1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
11

Does anybody have the code to 2.19.4: Guess a Number 2.0 in codeHS??

Computers and Technology
1 answer:
Tcecarenko [31]3 years ago
6 0

Answer:

speed(0)

secret_number = 9

pensize(10)

def green_check():

   color("green")

   penup()

   backward(25)

   right(45)

   pendown()

   forward(35)

   left(90)

   forward(75)

   

def draw_arrow():

   color("red")

   left(90)

   forward(50)

   left(45)

   backward(25)

   forward(25)

   right(90)

   backward(25)

   forward(25)

   left(45)

   backward(100)

   forward(50)

   right(90)

   

user_number = int(input("Guess a number between 1 and 10: "))

while user_number != secret_number:

   if user_number < secret_number:

       draw_arrow()

   else:

       left(180)

       draw_arrow()

       right(180)

   user_number = int(input("Guess a number between 1 and 10: "))

   clear()

   

green_check()speed(0)

secret_number = 9

pensize(10)

def green_check():

   color("green")

   penup()

   backward(25)

   right(45)

   pendown()

   forward(35)

   left(90)

   forward(75)

   

def draw_arrow():

   color("red")

   left(90)

   forward(50)

   left(45)

   backward(25)

   forward(25)

   right(90)

   backward(25)

   forward(25)

   left(45)

   backward(100)

   forward(50)

   right(90)

   

user_number = int(input("Guess a number between 1 and 10: "))

while user_number != secret_number:

   if user_number < secret_number:

       draw_arrow()

   else:

       left(180)

       draw_arrow()

       right(180)

   user_number = int(input("Guess a number between 1 and 10: "))

   clear()

   

green_check()

Explanation:

It's right

You might be interested in
In a nested repetition structure, one loop, referred to as the ____ loop, is placed entirely within another loop, called the ___
Alja [10]

Answer:

Inner, outer

Explanation:

Bruh. Its logic

3 0
3 years ago
Ssume that the timeout values for all three protocols
prisoha [69]

Answer:

The explanation of the question is described in the section below.

Explanation:

(a)

Go Back N :

A gives in a maximum of 9 pieces. Typically they will be sent back sections 1, 2, 3, 4, 5 and then re-sent segments 2, 3, 4 and 5.

B sends out 8 ACK's. They are 4 ACKS including 1 series and 4 ACKS with 2, 3, 4 and 5 series amounts.

Selective Repeat :

A sends in such max of 6 bits. Subsequently, segments 1, 2, 3, 4, 5 and earlier re-sent Segments 2 will be sent.

B assigns five ACKs. We are 4our ACKS with numbers 1, 3, 4, 5. However there is one sequence quantity 2 ACK.

TCP :

A assigns in a total of 6 bits. Originally, segments 1, 2, 3, 4, 5 and future re-sent Segments 2 have always been sent.

B sends five ACKs. There are 4 ACKS with either the number 2 series. There has been one ACK with a sequence of numbers 6. Remember that TCP always needs to send an ACK with a sequence number you anticipate.

(b)

This is although TCP utilizes convenient retransmission without searching for the time out.

So, it's the right answer.

4 0
3 years ago
Write a program that converts or calculates values. Use the following guidelines to write your program:
Reil [10]
Its easy just think of the program it’s a
5 0
4 years ago
Which best describes a career that would rely on both and employer and the federal government for funding? Electro-Mechanical Te
Dmitrij [34]

Answer:

<u>University Research Professor</u>

Explanation:

A university Professor can identify a research in his/her area of study and prepare a proposal for funding.This could be a research that will impact the nation thus a proposal could be presented to the federal government for funding. Additionally, the Professor can present the same proposal to the university research department to request funding of the project.The University which employed the Professor will now fund that project research and make it public to members of the community about the research that the University is undertaking with the professor as the leader of the research.

8 0
3 years ago
Steve left his computer switched on in his room and went out to have breakfast. When he returned, he saw that the monitor had be
yanalaym [24]

Answer:

B

Explanation:

5 0
3 years ago
Other questions:
  • A number used to encrypt data is called a(n ________. signature key cookie escrow
    10·1 answer
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • HELP PLEASE!!!!!!!!
    10·1 answer
  • 1. An auto repair shop charges as follows. Inspecting the vehicle costs $75. If no work needs to be done,
    9·1 answer
  • I swear I’m hopeless....
    8·1 answer
  • Organizational sites with .org domains are usually managed by what type of organization
    7·1 answer
  • Help me
    14·1 answer
  • Which approach to knowledge management capitalizes on tacit knowledge and requires heavy IT investment?
    8·1 answer
  • I make a budget of my 1st Gamer PC its good?
    9·1 answer
  • Select the correct answer from each drop-down menu.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!