1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
13

What's wrong with these codes in code HS Karel challenges(7.1.2. Racing Karel) Codes: //Below is the program that have Karel mov

e around the race track 8 times, and end in his starting location. Everytime Karel hits a corner, he will put a ball down. At the end there should be 8 balls on each corner. function start(){ for(var i = 0; i < 5; i++){ ballSet(); wallRun(); turnLeft(); } function wallRun(){ while(frontIsClear()){ move(); } } function ballSet(){ putBall(); } }
Computers and Technology
1 answer:
Viktor [21]3 years ago
5 0

Answer:

The program only runs 5 five since the for loop statement is limited to loop only five times.

Explanation:

In programming, a for-loop statement is used to repeat a collection of events a definite number of times. The number of loops is specified and compared with a variable to execute a block of code.

The for-loop statement in the code above declares and initializes a variable "i" to zero, runs the block of code, and increments by one if it is less than 5.

To make it run eight times, the value five should be changed to 8 instead.

You might be interested in
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicle
kati45 [8]

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

  • The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

brainly.com/question/24956493

3 0
3 years ago
What how do i delete a question
Dvinal [7]

Answer: not sure if you can

Explanation: idk if you can but if you wanna get a good answer try searching up on google hope i helped!

7 0
3 years ago
What type of file format is PSD?
Ronch [10]

Answer:

PSD (Photoshop Document)

Explanation:

PSD (Photoshop Document) is an image file format native its one of Adobe's popular Photoshop Application. PSD files are commonly used for containing high quality graphics data.

8 0
2 years ago
Read 2 more answers
Which search strategy is most similar to greedy search?
lesya692 [45]

Answer:

I think the answer would be A.

Explanation:

If I'm wrong plz let me know (I think I may be wrong)

8 0
3 years ago
you are the it manager for your company. you have been asked to give the executive group the right to read, change, and assign p
inn [45]

The permission to give the executive group the right to read, change, and assign permissions to document is Give executive Change to shared permissions

<h3>What do you mean of executive?</h3>

An executive is seen as a kind of a powerful person  and they are the people that are known to be  responsible for making things go on or  run smoothly in any organization.

Therefore, The permission to give the executive group the right to read, change, and assign permissions to document is Give executive Change to shared permissions

Learn more about executive  from

brainly.com/question/838027

#SPJ1

5 0
2 years ago
Other questions:
  • The create_python_script function creates a new python script in the current working directory, adds the line of comments to it
    9·1 answer
  • In codd's model of a relational database, data is stored in a(n) _____, which maintains information about a(
    7·1 answer
  • An office employee working in a payroll department uses a customized program to log hours employees have worked. The customized
    12·2 answers
  • Technician A says you should measure the parasitic load immediately after the vehicle is turned off. Technician B says you shoul
    10·1 answer
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    8·1 answer
  • Leah’s computer is connected to the network most of the time. Once, she noticed few of her files with sensitive data were missin
    8·1 answer
  • 2. Integer plot function (find a smart way to code big integers) Write a program BigInt(n) that displays an arbitrary positive i
    8·1 answer
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • Dr. Wayne is trying to developing techniques to cure Parkinson’s disease by inserting genetic material into patients’ cells to c
    12·1 answer
  • Write a function check_palindrome that takes a string as an input and within that function determines whether the input string i
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!