1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slamgirl [31]
3 years ago
9

In this project you will write a set of instructions (algorithm). The two grids below have colored boxes in different

Computers and Technology
2 answers:
mojhsa [17]3 years ago
7 0

Answer:

Explanation:

Pink: Down 5 then left 2.

Yellow: Left 3 and down 2.

Green: Right 7, down 4 and left 1.

Purple: Up 6 and left 9.

Red: Left 7, down 5 and left 1.

You can do the last one, blue :)

nikdorinn [45]3 years ago
6 0

Answer:

Explanation:

u=up, d=down, r=right, l=left

yellow: l3d2

pink: d5l2

green: r7d4l1

purple: u6l9

red: l7d5l1

blue: r2u7l5

You might be interested in
Why is soccer the most popular sport
riadik2000 [5.3K]

Soccer is the most 'popular' sport in the world because it is played more than any other by kids growing up. ... So, yeah, ya see…Soccer's not so much “The Beautiful Game'' as it is…

5 0
3 years ago
Read 2 more answers
What was the first computer programming language?
diamong [38]

Answer:

The answer is B.COBOL

Explanation:

I took AP EX quiz.

5 0
3 years ago
When you use an external style sheet with an html document, you get all but one of the benefits that follow. which one is it?
Lina20 [59]
The answer to this is your CCS files are easy to create and maintain
6 0
3 years ago
Please tell fast plzzzzzz. ​
shepuryov [24]

Answer:

true....................

6 0
3 years ago
Read 2 more answers
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
Other questions:
  • Jason wants to open a program with the command prompt window. Which command should he type in the Run dialog box to open the com
    10·1 answer
  • Which statements accurately describe the Bookmark feature in the Audio/Video control bar? Check all that apply.
    13·1 answer
  • How many fixes are available for Adobe Photoshop CS4 (64 Bit)?
    9·1 answer
  • Need answer ASAP.
    8·1 answer
  • This is your code. >>> A = ['dog''red'] >>> B = [' cat', 'blue']>>>C = ['fish', 'green'] You can impl
    10·2 answers
  • Ndcdeviceid?????????????????????​
    8·1 answer
  • Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lowe
    8·1 answer
  • Please help...........​
    6·2 answers
  • What are the three algorithm constructs?
    7·1 answer
  • From which os did windows xp evolve?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!