Answer:
# Instead of repeating code over and over
forward(10)
left(90)
forward(10)
left(90)
forward(10)
left(90)
forward(10)
left(90)
# Use a for loop to repeat the code!
for i in range(4):
forward(10)
left(90)
# You can use the i variable inside the loop
# i starts at 0, and goes up to COUNT-1
# This will make Tracy move forward 0, then 1, then 2
for i in range(3):
forward(i)
# You can change the value of i inside a for loop by using mathematical expressions
for i in range(3):
forward(i*10)
# You can also control the value of i by using extended parameters
for i in range(STARTING_VALUE, ENDING_VALUE, INCREMENT):
# This will move Tracy forward 25, 50, and 75 pixels
for i in range(25, 76, 25):
forward(i)
love you guys <3
Answer:
The following steps will help you design a safe and effective stretching program.
Explanation:
1. You will have to follow the ACSM's guidelines used for flexibility training.
2. evaluate your flexibility rate with the "sit-and-reach" test.
3. you have to also apply the basic principles of FITT in designing your own program.
4. have a "range-of-motion" tests performance.
5. make use of SMART guidelines when setting explicit flexibility goals.
Answer is "Web Designer".
Web Designers are the "artists" of the website. They conceptualize the layout and functionality of the site, from features to format. They may do little coding, and are mostly involved in the creative elements of web design. The Web Developer is less big-picture, and more knitty-gritty building of the website. She is the one who does the coding and actually builds the website, using the web designer's model.
Answer:
3 amps
Explanation:
because as per ohm's law. "electric current is proportional to voltage and inversely proportional to resistance"
Answer:
The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.
Explanation:
A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.
Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.
In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.