1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
15

Gabby is creating a game in which users must create shapes before the clock runs out. Which Python module should Gabby use to cr

eate shapes on the screen? a Design Graphics b Math Module c Turtle Graphics d Video Module
ANSWER QUICKLY
Computers and Technology
2 answers:
igomit [66]3 years ago
6 0
Uhh i think the answer is A
kicyunya [14]3 years ago
6 0

Answer:

The answer is "Turtle Graphics"

Explanation:

I took the test and got it right.

You might be interested in
An alteration threat violates information integrity. <br> a. True <br> b. False
Art [367]
The answer is True


It intentionally or unintentionally compromises a system by making unauthorized changes to data. As compared to intentional changes which are usually malicious, unintentional changes are normally accidental. Changes and modifications to the system configurations can also compromise integrity. Such modifications might include deleting, changing, and creating information in a network resource. It is best to implement mechanisms on how one can track and audit such changes as they happen




6 0
3 years ago
1.An algorithm used to find a value in an array is called a ______________.
Amanda [17]

Answer:

b

Explanation:

7 0
3 years ago
Read 2 more answers
Describe the procedure for creating a table or spreadsheet in a presentation slide.
brilliants [131]
<span>Select the slide that you want to insert a table on.On the Insert tab, in the Tables group, click Table, and then click Excel Spreadsheet.<span>To add text to a table cell, click the cell, and then enter your text</span></span>
5 0
3 years ago
Which are factors that go into a project plan?
BaLLatris [955]

Answer:

The four critical factors to planning a successful project

Explanation:

5 0
3 years ago
Cyber security includes which of the following?
Law Incorporation [45]

Answer:

d. All of above

Explanation:

All answers are correct!

5 0
4 years ago
Other questions:
  • Can I change my brainly username?
    9·2 answers
  • design the psuedocode for a program that allows a user to enter 10 numbers, then displays them in the reverse order of their ent
    6·1 answer
  • The countryside presents
    11·1 answer
  • Wich technology can a website use to allow you to listen to a concert live over the internet?
    10·1 answer
  • Write a program that allows two players to play a game of tic-tac-toe. Use a two dimensional char array with three rows and thre
    7·1 answer
  • Edhesive unit 4 test answers
    15·1 answer
  • Assume that you have the business data in various sources such as Excel, .csv, text files and Access, Oracle databases. Write th
    9·1 answer
  • Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage de
    10·1 answer
  • Cite some improved technology this 2021?
    5·1 answer
  • What do we call notes in computer code for the programmer that are ignored by the compiler?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!