1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
4 years ago
15

IF ANYONE USES THE COMPUTER PROGRAM SCRATCH I NEED YOUR HELP!! 15 POINTS!!

Computers and Technology
2 answers:
klemol [59]4 years ago
7 0
Hello! Here are the correct answers:

Blank 1 = D) Reports true if the mouse button is pressed.

Blank 2 = D) Reports the x coordinate position of the mouse.

Blank 3 = C) Vertical Position of the mouse.

I hope you found my answers helpful! :)
Irina-Kira [14]4 years ago
4 0
The mouse down block C, 2) is c, and
You might be interested in
Can anyone answer this ​
Ivenika [448]

Answer:

I dont see the question

Explanation:

7 0
3 years ago
What are the benefits of a relationship in RDBMS <br>​
natali 33 [55]

Answer:

To sum up all the advantages of using the relational database over any other type of database, a relational database helps in maintaining the data integrity, data accuracy, reduces data redundancy to minimum or zero, data scalability, data flexibility and facilitates makes it easy to implement security methods.

Explanation:

I hope it helps you..

Just correct me if I'm wrong..

4 0
3 years ago
Which one of the following oscilloscope controls is used to move the trace up and down the screen vertically? A. Focus B. Sweep
Andre45 [30]
<span>the trace position is surprise surprise controlled by the position knob!</span>
4 0
4 years ago
When performing actions between your computer and one that is infected with a virus, which of the following offers No risk of yo
daser333 [38]

Answer:

d

Explanation:

7 0
3 years ago
\what security countermeasures can you enable on your wireless access point (wap) as part of a layered security solution for wla
dmitriy555 [2]
The security countermeasure that one can enable on a wireless access point as part of the layered solution for WLAN implementations would be to disable 802.1x . It is the one that provides a WEP and is very unsecure. Another is to change the SSID and to set the broadcast of the SSID to off.
5 0
4 years ago
Other questions:
  • Answer this question please
    6·1 answer
  • To gain one pound of fat, how many extra calories would you need to consume?
    12·1 answer
  • Trading your bicycle for a snowboard exemplifies ?
    15·1 answer
  • Which keyboard feature is a form feed character?
    15·1 answer
  • What is wrong with each of the following?
    6·1 answer
  • What is the maximum number of WildFire® appliances that can be grouped in to a WildFire® appliance cluster?
    7·1 answer
  • Trudy is preparing a reply to an email message. Before she could send out the message, she is called for a meeting. If Trudy has
    6·2 answers
  • Convert 128 GB into KB​
    8·2 answers
  • Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
    6·1 answer
  • Retype the paragraph with the corrections. There are 12 corrections. Look closely at the word and letter highlighted in yellow t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!