1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
3 years ago
15

Black and white squares codehs, i need the whole code (40 points for correct answer)

Computers and Technology
2 answers:
ludmilkaskok [199]3 years ago
3 0

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

atroni [7]3 years ago
3 0

Answer:

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

You might be interested in
HELP PLEASE!!!! If you are continually building, reviewing, correcting a model of your system, and incrementally adding to the s
Novosadov [1.4K]

Answer: evolutionary with high fidelity

Explanation:

You are trying to improve the model so that it is able to match any problem. This is evolutionary.

At the same time the model seems to be close to being finalised with all the improvements being made. It is past the design stage and so must be a high fidelity prototype.

6 0
3 years ago
What are the services offered by web-based email?​
slega [8]

Answer:

Web based email is a service that allows to access and use electronic mail via web browser.

It allows clients to login into the email software running on a web server to compose, send and receive, delete mails basically.

8 0
3 years ago
1. ____________notes that can be attached to cells to add additional information that is not printed on the worksheet network dr
Anna71 [15]

1. <u>Comments</u> notes that can be attached to cells to add additional information that is not printed on the worksheet network drive.

2. <u>Footer</u> text and/or graphics that print at the bottom of each page headers.

3. <u>Headers</u> text and/or graphics that print at the top of each page rows.

4. <u>Margins</u> the white space left around the edges of the paper when a worksheet is printed comments.

5. <u>Network drive</u> location at a workplace for storing computer files footer.

6. <u>Rows</u> go across (horizontal) margins.

7. <u>Template</u> a file format used to create new files that contain the same data as the template.

<u>Explanation:</u>

On the off chance that you need to add a header or footer to all sheets, select each sheet by right-clicking one of the sheet tabs at the base of the Excel screen and clicking "Select All Sheets" in the spring up menu. It's genuinely basic to put an Excel header on all pages of all worksheets in your record.

A header is a line of content that shows up at the highest point of each page of a printed worksheet. You can change the direction of a worksheet, which is the situation of the substance with the goal that it prints either vertically or on a level plane on a page.

6 0
3 years ago
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
lesya692 [45]

Answer:

Explanation:

ae

5 0
3 years ago
Other questions:
  • Read the sentence from the first paragraph of Silent
    6·2 answers
  • In what way would web-based applications be useful to organizations?
    8·1 answer
  • The most commonly used software in the school systems that include word processor, spreadsheet, database management system, and
    6·1 answer
  • Mark for review (Will be highlighted on the review page) 11. A feature in Excel that allows you to graphically display in a sing
    10·1 answer
  • Which can be used to plan a program?
    13·2 answers
  • How many registers are there in the memory unit?
    8·1 answer
  • Do you all like IXL?
    8·1 answer
  • Which of the following was not something colonial children had to do? WILL GIVE BRANLEST ///////////////////////////////////////
    5·1 answer
  • Write a definition in your own words for GUI. Do not copy and paste please.
    8·2 answers
  • You are designing software for elderly people. Which two features can you
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!