1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Roman55 [17]
3 years ago
11

If I wanted to add code so that the costume of my sprite would change, what menu would I look under to find the "change costume"

block? (Give the name of the menu, not the color of the blocks) Group of answer choices Events Sound Control Looks Motion
Computers and Technology
1 answer:
Damm [24]3 years ago
7 0

Answer:

D.) Looks

the costume is technically the look of your sprite, so looks is the correct answer

You might be interested in
You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
irga5000 [103]

Answer:

Port security and violation mode.

Explanation:

A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.

The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.

The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.

4 0
3 years ago
A piece of data in a program whose value can change is called a(n) -
Arada [10]

Answer:

it is b variable

Explanation:

7 0
2 years ago
Read 2 more answers
You are working on a graphical app, which includes multiple different shapes. The given code declares a base Shape class with an
ycow [4]

Answer:

maybe

Explanation:

5 0
3 years ago
What are the types of technology that is use in education and what are their usages​
hjlf
Computers and Tablets I think
5 0
3 years ago
_____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard to the users interest
frozen [14]
Spam refers to large unsolicited email irregardless of the recipients views on the matter
5 0
4 years ago
Other questions:
  • The _________ specifies the station(s) for which the frame is intended. it may be a unique physical address, a group address, or
    5·1 answer
  • This program has some errors in it that are needed to be checked import java.io.*;
    13·1 answer
  • Which of the following goals is likely to require funding? Check all that apply.
    6·2 answers
  • Create a loop that will output all the multiples of 5 that are greater than zero and less than 60 (do not include 60). 5, 10, 15
    10·1 answer
  • Which guideline should you use when downloading software from the Internet?
    15·1 answer
  • An instruction book or program that takes users through a prescribed series of steps to learn how to use a program is called (a)
    10·1 answer
  • Which of the following statements is correct?
    11·1 answer
  • 1. Trust can be built in a relationship if:
    15·1 answer
  • Analog computers are general purpose computers : true ? or false ?​
    8·1 answer
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!