1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
3 years ago
9

Write a program that fills half the canvas with circles in a diagonal formation.

Computers and Technology
1 answer:
Dvinal [7]3 years ago
8 0

Answer:

Explanation:

function draw()

 {

 var ctx = document.getElementById("myCanvas").getContext("2d");

 var counter = 0;

 for (var i=0;i<6;i++)

 {

 for (var j=0;j<6;j++)

 {

 //Start from white and goes to black

 ctx.fillStyle = "rgb(" + Math.floor(255-42.5*i) + "," + Math.floor(255-42.5*i) +

 "," + Math.floor(255-42.5*j) + ")";

ctx.beginPath();

 if (i === counter && j === counter)

 {

 //creates the circles

 ctx.arc(25+j*50,30+i*50,20,0,Math.PI*2,true);

 ctx.fill();

 //creates a border around the circles so white one will be vissible

 ctx.stroke();

 }  

 }

 counter++;

 }

 }

 draw();

You might be interested in
Why is this cite so rigged
xxTIMURxx [149]
I don’t get what your asking?
8 0
3 years ago
A combination of numbers and symbols used to express a calculation. Question 11 options: Formula Formula Bar Worksheet Workbook
Lerok [7]

Answer:

Formula

Explanation:

Formulas are functions that can express a calculation.

6 0
3 years ago
Python Question Class 11 attached below
snow_tiger [21]
math = 2-2/3+2/5-2/7+2/9
Print(math)
Simple as that tell me if im wrong its been a while since i didn’t do python
6 0
3 years ago
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
3 years ago
Which statement reflect a culture that value collectivism
Morgarella [4.7K]

Answer: To be honest i believe its D. All of the above reflect collectivism

hope this helps :)

8 0
4 years ago
Other questions:
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • Which of the following is an example of fine art? 1. fashion 2. interior design 3. painting 4. product design
    7·2 answers
  • Write an SQL statement that uses all of the SQL built-in functions on the Quantity-OnHand column. Include meaningful column name
    14·1 answer
  • HELP ME FAST???
    15·1 answer
  • The GeForce GTX 1060 graphics card requires 120 W of power. You plan to install it in a PCIe 3.0 ×16 slot. Will you need to also
    13·1 answer
  • What is the most common password on the internet?
    11·2 answers
  • HELP PLEASE What is an internal part of a computer which contains all software programs installed on your computer?
    9·2 answers
  • How do you change your grade level
    10·1 answer
  • What are some real-life situations where multi-dimensional arrays might be useful?
    8·1 answer
  • Activity Sheet 2<br>A.Illustrate how to create the object below using draw and modify commands.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!