1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neko [114]
3 years ago
8

CODEHS- Please help!

Computers and Technology
1 answer:
Ksivusya [100]3 years ago
8 0

Answer:

Revisiting "Build a Tower"

Recall in the last section how we made Karel make a tower of tennis balls. We told Karel to move() and turnLeft() and putBall() until we had a tower. At the end of the program, Karel was still at the top of the tower, like as in the picture below.

Stuck at top

Suppose that now we want Karel to come back down from the top of the tower. The first thing we need to do is get Karel facing in the right direction. One way to do this is to tell Karel

turnLeft();

turnLeft();

turnLeft();

And then tell Karel to

move();

move();

move();

back to the bottom of the tower.

However, telling Karel to turnLeft() three times is not very readable. That's a lot of writing when all we really want is to tell Karel to "turn right."

Explanation:

Hopefully it would help.

You might be interested in
In workstation domain policies, _________________ provide the specific technology requirements for each device. IT staff uses re
Snezhnost [94]

Answer:

The correct word for the blank space is: baseline standards.

Explanation:

Minimum Baseline Standards (MBS) refers to the minimum security guidelines companies set to protect their sensitive data. To achieve such objective, all the devices of an entity -<em>e.g.: servers, routers, and firewalls</em>- must be configured in a form that prevents external or internal attacks. Setting an MBS helps an organization to provide technical support faster since regular users will be working with a system that was implemented by the <em>Information Technology</em> (IT) department of the same association.

6 0
3 years ago
5.
larisa86 [58]

Answer:

Explanation:

5 is correct answer

3 0
3 years ago
Take any software or Application that you have recently purchased, this can be a video game or any other application helping you
IgorC [24]

A good product should have copyright protection which prevents others from using the product without permission.

Some products specify the penalties which are given to a person who makes unauthorized copies of their product and this is done to clearly educate to avoid ignorance claims.

A good product should have clear lettering which are legible and can be easily read, and should also have reasonable copyright protection.

<h3>What is Copyright?</h3>

This refers to the licensing which is done for a product and is also legally backed which prevents a person from illegally using or redistributing the work of a creator without their explicit consent.

Read more about copyright infringement here:
brainly.com/question/1078532

8 0
2 years ago
What does coding mean​
NeTakaya
The process or activity of writing computer programs.
3 0
3 years ago
Read 2 more answers
What is the primary language used to write web content and is the default format for Outlook messages?
Doss [256]

Answer:

I think its plain text but I might be wrong

7 0
3 years ago
Other questions:
  • Harry needs to use a type of graph in a spreadsheet to show variations in data over a specific period. What type of graph or cha
    11·2 answers
  • What character separates the file extension and the filename?
    13·2 answers
  • What is the chief ethical concern concerning all the new sources of data available through new technological means like internet
    9·1 answer
  • Why does a satellite requires two bridges?
    11·1 answer
  • How is actual cost calculated?<br><br> Please answer
    12·1 answer
  • Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to conv
    13·1 answer
  • How can I use HTML to express a personal value
    13·1 answer
  • Design algorithm and the corresponding flow chart for adding the subject score of 5, total value and rank.​
    14·1 answer
  • Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
    15·1 answer
  • When one loop appears inside another, the loop that contains the other loop is called the ____ loop. Group of answer choices ind
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!