1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
2 years ago
5

Elena wrote the following code in Scratch to have the sprite move and then turn around. However, the code does not work as expec

ted. What should be done to fix the error?
Change "move 20 steps" to "move 10 steps"
Change "turn left 180 degrees" to "turn left 90 degrees"
Change "turn left 90 degrees" to "turn right 180 degrees"
Change "turn right 90 degrees" to "turn left 90 degrees"

Computers and Technology
1 answer:
alexgriva [62]2 years ago
8 0

There are a lot of ways to code in Scratch.  What should be done to fix the error is to Change "move 20 steps" to "move 10 steps"

<h3>What is Movement in gaming?</h3>

Movement is known to be a basic function in any kind of game. It is known to be the first thing one has to do when a person start a new game, and  it can be found in almost all of every game that is made in Scratch.

The movement in games is done by pressing the arrow keys, which tells player's characters to move around on the screen and achieve a given task.

Learn more about coding from

brainly.com/question/22654163

You might be interested in
A public key is part of what security measure?
lord [1]
A public key or the asymmetric key which is used for the authentication process. It consists of a pair of keys in which one key encrypts and the other decrypts. It come under Public Key Infrastructure (PKI) and is a part of INFORMATION SECURITY measures. PKI is the management solution for the keys.
6 0
3 years ago
Plz plz plz subsribe to my channel, CookieFunTime
Nesterboy [21]

ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok ok

7 0
3 years ago
Suppose your parents are planning to take you
Verdich [7]

Answer:

I think the answer would be a smartphone, hope this helps! Comment if I am wrong

4 0
3 years ago
Jamie Lee is beside herself knowing that the thieves had unauthorized use of her debit/ATM card. What is Jamie's financial respo
Rama09 [41]

Jamie's financial responsibility for the unauthorized use is dependent on how fast she report the theft of her debit/ATM card.

Since Jamie Lee is dealing with an unauthorized use of  her ATM or debit card,  she ought to  act quickly so as  to avoid full liability for unauthorized charges since her card was stolen.

According to Federal laws and bank policies, Under the Federal Electronic Fund Transfer Act, the following  liability applies:

  •  $0 if she  reports the theft of the card immediately before any unauthorized charges are made.
  • She would be charged up  to $50 if she  notifies  the bank within two business days after she  realized the theft.
  • She would be charged up to $500 if she fails to notify the bank within two business days after the theft  but does notify the bank within 60 days after her  bank statement is mailed to her with a list of  the unauthorized withdrawals.
  • She wold be charged unlimited charges if she  fails to notify the bank within 60 days after her bank statement is mailed to her listing the unauthorized withdrawals.

From the polices applicable, It is necessary that Jamie Lees  notifies the bank or card issuer of the theft as soon as possible so as not to incur much financial responsibilites for the unauthorised use.

Read on to learn about  unauthorized use debit/ATM card: brainly.com/question/21485510

8 0
2 years ago
1.If you're not sure what parameters that you should employ with a command from the Windows command line, how could you get help
Luden [163]

Answer:

All questions have been answered in the explanation.

Explanation:

Part 1: Type the HELP command or /?

By using the HELP command, you can information regarding which parameters are to be used.

Part 2: Msconfig

By using the Msconfig command the configuration can be conducted.

Part 4: dir command

If you were at the command line and you wanted to see what was in the directory, you would use the dir command.

Part 5:ipconfig

ipconfig is used to configure the IP address via  the command line.

Part 6:PING 8. 8. 8. 8 or nslookup

You can either ping the target IP address using the PING command or use nslookup.

Part 9:COPY/attributes were attributes are a,v or y

COPY/a (indicates and ASCII text file.); COPY/v (verifies that new files are written correctly); COPY/y (suppresses prompting to confirm you want to overwrite a file).

Part 10: In the administrative tool option.

In the Windows Seven Control Panel, you would find the event viewer in the administrative tool.

Part 11: Computer Management Console

Computer Management Console is the central console for all the administrative tools.

Part 12: Services

Services is used as the utility tool to manage the background processes.

Part 13: performance monitor

performance monitor is the utility where you can view the overall performance of the system during the history.

Part 14 : Something is wrong with the device.

In Device Manager, a yellow exclamation mark signify that something is wrong with the device.

Part 15: Red Cross

In Device Manager, the icon with a red X is the one that identifies a disabled device.

Part 16: Performance monitor provide the long term system statistics.

8 0
4 years ago
Read 2 more answers
Other questions:
  • Interactive sites were usually is right about important topics and comments to a threaded discussion are called
    9·1 answer
  • ______ devices are high-performance storage servers that are individually connected to a network to provide storage for the comp
    5·1 answer
  • Pls help brainliest
    12·1 answer
  • When an object is falling because of gravity, the following formulacan be used to determine the distance the object falls in asp
    9·1 answer
  • A ___ is a node (or a device) that connects two different networks together and allows them to communicate.
    12·1 answer
  • With a chart , illustrate the stage of wood processing plsss help I will mark u as brainliest plss help pls and I will follow yo
    15·1 answer
  • The program 4 should first tell users that this is a word analysis file. For any user-given text file, the program will read, an
    6·1 answer
  • An object's state is defined by the object's
    6·1 answer
  • Helen is working on her colleague’s photos. She came across this particular photo and was confused about which effect the photog
    15·2 answers
  • Amtel University decides to keep a record of their student data in a backup server. The administrator contacts you to identify t
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!