1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
3 years ago
6

What should you use as the argument for the goto() command?

Computers and Technology
1 answer:
Soloha48 [4]3 years ago
7 0
D. The X and Y coordinates of a point 

goto(21,60)

will make the turtle go to that specific location.
You might be interested in
A group of students want to create an educational online game for computer laboratory in their school which type of network will
Natali [406]

Answer:

A.LAN

Explanation:

LAN (Local area Network) is a type of data communication network which covers a small geographical area such as a school compound. This network can accommodate variety of electronic devices including computers, laptops, file servers, printers and modems. In this example, a room can be identified for the project to consist of more than 20 computers sharing a file server and a single hard drive.

Best wishes!

6 0
3 years ago
This is a python program.
denpristay [2]

Answer:

word = input("Type your name: ")

print(len(word))

Explanation:

The len function will count all the chars in the string.

7 0
3 years ago
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
4 years ago
How do you transfer music from external hard drive to a laptop?
weeeeeb [17]
You could download it to another device, and send the music to the laptop. That, or you can plug it into the USB port.
I hope this helps!
7 0
3 years ago
Which of the following tasks requires you to use the Tabs option?
Monica [59]
Indenting a paragraph :)
7 0
4 years ago
Other questions:
  • You have a number of digital pictures you recently took on your smartphone. You would like to share these pictures with all of y
    11·1 answer
  • A model release can be either oral or written down. true or false
    13·2 answers
  • Limitations of the information systems used by tesco​
    7·1 answer
  • The Daily Trumpet newspaper accepts classified advertisements in 15 categories such as Apartments for Rent and Pets for Sale. De
    9·1 answer
  • 2. Who created the first photograph? How was this done?
    14·2 answers
  • 2 Manter o autocontrole nos ajuda a evitar muitos problemas na nossa vida pessoal e no ambiente profissional. Em se tratando de
    14·1 answer
  • Write an algorithm and flowchart to calculate sum of two given numbers​
    13·1 answer
  • Write a function called prod_all that takes any number of arguments and returns their sum. Test the function by using these two
    10·1 answer
  • Re:
    15·1 answer
  • What method is used in the following line of code to associate clicking the left button with the event handler "clickSingle"?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!