1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
15

6.1.4: Decorate the Fence, what is the code program for the CodeHs Karel lessons?

Computers and Technology
1 answer:
KiRa [710]3 years ago
6 0

Answer:

hi

Explanation:

function start(){

   move();

   move();

   move();

   move();

   move();

   turnLeft();

   

   while(frontIsClear()){

       if(rightIsBlocked()){

           putBall();

           move();

       }

           else{

       move();

   }

   }

putBall();

}

You might be interested in
Which extension is appropriate for Word document templates?
Ronch [10]

Answer:

<em><u>DOCX pretty sure</u></em>

<em><u /></em>

<em><u>hope that this helps :)</u></em>

<em></em>

5 0
3 years ago
Read 2 more answers
Why do attackers tend to target public or private Wi-fi networks?
Anika [276]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

A free WiFi connection in a public space can seem like a lifesaver when you are on the go.But if you decide to use public WiFi just be aware that you could be making yourself an easy target for hackers and putting your information and more at risk.

one of the dangers of using a public WiFi network is that data over this type of open  connection is often encrypted and  unsecured ,leaving you vulnerable to a man in the middle attack.It when a cyber criminal exploits a security  flaw in the network to intercept data

  • Avoid connecting to public WiFi connection. i if you must use a public WiFi hotpots also use a virtual privater network to secure your connection.
  • Do not  log in to password protected websites that contains sensitive information when using a public WiFi connection for example banking and social networking sites or even email.
  • Keep your software patched and up to date and all your devices even your mobiles ones to avoid any potential infection by viruses or malware if you do use unsecured public WiFi.

5 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long dis
ycow [4]

Answer:

A

Explanation:

4 0
3 years ago
To insert a footnote in a document, a user would navigate to the _____ tab.
Pachacha [2.7K]

Answer

References tab.

Explanation

In MS word documents, you can add footnotes and endnotes by;

• Clicking the area to add a footnote

• Clicking references, then insert Footnote. The word program will insert a reference mark in the text and will add the footnote mark at the bottom of the page

• Type a footnote text.

Hope this Helps!

3 0
3 years ago
Read 2 more answers
Other questions:
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • In the table below identify the data type that would be most suitable for the second field
    14·1 answer
  • When a Python script is running as a standalone program, what will the __name__ variable be set to?
    7·1 answer
  • Which diagram is used as a popular technique for investigating causes and effects? 1. Cause and effect 2. Fishbone/lshikawa 3. R
    13·1 answer
  • Which of the following is one of the options available on the Columns menu on the
    6·1 answer
  • What does a page break do?
    13·1 answer
  • Which among the following choices is correct based on the two statements listed below? Statement 1: When the lexical analyzer sc
    12·1 answer
  • Computer Graphics:
    13·1 answer
  • 5. What skill is unique to reading online?
    14·1 answer
  • What will be the result from running the following program?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!