. ACTUALLY THEY WERE TRANSLATED SO EVERYONE CSN UNDERSTAND WHAT IT SAYS.

BRAINLIEST PLEASE

❤❤❤❤❤❤❤❤

6 0
2 years ago
Which two components are configured via software in order for a PC to participate in a network environment
dalvyx [7]

Answer:

IP address and subnet mask.

Explanation:

The two components which are configured via software in order for a personal computer (PC) to participate in a network environment are;

I. IP address: it is an acronym for internet protocol address and can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6). An example of an IPv4 address is 192.168.1.0.

II. Subnet mask: this is a logical segmentation or subdivision of an internet protocol (IP) network so as to accommodate more hosts (computer systems). An example of a subnet mask is 255.255.0.0.

6 0
2 years ago
Which of the following are ways that
Viefleur [7K]

Answer:

A and b

Explanation:

3 0
2 years ago
(Financial application: compound value) Suppose you save $100 each month into savings account with an annual interest rate of 5%
Nostrana [21]

Solution:

initial = float(eval(input('Enter the monthly saving amount: ')))

x = (1 + 0.00417)

month_one = initial * x

month_two = (initial + month_one) * x  

month_three = (initial + month_two) * x  

month_four = (initial + month_three) * x

month_five = (initial + month_four) * x  

month_six = (initial + month_five) * x  

print('The sixth month value is: '+str(month_six))  

Don't forget the saving amount, and initialize the balance with that amount. Inside the loop, work out and add the interest and then add the saving amount for the next month.

balance = 801

for month in range(6):

  balance = balance * (1.00417)

print(balance)

7 0
3 years ago
The mean life of a certain computer hard disk in continual use is 8 years. (a) How long a warranty should be offered if the vend
Allushta [10]

Answer:

a) 0.843 years

b) 1.785 years

Explanation:

See attached pictures for detailed explanation.

4 0
3 years ago
Other questions:
  • When you make a pointer variable im C++, is star label a must?
    9·1 answer
  • If I put a short clip from a copyrighted video to Facebook and make it only viewable to friends, is that illegal?
    12·1 answer
  • Plz help! 3 questions! 1.The ideal light to use is.... A.front light B.a combination of side and back light C.a combination of f
    10·1 answer
  • What is the difference between Google and a subject directory like Yahoo Directory or Infomine?
    14·2 answers
  • What encryption method is used by WPA for wireless networks?
    7·1 answer
  • 5. Question<br> The control flag that isn't really in use by modern networks is the<br> flag.
    15·1 answer
  • A process that rearranges the data and objects in a database to decrease its file size, thereby making more space available on y
    11·1 answer
  • Write a program which asks the user for their name and age. The program should then print a sentence.
    14·1 answer
  • Creating Classes
    10·1 answer
  • What are some applications of computer in public administration?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!