1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
3 years ago
8

Does anyone know the code for the beaded bracelet on codehs? pls i really need help

Computers and Technology
1 answer:
kvv77 [185]3 years ago
6 0

Answer:

Explanation:

If it has not changed since the last time that i used codehs then the code should be the following

penup()

forward(-100)

right(90)

pendown()

def beaded_bracelet():

circle(10)

penup()

forward(20)

left(10)

pendown()

for i in range(36):

beaded_bracelet()

Which should complete the entire function as intended.

You might be interested in
When you boot up a computer and hear a single beep, but the screen is blank, what can you assume is the source of the problem?
olchik [2.2K]
Either your screen isnt plugged in and synced properly or you have a problem in the automatic boot system 
5 0
3 years ago
Read 2 more answers
The help desk received a call from a user who cannot get any print jobs to print on the locally shared printer. While questionin
erma4kov [3.2K]

Answer:

a. Power cycle the printer.

Explanation:

Power Cycle: To unplug the printer and restart it, is called power cycling. The peripheral devices often tend to stop working and the cause of this is not always easily figured out. So the first and easiest way that can be done to fix this issue is to run a power cycle. For this, you have to turn off the printer and unplug it. Then wait for a few seconds (at least 30) and plug in the printer again. Turn the printer on. Power cycle helps to resolve many basic issues. It is the easiest step to take before checking the printer cable, reinstalling printer or resetting the print spooler.

4 0
3 years ago
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
2 years ago
in speech writing, it can be defined as all aspect of your writing that help the reader move smoothly from one sentence to the n
serious [3.7K]

Answer:

Logical flow

Explanation:

In speech writing, LOGICAL FLOW can be defined as all aspects of your writing that helps the reader move smoothly from one sentence to the next, and from one paragraph to another.

With the Logical flow, one will be able to guide his thoughts coherently and sequentially in which Readers can fully absorb and easily understand the message.

5 0
2 years ago
_______For the C programming language, files containing the code you write are named with a file extension of .g. (T/F)
erastovalidia [21]

Answer:

False.

Explanation:

In C programming language the file which containing the code that we are writing the code is have the file extension .c and for c++ it is .cpp.  C programming language is a general purpose procedural computer programming language.

.g file extension is for data chart file format used by APPLAUSE database development software.

Hence the answer to this question is false.

4 0
3 years ago
Other questions:
  • OSHA's mission is to: A. Ensure that all workers receive adequate workers' compensation payments B. Esnure that all workers rece
    8·2 answers
  • Emotional intelligence is a new term to describe personal traits ?
    12·1 answer
  • Two powerboats are about to cross paths. what should the boat on the starboard (right) do?
    11·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    10·1 answer
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • In linear​ programming, what are restrictions that limit the degree to which a manager can pursue an​ objective?
    15·1 answer
  • The list method reverse reverses the elements in the list. Define a function named reverse that reverses the elements in its lis
    10·1 answer
  • You are considering using Wi-Fi triangulation to track the location of wireless devices within your organization. However, you h
    9·1 answer
  • Why do you want to work from our company?​
    9·2 answers
  • Question 1 of 10
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!