1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
3 years ago
15

Black and white squares codehs, i need the whole code (40 points for correct answer)

Computers and Technology
2 answers:
ludmilkaskok [199]3 years ago
3 0

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

atroni [7]3 years ago
3 0

Answer:

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

You might be interested in
In your opinion, why did Proponents<br>of IPs used IPV6 instead of IPv5​
frutty [35]

Answer:

The following where many reasons why IPv6 was used instead of IPv5 which are the limitation of it's 32 bit address, IPv5 began or used with a different name called Internet streaming, IPv6 provides unlimited addressing, because it comprises of 128 bit.

Explanation:

Solution:

The following reasons why Proponents  of IPs used IPV6 instead of IPv5​ is stated as follows:

  • Due to its limited 32 bit addressing
  • IPv6 offers almost unlimited addressing because of its 128-bit addressing
  • IPv5 started under a different name which is internet stream(ST)
  • ST(Internet streaming) was developed for streaming video and voice
  • ST was developed by Apple, NeXT, and Sun Microsystems
  • ST was effective on specific frequency to carry out communication
5 0
3 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
A file is to be shared among different processes, each of which has a unique number. The file can beaccessed simultaneously by s
Finger [1]

Answer:

int sumid=0;    /* Shared var that contains the sum of the process ids currently accessing the file */

int waiting=0;   /* Number of process waiting on the semaphore OkToAccess */

semaphore mutex=1;   /* Our good old Semaphore variable ;) */

semaphore OKToAccess=0;    /* The synchronization semaphore */

get_access(int id)

{

    sem_wait(mutex);

    while(sumid+id > n) {

        waiting++;

        sem_signal(mutex);

        sem_wait(OKToAccess);

        sem_wait(mutex);

    }

    sumid += id;

    sem_signal(mutex);

}

release_access(int id)

{

    int i;

    sem_wait(mutex);

    sumid -= id;

    for (i=0; i < waiting;++i) {

        sem_signal(OKToAccess);

    }

    waiting = 0;

    sem_signal(mutex);

}

main()

{

    get_access(id);

    do_stuff();

    release_access(id);

}

Some points to note about the solution:

release_access wakes up all waiting processes. It is NOT ok to wake up the first waiting process in this problem --- that process may have too large a value of id. Also, more than one process may be eligible to go in (if those processes have small ids) when one process releases access.

woken up processes try to see if they can get in. If not, they go back to sleep.

waiting is set to 0 in release_access after the for loop. That avoids unnecessary signals from subsequent release_accesses. Those signals would not make the solution wrong, just less efficient as processes will be woken up unnecessarily.

5 0
3 years ago
You work with alot of different documents in your internship with a software development company. What kinds of actions can you
Doss [256]

Answer:

Explanation:

Try as much as possible, to keep like files together in one folder. Even so there if you run into the hundreds or thousands, that is not going to be an easy thing do.

What ever you do, do clutter up your favorites bar, especially if your favorites spill over into where you have to push a button to get to them. Keep that bar open for what you really need on that bar. Mine has Brainly, Kitco, My Alberta Health, A graphing program, a second graphing program, Amazon, a scrabble word finder, and a couple of other things. It

If you can, try and keep your favorites to something that would be useless to anyone else. My favorites are worthless to anyone else. But I play a lot of scrabble related games.

7 0
3 years ago
What does it mean when the lottery machine says function suppressed after scanning a ticket
WARRIOR [948]

When a machine  says function suppressed after scanning a ticket, it implies that you have won some certain amount.

<h3>What is lottery  wins?</h3>

This term connote that a person has  a winning ticket in a lottery that is often owned by a government.

Note that  if a winning ticket is scanned, the terminal often shows a message just for you and that suppress function implies  that your the ticket has won something.

Learn more about lottery  from

brainly.com/question/9216200

6 0
2 years ago
Other questions:
  • Riley is using access to collect data for a science project. he is creating a report and wants to apply predefined color and fon
    6·1 answer
  • First, launch NetBeans and close any previous projects that may be open (at the top menu go to File ==&gt; Close All Projects).
    6·1 answer
  • Please help ASAP, will mark brainliest!
    7·1 answer
  • What feature adjusts the top and bottom margins so that the text is centered vertically on the printed page?
    14·1 answer
  • Cora is writing a program to make a motorcycle racing game. If Cora wants to speed of the motorcycle to appear on the screen whe
    12·1 answer
  • What is the command to list files in Unix and Unix like operating system?​
    15·1 answer
  • Which option correctly identifies if the researcher’s approach was the best start in the following scenario and explains why?
    10·2 answers
  • Any correct answers will be helpful.
    13·1 answer
  • Which situation is the best choice for using telehealth?
    12·1 answer
  • Which one of the following does NOT contain a
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!