1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina18 [472]
3 years ago
11

Please Help!! How to code this in Python?

Computers and Technology
1 answer:
storchak [24]3 years ago
7 0

forget python try sketchware need some inbox me

You might be interested in
You have a Bluetooth headset that integrates with your computer so that you can talk to partners through Microsoft Lync. This is
otez555 [7]
I believe this is an example of a Wireless Personal Area Network (WPAN). This type of network provides a low range wireless network that can interconnect devices near each other. So, Bluetooth devices such as a Bluetooth headset would be an example of WPAN.
5 0
3 years ago
Read 2 more answers
Write an answer in three to five sentences that describes the photo, explains what better lighting would mean for your photograp
miskamm [114]

Lighting is an important aspect in creating a great photograph.

Not only does lighting determine brightness and darkness, but it also influences

  • tone,
  • mood, and
  • atmosphere.

As a result, proper light management and manipulation are required to get the

  • best texture,
  • richness of color, and
  • brightness on your objects.

<h3>What kind of light produces the best photos?</h3>

Because of its mobility, a speedlight or flash is frequently the ideal photographic illumination on-site. Speedlights can handle much of the work of studio strobes when used with an off-camera wireless flash system.

Learn more about lighting in photography:
brainly.com/question/2321244
#SPJ1

3 0
1 year ago
What is data security
NARA [144]
Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, tokenization, and key management practices that protect data across all applications and platforms.
5 0
3 years ago
write a program with total change amount as an integer input and output the change using the fewest coins, one coin type per lin
notka56 [123]

Answer:

Explanationoojhh

8 0
3 years ago
What are the 3 rules of music<br><br> ps: there is no music subject so i had to put something else
Kitty [74]

Answer:

Rules that apply to all situations and accasions in the music room

Explanation:

I hope this helps

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is a device driver?
    9·2 answers
  • Given a floating point variable fraction, write a statement that displays the value of fraction on the screen. Do not display an
    13·1 answer
  • The part of the computer that provides access to the internet is the-?
    15·2 answers
  • How can you tell that you're driving in the right direction?
    14·1 answer
  • In presentation software, what is the way that text and pictures are arranged on a page called?
    10·1 answer
  • What do level meters show?
    8·1 answer
  • Write a summary of five things that you learned about CSS. Do not copy and paste the information. Summarize each point in your o
    5·1 answer
  • Identify and explain 3 methods of automatically formatting documents​
    8·1 answer
  • Describe a cellular network, its principle<br> components and how it works.
    7·1 answer
  • What is a database and provide 2 examples of how you are using a database.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!