1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DENIUS [597]
3 years ago
7

WHAT DOES THE SCRATCH CODE BELOW DO?

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
3 0

Answer:

the first one

Explanation:

You might be interested in
Intranets:
SOVA2 [1]

Answer:

A, C, D and E

Explanation:

An intranet is synonymous to a private LAN or WAN network but in contrast to the extranet or internet. Resources are retrieved and/ or shared within devices in the private network. It uses the internet protocol suite model of networking for communication, but also uses private IP addresses, which are not routable on the internet.

The communication between devices can be a peer to peer connection or client-server connection, using the mainframe computer technologies as the dedicated servers of the network.

7 0
3 years ago
An intentional action designed to prevent legitimate users from making use of a computer service is called
MatroZZZ [7]
Denial of Service Attack. If multiple machines are involved, it's a Distributed Denial of Service Attack.
4 0
4 years ago
When Cloud Consumers are automatically redirected to the new cloud storage device?
Taya2010 [7]

Answer:

Cloud architecture are basically depend upon the storage replication system and it keeps synchronize the primary cloud data in the duplication storage.

And the redundant data is used when the logical unit number are migrated from one place to another. Then, it creates a copy of logical unit number.

Whenever, the primary device fail the storage path diverts the request of cloud user in secondary logical unit number and it automatically redirect to new cloud device storage.

6 0
4 years ago
Which are aspects of the post-production stage?
nata0808 [166]

Answer:In television, the phases of post-production include: editing, video editing, sound editing, animation and visual effects insertions, viewing and the start of the airing process.

Explanation:

6 0
3 years ago
Create a class Book with two private int fields, numPages and currentPage. Supply a constructor that takes one parameter and set
Law Incorporation [45]

Answer:

The code is in the explanation.

Explanation:

/*Creating the class*/

public class Book{

      /*Here we put the attributes of the class;

      In our case, they are the two private ints*/

      private int numPages;

      private int currentPage;

    /*Here is the constructor.

    The constructor always has the same name as the class

     In (), are the parameters.*/

     public Book(int numberOfPages){

                numPages = numberOfPages; /*sets numPages to the value

                                                                    of the parameter*/      

               currentPage = 1; /*sets currentPage to 1*/    

}

   /*An acessor method is a method with which we can get the value of a      variable*/

    /*Acessor method for numPages*/

   /*numPages is an int, so the acessor method returns an int*/

    public int getnumPages(){

            return numPages;

    }

    /*Acessor method for currentPage*/

    public int getcurrentPage(){

           return currentPage;    

     }

     /*Method next page*/

     /*This method does not return anything, so it is a void method*/

     public void nextPage(){

     /*Verify that currentPage is less than numPages*/

     if (currentPage < numPages){

             currentPage = currentPage + 1;

     }

     }

}

4 0
3 years ago
Other questions:
  • Explain and Define the four types of maintenance in IT?
    11·1 answer
  • Which microphones are considered to have the best quality?
    12·2 answers
  • When conducting research on the internet, what is a starting point for determining how to start the research?
    5·1 answer
  • In which genre of games do players most often have the power to shape how the story will end?
    12·2 answers
  • Plagiarism occurs when writers
    14·2 answers
  • Only now _______ why you didn't tell me.​
    14·2 answers
  • What are ways to create a study schedule? Check all that apply.
    5·2 answers
  • Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2
    6·1 answer
  • Relational operators allow you to ________ numbers
    7·1 answer
  • When using a self-contained recovery device on a cfc, hcfc, or hfc system with an operating compressor, technicians must?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!