1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
3 years ago
15

Black and white squares codehs, i need the whole code (40 points for correct answer)

Computers and Technology
2 answers:
ludmilkaskok [199]3 years ago
3 0

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

atroni [7]3 years ago
3 0

Answer:

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

You might be interested in
How can you know if the person or organization providing the information has the credentials and knowledge to speak on this topi
Minchanka [31]

Answer:

The affiliation of the writer is that She is on the staff at the Center for Food Safety (CFS).

Explanation:

CFS stands for the Center for Food Safety which is the national non-profitable public environmental and interest advocacy organization that is working for protect the human health and environment by the curbing use of the harmful food productions technologies and by the promoting an organic and other form of the sustainable agriculture.

7 0
3 years ago
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
yuradex [85]

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

4 0
3 years ago
Blank text has a darker apperance than normal texts
sammy [17]
That's cool, I guess. What was the question?
4 0
3 years ago
Why was the microchip essential to improving computers?
-BARSIC- [3]
Because it downsized the scale of the computer itself.

5 0
3 years ago
Need help with java project please!!
Irina18 [472]
 can do c++ and javascript but I might be able to help
send me a message
7 0
4 years ago
Read 2 more answers
Other questions:
  • Which part of the os provides users and applications with an interface to manipulate files?
    8·1 answer
  • Please someone help me I hate python
    11·1 answer
  • Fill in the blank
    13·2 answers
  • An iPad Is An Example Of Which Type Of Computer?
    11·2 answers
  • Consider the following four 2-dimensional data points: (2, 2), (4, 4), (1, 5) and (5, 1). We can make use of the KL-Transform to
    6·1 answer
  • Programming challenge description: Given a string comprising just of the characters (,),{,},[,] determine if it is well-formed o
    13·1 answer
  • Suppose you will invest $100 per month at the beginning of the month for 40 years with interest rate
    5·1 answer
  • Hurry please
    12·1 answer
  • Use the_____icon to insert a new record.<br><br> A. *<br> B. X<br> C. =<br> D. &amp;
    11·1 answer
  • Alice recently purchased a new cell phone. After her vacation, Alice wanted to transfer her holiday photos to her computer to do
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!