1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
10

I need ideas for a scratch (imagine, share, and program) coding project. You can think of any project you'd like thanks! :)

Computers and Technology
2 answers:
alex41 [277]3 years ago
5 0

You did not include enough information.

svlad2 [7]3 years ago
5 0

Not sure about what your experience is, however I'm currently working on a 1 v 1 fighter in java-script. You might be interested in making your own rendition of that.

You might be interested in
If a cache access requires one clock cycle and dealing with cache misses requires an additional five clock cycles, which of the
DedPeter [7]

Answer:

B. 80%

Explanation:

To assertain:

1 hit takes 1 clock cycle while 1 miss takes 6 clock cycles

Assuming that:

  1. we have 100 accesses in total,
  2. p are hits,
  3. 100 - p are misses

So, p + (100 - p)*6 = 200\\ \\p+600-6p = 200\\\\-5p + 600 = 200\\\\5p = 600 -200\\\\p = \frac{400}{5} \\\\p= 80

Hence, option B. 80% will result in an effective access time of 2 clock cycles.

5 0
3 years ago
Why does a thermostat blade bend when heated or cooled?
earnstyle [38]
<span>c. it is made of two different materials.</span>
6 0
3 years ago
Which of the following would most likely be the target audience for a product
inna [77]

Answer:

B

Explanation:

They are saturday morning cartoons. Saturday morning cartoons are meant towards an audience of young children.

3 0
3 years ago
Read 2 more answers
Which of the following technologies is the best choice to convey urgent and highly sensitive information?a. Telephone b. Fax Let
Setler79 [48]

Answer:

C. E-mail

Explanation:

Electronic mail is the best choice to convey urgent and highly sensitive information

8 0
3 years ago
Altering grade records within a computer system is called
Cloud [144]
Altering grade records within a computer system is called forgery. The correct option among all the options given in the question is option "a". Any kind of altering using the computer without the consent of the proper authorities amounts to forgery. Forgery is a crime and a person can be jailed for such a serious offense.
4 0
3 years ago
Read 2 more answers
Other questions:
  • How do I learn coding??? ​
    5·2 answers
  • ) Which is true about the agile method?
    7·1 answer
  • Write a program that reads from a file called dictionary.txt which contains pairs of English and translated words separated by a
    12·1 answer
  • Can change the tab colors of the worksheets in excel
    13·1 answer
  • What is the difference between mutex lock and race condition​
    6·1 answer
  • Use the drop-down menus to explain what happens when a manager assigns a task in Outlook.
    6·2 answers
  • Write the functions of F1 to F12 on the keyboard​
    5·2 answers
  • You need to know more than just facts in order to use critical thinking skills.
    5·1 answer
  • Tom wants to find a number so that the sum of the digits of a two-digit number is 7. When reversing the digits, the number shoul
    15·1 answer
  • Please help me with coding!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!