1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
15

6.1.4: Decorate the Fence, what is the code program for the CodeHs Karel lessons?

Computers and Technology
1 answer:
KiRa [710]3 years ago
6 0

Answer:

hi

Explanation:

function start(){

   move();

   move();

   move();

   move();

   move();

   turnLeft();

   

   while(frontIsClear()){

       if(rightIsBlocked()){

           putBall();

           move();

       }

           else{

       move();

   }

   }

putBall();

}

You might be interested in
Joe runs a handyman service. He enjoys writing and keeping up on the latest trends. He wants to share this information with his
Bumek [7]
One of the largest things Joe will want to consider is the fact that will his business be spread or just there? For example, if Joe were to use Facebook, he might want to consider the number of users that go to his handyman service. He doesn't want to create a Facebook page if he knows none of his customers have a Facebook page. The reason being that if he were to create a Facebook page, and none of his consumers have it, no one would like the page or share the page. One of the heaviest points is what will appeal to the consumers. 
6 0
3 years ago
The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
sergiy2304 [10]

Answer:

Subject matter experts

Explanation:

Because the security organization institutes the procedures and policies to be executed, they occupy the role of Subject matter expert.

A subject matter expert is a person with a thorough and deep knowledge of a particular process, function, technology, machine, material or type of equipment. Such a person is an expert on that subject.

Therefore the information security organization occupies the role of Subject matter expert.

6 0
4 years ago
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Marysya12 [62]

Answer:

Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best

Explanation:

8 0
4 years ago
La sentencia de ASIGNAR es una sentencia de entrada de datos, verdadero o falso ?
Akimi4 [234]

Answer:

sorry can´t understand langues

Explanation:

cant

7 0
3 years ago
Lynn has created a quarterly sales report using a word processor. The document is confidential, and Lynn wants to secure it with
sweet-ann [11.9K]
Stop cheating



It’s b
3 0
2 years ago
Other questions:
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • This LEGENDARY character made a much-celebrated comeback in 2017. What was the name of the villain he faced in this epic tale?
    7·2 answers
  • Digital art is created by using __?
    5·1 answer
  • A company has its branches spread over five places in a state. It has become difficult for employees to transfer information and
    7·1 answer
  • In 2009, __________ accounted for 1,772 total fatalities. A. passengers riding with impaired drivers B. children hit by backing
    14·2 answers
  • When creating a chart or graph, which should be completed first?
    9·2 answers
  • The number of pixels displayed on the screen is known as ________.
    13·1 answer
  • What is copy and paste?
    13·2 answers
  • How many characters does the "short text" have?
    9·1 answer
  • Write a game that plays many rounds of Rock Paper Scissors. The user and computer will each choose between three items: rock (de
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!