1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
4 years ago
8

I am programming and i want to find the amount of move functions i need to complete the full square. the square is 65 by 70 circ

les. if each move function is about 18 circles, how many move functions do I need to complete the full square with 2 extra holes on each side for the turns?
Computers and Technology
1 answer:
Ahat [919]4 years ago
8 0
Not to be rude, but this is elementary school. How would anyone know this?
You might be interested in
An algorithm that could execute for an unknown amount of time because it depends on random numbers to exit a function may:______
Anna007 [38]

Answer:

c. suffer from indefinite postponement.

Explanation:

Algorithm is a set of rules that are followed in calculations or other problem solving operation by a computer. An algorithm may execute for unknown amount of time and it may suffer indefinite postponement. Algorithm depends on random numbers and it can execute continuously.

8 0
3 years ago
Two system administrators who work in two different buildings for the same company want to open a communication channel between
xz_007 [3.2K]

Bridge communication is the best solution to continue two different building for the same company.

<u>Explanation:</u>

Bridge communication to be placed in both building.master device should be placed in one building where should be connected to a high-end server and the slave device should be placed in another device.

Both the master device and salve should have a subsequent TCPIP address. For example, if the master  TCPIP address is 192.168.1.51 and the salve Tcpip address should be 192.168.1.52.

Very easy configure and communication is established. Both devices should be connected with nonstop current interruption. Once communication established speed depends on device capacity.

8 0
3 years ago
What are some catchy names for computer basics that you would put on a childrens poster?
Triss [41]

Answer:

not sure

Explanation:

6 0
3 years ago
A Uniform Resource Locator (URL) consists of three separate parts: network protocol, host, and web browser.
FrozenT [24]
That is false. are you doing it on a computer course.                                             <span />
3 0
3 years ago
Read 2 more answers
In NumPy, the_______
Nikolay [14]

Numpy is among the most prevalent science computer science bundles in Python, and the following are the discussion on the use of transpose function:

  • Transpose() is among the most important <em>matrix multiplication functions</em>.
  • It is used to changes elements of the <em><u>row into column</u></em> elements and the elements of the <em><u>column into rows</u></em> elements.
  • The output of this function is an original modified array.

Therefore, the transpose function in NumPy is being used to <em><u>switch positions of rows to columns or columns to rows</u></em>.

Learn more:

brainly.com/question/24763535

7 0
2 years ago
Other questions:
  • Which of the following is a correct definition of the term rectification? A. Rectification is the opposition to current flow in
    14·2 answers
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • Effective presentations vary the color scheme on each slide.
    7·2 answers
  • Explain briefly the purpose of the Computer Management Console in Microsoft Windows.
    12·1 answer
  • How would you define data science ?
    10·1 answer
  • What are the two types of formulas in excel
    9·1 answer
  • You are creating a presentation and you have come to the last slide. You still have more information to add. What should you do?
    7·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • Anyone want to play mine mincraft w/ me?
    9·1 answer
  • What do you mean by HDML coding ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!