1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
3 years ago
15

Black and white squares codehs, i need the whole code (40 points for correct answer)

Computers and Technology
2 answers:
ludmilkaskok [199]3 years ago
3 0

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

atroni [7]3 years ago
3 0

Answer:

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

You might be interested in
Technician A says that Teflon sealing rings require special tools for proper installation. Technician B says that warming a Tefl
bezimeni [28]

Answer:Both Technicians A and B are correct.

Explanation:Teflon is a florinated polymer it is polytetrafluroethylene (PTFE). It is widely used in different fields and the making of materials for both home and industrial use. Teflon rings does requires special tools for proper installation which is called TEFLON RING INSTALLER.

Warming the a Teflon ring in water or oil at 130-140°F for about 5 minutes will help to soften the material for easier installation. cover wear ring grooves with plastic tape.

8 0
3 years ago
The matrix theory is used in the ___ technique
wlad13 [49]

Answer:

The matrix theory is used by hill cipher.

Explanation:

Th technique which uses matrix theory is hill cipher technique.

Hill cipher technique is a polygraphic substitution cipher and it is based on linear algebra.

For encrypting a message in Hill Cipher technique each block of n letters is multiplied by an invertible matrix of nxn and that to against modulus 26 and  for the decryption of the message, every block is multiplied by the inverse of the matrix that was used for encryption.

3 0
3 years ago
You have been tasked with ensuring that access to certain server managed resources is only available to client devices with TPM
elixir [45]

Answer:

Device Health Attestation Services

Explanation:

Based on the scenario being described it can be said that the Windows Server role that can be used to automate this check is known as Device Health Attestation Services. This is a role that allows the administrator to automatically check if a device has the required trustworthy BIOS, TPM, or boot software enabled, as well as Bitlocker encryption.

7 0
3 years ago
Compression is the action of storing a piece of data with__________ bits.
soldi70 [24.7K]
The answer is fewer because I know a lot about tech I take classes
8 0
3 years ago
Read 2 more answers
What is the index of 7 in this list?<br> [5, 6, 10, 7, 3, 2.51]
kotykmax [81]
5 or 7 I believe Good luck!
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which item refers to an illusion of figures and shapes in motion, which we commonly see in movies and video games?
    9·1 answer
  • Which of the following is an example of a federal tax? A. Social Security tax B. Sales tax C. Property tax D. Transaction tax
    8·1 answer
  • What adds the element carbon to the environment
    10·2 answers
  • A file that is 242 megabytes is being downloaded. if the download is 15.4% complete, how many megabytes have been downloaded? ro
    5·1 answer
  • In computing the present value of the lease payments, the lessee should a.use both its incremental borrowing rate and the implic
    8·1 answer
  • Write the steps for renaming an existing folder​
    9·2 answers
  • What is human data,
    8·1 answer
  • Consider a disk that rotates at 3600 rpm. The seek time to move the head between adjacent tracks is 2 ms. There are 32 sectors p
    5·1 answer
  • PLEASE HELP AND FAST!!!!!<br>Which of the following devices uses binary code?
    6·2 answers
  • Convert (520)10 into base 16​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!