1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
3 years ago
15

In scratch coding what can I do with "when I recive messeage 1 "

Computers and Technology
1 answer:
Ilya [14]3 years ago
3 0

Answer:

Messages can be sent from other parts of your program.

The 'When receive message...' block allows you to receive those messages and start another part of your program. That way you can even have parts of you program run in parallel.

You might be interested in
You are building a computer from spare parts in the office. You build the computer and realize you have several different types
san4es73 [151]

Answer:

The pin count is the same

Explanation:

5 0
3 years ago
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two comp
noname [10]

Answer:Weak session ID generation algorithm

Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.

It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.

5 0
3 years ago
How would you define the rule of thirds?
mixer [17]

A pronciple of composition used fir centuries by artists and photographers or it is a method when used to frame a composition properly

8 0
3 years ago
In a remote control,infrared light( )to control TV<br>a.are used b.is used c.was used​
schepotkina [342]
B. Is used
If this is not the full statement it may be C
6 0
3 years ago
Match the network topology to its description. 1. bus data is certain to reach its destination 2. mesh no danger of data collisi
Ilya [14]

Answer:

3,1,2

Explanation:

6 0
3 years ago
Other questions:
  • Why is it difficult to enforce laws against intellectual theft?
    10·1 answer
  • What is the best web browser to use?
    9·2 answers
  • Climate is considered a(n) _______ limiting factor. (2 points)
    9·1 answer
  • Positive and negative impacts of chemical industries
    6·2 answers
  • Which of the following statements best compares and contrasts the role of story writers and script writers
    12·1 answer
  • So, I have strict parents &amp; need help, if u don’t know how to fix this after u read it, leave. I don’t want u getting points
    11·2 answers
  • @anthonydboss23<br><br> it’s goldielove6 <br><br> .....this is not a question everyone ignore this
    11·2 answers
  • A domain name is used to: *
    15·1 answer
  • 1. What is the Internet?
    8·2 answers
  • Which of the following is a key feature of a relational database?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!