1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
2 years ago
8

Please help!!!

Computers and Technology
1 answer:
Alchen [17]2 years ago
6 0

The most probable reason why your code for the dog turning right instead of is because your conditional statements are not satisfied.

<h3>What is Debugging?</h3>

This refers to the identification and removal of errors in a given code or hardware component.

Hence, we can see that you should note that you are using teh ifElse conditional statement to execute your code and you stated that the dog would turn right if:

  1. The left side is blocked
  2. If there are balls present.

Therefore, there are balls present and also the left side is blocked which causes your dog to turn right because it is executing the else statement.

Read more about debugging here:

brainly.com/question/16813327

#SPJ1

You might be interested in
Describe how spacecraft evolved from the US Mercury to contemporary space shuttles.
pashok25 [27]

Answer:

Several of the subsystems evolved during the program through design changes: The parachute system, essential for booster recovery, was redesigned with larger parachutes in 1983. Frangible nuts, used in the space shuttle pad hold down and release system, were redesigned in 2008.

8 0
2 years ago
Universal containers regularly imports Accounts from an external order system that has its own ID field for each record.What sho
Vikki [24]

Answer:

B. Create a unique External ID field on Accounts in SFDC for matching.                                      

Explanation:

  • External ID is used to prevent duplicate records from being created as a consequence of the import operation, when importing custom objects or person accounts.
  • An external ID is a specific field that contains the External ID attribute.
  • External ID has unique record identifiers from a system that is outside the Salesforce.
  • When this option is selected Data Import Wizard identifies existing Salesforce records with external IDs that match the values in import file.
  • The External ID field enables to keep unique record IDs from an external system, usually for integration.
  • External ID field values should be unique and determine whether or not value are case sensitive can also be determined. For example XYZ and xyz will not be considered same if case sensitive option is not selected.

6 0
2 years ago
What kind of network is built around the concept of low-power transmitters built on towers that can use the same radio frequency
marishachu [46]

Answer:

Cellular telephone network

Explanation:

Cellular telephone network utilizes the concept of the such towers that allows the use of transmitters of low power and make use of the same channel for the radio frequency.

Cellular network is the network for communication in which the end link of the network is wireless. This type type of network is distributed and makes use of the radio waves over the land areas of the network referred to as the 'cells'. These cells are served individually by the fixed base station that enables the transmission of calls over a wide range through wireless links to a fixed receiver

4 0
3 years ago
The concept of the internet was developed by the u.s. department of defense as a network that ________ in event of an attack.
Shkiper50 [21]
<span>Would not be easily distrupted</span>
8 0
3 years ago
Researchers today can use technology such as CAT scans and fMRI scans to measure brain activity. Some researchers ask their subj
Lerok [7]

Answer:

Introspection , Titchener

Explanation:

7 0
3 years ago
Other questions:
  • The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
    7·1 answer
  • In which format is information stored on a hard drive?
    5·1 answer
  • A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th
    8·1 answer
  • Write a C program that uses a while statement to determine and print the largest of 10 numbers input by the user. Your program s
    6·1 answer
  • PLZ ANSWER QUICKLY!!
    12·1 answer
  • Salvado has a flash dish of is GB
    6·1 answer
  • Identify five type of application software​
    12·2 answers
  • Why should we not underestimate the widespread of mass media?
    13·1 answer
  • Explain how mobile phone production could be more sustainable​
    8·2 answers
  • You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report need
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!