1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nexus9112 [7]
3 years ago
6

Question 4 (2 points)

Computers and Technology
2 answers:
rodikova [14]3 years ago
6 0

Answer:

Add the broadcast jump! code to the end of Scratch Cat's code.

Explanation:

If we broadcast the jump! code, then the Gobo will listen, and he will start jumping up and down. It looks like that he is not getting what Scratch Cat is saying, and if the message of Scratch Cat is broadcasted then Gobo will listen to what Scratch Cat is telling. Hence, the above option is the correct option.

Murljashka [212]3 years ago
5 0

Answer:

Add the broadcast jump code to the end of scratch cat's code.

Explanation:

That block sends a message and Gobo recives it.

You might be interested in
A computer emergency response team is called at midnight to investigate a case in which a mail server was restarted. After an in
ANEK [815]

<u>Answer</u>:   B. Identify the source of the active connection

<em>Any problem can be fixed only finding of the source of it. We can fix a problem in ‘n’ number of ways but it might again come back if source of it is not identified.</em>

<u>Explanation:</u>

Identify the source of the active connection is the NEXT step the team should take. It is very similar to our human body.

If the infection is coming in the body again and again and gets fixed in the treatment, the reason for come - back will be identified so that it does not <em>lead to unnecessary treatment. </em>

In a similar way, if source are identified then the problem of come-back can be avoided. <em>So option B would be the right choice.</em>

4 0
3 years ago
when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it m
Elena-2011 [213]

Authentication can be done by the issuer of the security.

What do you mean by authentication?

Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.

Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.

To learn more about authentication
brainly.com/question/28240257

#SPJ4

6 0
1 year ago
write a program in python to input 3 sides of a triangle. check if the triangle is equilateral, isosceles or scalene. use logica
hjlf
<h2>Type of Triangle - Python</h2>

In Geometry, a triangle is a three-sided polygon with three edges and three vertices. A triangle with vertices A, B, and C denoted ∆ABC.

<h3>Equilateral Triangle</h3>

A triangle is said to be an EQUILATERAL TRIANGLE if all the sides are equal in measure.

<h3>Isosceles Triangle</h3>

A triangle is said to be an ISOSCELES TRIANGLE if any two sides are equal in measure.

<h3>Scalene Triangle</h3>

A triangle is said to be a SCALENE TRIANGLE if none of the sides are equal in measure.

<h3>Here's our program:-</h3>

a = float(input("Enter the length of the first side of a triangle: "))

b = float(input("Enter the length of the

second side of a triangle: "))

c = float(input("Enter the length of the third side of a triangle: "))

if (a == b and b == c and c == a):

print("Equilateral Triangle.")

elif (a == b or b = c or c == a):

print("Isosceles Triangle.")

elif (a != b and b !=c and c != a):

print("Scalene Triangle.")

<h3>else:</h3>

print("Invalid Input.")

6 0
2 years ago
Device management is the process of managing
faltersainse [42]
Device management is the process of managing the devices in your computer. In your computer you have the so-called device manager, in which all the drivers of your devices are installed. Device Manager allows you to monitor and manage each of its devices. You can also uninstall and update your devices in device manager. And the process of doing it is called device management. It is very simple to do this kind of stuffs as long you are familiar with your devices like mouse, printer, keyboard, etc.
8 0
2 years ago
Which programming term describes the various characteristics of an object, such as its size and color?
SashulF [63]

Answer:

A

Explanation:

6 0
3 years ago
Other questions:
  • Why is it important to use standard english when applying for a job
    13·2 answers
  • Controlled intersections use some form of which of the following:
    7·1 answer
  • You install a teanviewer on your work station at home so that you can access it when on the road. How can you be assured that un
    12·1 answer
  • Some classes, like the ArrayList class, use angle brackets in their documentation and their declaration. For example, the Java d
    5·1 answer
  • Click on the _____ tab on the ribbon to open the backstage view.
    7·1 answer
  • Which of the following JavaScript expressions is equivalent to the given HTML code? ​ a. Document.getelementbyId("menu1").menu=
    6·1 answer
  • Convert 128 GB into KB​
    8·2 answers
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
  • ¿En qué año se funda lego?
    5·1 answer
  • Who is the best valorant character
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!