1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nexus9112 [7]
4 years ago
6

Question 4 (2 points)

Computers and Technology
2 answers:
rodikova [14]4 years ago
6 0

Answer:

Add the broadcast jump! code to the end of Scratch Cat's code.

Explanation:

If we broadcast the jump! code, then the Gobo will listen, and he will start jumping up and down. It looks like that he is not getting what Scratch Cat is saying, and if the message of Scratch Cat is broadcasted then Gobo will listen to what Scratch Cat is telling. Hence, the above option is the correct option.

Murljashka [212]4 years ago
5 0

Answer:

Add the broadcast jump code to the end of scratch cat's code.

Explanation:

That block sends a message and Gobo recives it.

You might be interested in
HELP PLEASE ASAP brainliest to accurate
Svet_ta [14]
A patent law

Patent laws deal with new inventions and relays to the owner’s exclusive right to the claimed invention. It is a right that should be granted by the government to an inventor, to exclude others from using, making, importing, or selling an invention. In this case, Jenna's secret, unique recipe is her patent.


3 0
3 years ago
Read 2 more answers
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
Which of the following algorithmic efficiencies would be considered LEAST efficient?
LenaWriter [7]

Answer:exponential

Explanation: I believe

8 0
3 years ago
What kind of heat we feel from the sun
ivolga24 [154]

Is it solar heat? ultraviolet heat? UV?
6 0
4 years ago
Read 2 more answers
Who are the key players in the internet
Anna007 [38]
Gamers my dude, dank memes are also the internet's finest minds
4 0
3 years ago
Other questions:
  • Windows uses a graphical user interface (GUI), which means: a user can carry out commands by clicking, dragging, or otherwise ma
    6·1 answer
  • What is micro blogging?
    13·1 answer
  • One thing we might want to know, given an input to a chatbot, is if the input is a question.
    10·1 answer
  • Write a function that accepts a list as an argument (assume the list contains integers) and returns the total of the values in t
    10·1 answer
  • Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 the output is
    5·1 answer
  • How do a router and switch differ when handling a message? Both a router and a switch use the message’s destination address to s
    10·1 answer
  • Stored information about a previous visit to a web site is called information _____.
    10·1 answer
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • Does nature behave the exact same way as fractals?
    15·1 answer
  • Evaluate how suitable the hardware would be for:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!