1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
15

6.1.4: Decorate the Fence, what is the code program for the CodeHs Karel lessons?

Computers and Technology
1 answer:
KiRa [710]3 years ago
6 0

Answer:

hi

Explanation:

function start(){

   move();

   move();

   move();

   move();

   move();

   turnLeft();

   

   while(frontIsClear()){

       if(rightIsBlocked()){

           putBall();

           move();

       }

           else{

       move();

   }

   }

putBall();

}

You might be interested in
Which of the following recommendations should you follow when placing access points to provide wireless access for users within
Colt1911 [192]

A WLAN, or wireless local area network, is created by an access point, typically in an office or big building. An access point transmits a Wi-Fi signal to a predetermined region after connecting via an Ethernet cable to a wired router, switch, or hub. Thus, option C is correct.

<h3>What access points to provide wireless access for users?</h3>

You may determine your wireless access point IP address by going to the settings menu of your adapter if you're already connected to the network via Wi-Fi or Ethernet.

Therefore, Open Network & Internet settings can be accessed by selecting with the right mouse click on the network icon in the system tray.

Learn more about wireless access here:

brainly.com/question/13073711

#SPJ1

6 0
1 year ago
Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
Sav [38]

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
8 0
3 years ago
please help no one is helping me on this one
Zigmanuir [339]

Answer:C

Explanation:

4 0
3 years ago
The IP address is a _____ bit number.
Anika [276]

Answer: 32 bit number

Explanation:

 The IP address basically contain 32 bit number as due to the growth of the various internet application and depletion of the IPV4 address. The IP address basically provide two main function is that:

  • The location addressing
  • The network interface identification  

The IP address are basically available in the human readable format. The IPV6 is the new version of the IP address and its uses 128 bits.  

3 0
3 years ago
Good day Statistical Methods tutor , I would like to know the formula for calculating the percentage of stockouts for the given
sveticcg [70]

In order to derive the probability of stock outs, divide the total value of the stock outs by the number of requests demanded. The resulting figure must then be multiplied by 100.

<h3>What is a stock out?</h3>

In business, a stock out refers to a condition where in a certain item or items are no longer available in stock.

The formula can be sated simply as:

Probability of Stock outs = (No of stock outs/ number of demand requests) x 100

Thus Number of Stock outs = Total probability of stock outs * total number of demand requests.

<h3>What is the formula for the Total Cost?</h3>

The formula for Total Cost is given as:

Total Fixed Cost + Total Variable Cost;

TC = TFC + TVC

Learn more about stock outs at:
brainly.com/question/16209393
#SPJ1

5 0
2 years ago
Other questions:
  • . Stress can affect not only your health, but also other aspectsof your
    15·1 answer
  • Use NumPy to recreate your answer to Question 1b. The input parameters will both be python lists, so you will need to convert th
    8·1 answer
  • What is a life cycle
    15·2 answers
  • Which of the following statements invokes the GetDiscount function, passing it the contents of two Decimal variables named decSa
    8·1 answer
  • What is the single most important component of a computer? Central Processing Unit DIP Motherboard Chipset
    8·1 answer
  • A contracting company recently completed it's period of performance on a government contract and would like to destroy all infor
    13·1 answer
  • Write assembly programs with the following I/O
    15·1 answer
  • Fill in the blank with the correct response.
    6·1 answer
  • Which factors are involved in search engine optimization​
    10·1 answer
  • 100 POINTS!!!!!!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!