Which two statements accurately describe this computer program? Click all that apply.
A. Clicking the green flag is the event that triggers the cat to move.
B. The code is written in C++, a block-based programming language.
C. The programmer refused a module to make the cat move and make noise.
D. There are two sprites, wearing cat and butterfly costumes.

Which Two Statements Accurately Describe This Computer Program? Click All That Apply.A. Clicking The

Answers

Answer 1
Answers:
C & D

Explanation:
Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.
Answer 2

Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.

What is Computer program?

Instructions must be expressed clearly and precisely since computers can only understand particular instructions or commands in the language that the user is programming them in.

Some computers require users to develop programs using blocks while others demand text-based languages since not all computers can comprehend the same things.

In contrast to computers, your acquaintance would be able to read beyond any spelling and grammar mistakes or request clarification if your handwriting was illegible if you opted to write down the instructions for them.

Therefore, Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.

To learn more about Computer programe, refer to the link:

https://brainly.com/question/14618533

#SPJ7


Related Questions

which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website

Answers

Hello!
Answer: B. Library.

I hope this helps you!

What would be considered a benefit of using simulation in the education field?

Simulation can reduce the costs of books.
Simulation can increase the cost of materials.
Simulation can reduce the number of teaching jobs.
Simulation can reduce the amount of homework for students.

Answers

Answer:

books cost

Explanation:

the books cost will go down, as they are to become digital, thus, making physical copies cheaper

Answer:

A

Explanation:

Did test

Dose brainly give you notifications on you're phone when you go into the site

Answers

Answer:

Yep it does ^_^

what is alternative name of home page

Answers

Answer:

In this page you can discover 5 synonyms, antonyms, idiomatic expressions, and related words for home page, like: web page, web site, website, webpage and homepage.

Edhesive Assignment 8: Personal Organizer.

I keep getting a bad input message on my line 52. Any tips on how to fix this?
I've included photos of my code.

Answers

In this exercise we have to use the knowledge in computational language in python to write the following code:

What is input?

Python's input function takes a single parameter which is a string. This string is often called a prompt because it contains informational text that tells the user to type something. For example, you can call the input function as follows:

So in an easier way we have that the code is:

eventName = []

eventMonth = []

eventDay = []

eventYear = []

def addEvent():

userEventName = input("What is the event: ")

userEventMonth = int(input("What is the month (number): "))

userEventDay = int(input("What is the date: "))

userEventYear = int(input("What is the year: "))

userEventMonth = validateMonth(userEventMonth)

userEventDay = validateDay(userEventMonth, userEventDay, userEventYear)

eventName.append(userEventName)

eventMonth.append(userEventMonth)

eventDay.append(userEventDay)

eventYear.append(userEventYear)

def validateMonth(month):

if month >= 1 and month <= 12:

return month

else:

return 1

def validateDay(month,day,year):

if day < 1 or day > 31:

return 1

if month == 2:

isleap = False

if year%4 == 0:

if year%100 == 0:

if year%400 == 0:

isleap = True

else:

isleap = True

if isleap:

if day <30:

return day

else:

return 1

else:

if day < 29:

return day

else:

return 1

if month in [1,3,5,7,8,10,12]:

return day

if month in [4,6,9,11] and day < 31:

return day

else:

return 1

def printEvents():

print("EVENTS")

months = ['January', 'February', 'March', 'April', 'May', 'June', 'July', 'August', 'September', 'October', 'November', 'December']

for index in range(len(eventName)):

print(eventName[index])

print("Date: "+months[eventMonth[index] -1]+ " " + str(eventDay[index]) + ", " + str(eventYear[index]))

userChoice = "yes"

while userChoice.upper() != "NO":

addEvent()

userChoice = input("Do you want to enter another event? NO to stop: ")

printEvents()

See more about python at brainly.com/question/18502436

Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?

a. Each person needs to send email with his/her part of the project individually every day

b. Each person should be on a cloud folder and sync their files as they are working through their project

c. Each person needs to send a group email to the team as soon as any updates are completed

d. Each person should post their updated information on a team website so it is available for anyone to see

Answers

The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.

What is cloud computing?

Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.

In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.

Read more on cloud computing here: https://brainly.com/question/19057393

define a touch-sensitive pad and state one use​

Answers

Answer:

A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.

Explanation:

How to change notification sounds for different apps.

Answers

Use linux; Linux allows for more customization than other operating systems and is free and open source.

FOR loops are considered to be which of the following:

A. primarily pretest conditional loops
B. used for conditional statements
C. counter controlled loops
D. post test conditional loops

Answers

Answer:

C. counter controlled loop

Explanation:

A counter controlled loop, is a loop that repeats a specific number of times. If it is known how many times a loop must repeat or perform a certain task, it is a count controlled loop (for loop).

- It must initialize a counter variable to a starting value.

- It must test the counter variable by comparing it to a maximum value. When the counter variable reaches its maximum value, the loop terminates.

- It must update the counter variable during each iteration. This is usually done by incrementing the variable.

Digital censorship is _____. Select 3 options.

used to free people

used to control people

subtle and often hidden

open and visible

a global problem

Answers

Digital censorship can be used by government or private individual to control people.

What is Digital censorship?

Digital censorship can be described as the controlling or suppression of the access to information on the Internet.

It can be carried out by governments or by private organizations and serves as a means of regulations.

Learn more about Digital censorship at;

https://brainly.com/question/26152499

Answer:

- used to control people

- subtle and often hidden

- a global problem

Explanation:

Digital censorship is the act of filtering out information and hiding it from the masses. This can be used in order to control and manipulate the public. It's a global problem that is very subtly accomplished. (correct on Edge)

I hope this helped!

Good luck <3

difference between local technology and model technology with example​

Answers

The differences? Speed, size, storage or load, or just plain work-load, between ‘modern,’ and trad. technology is probably easiest to compare. We tend to think of communication tech, and computation tech when we say ‘modern,’ but traditional? Lets define that just a bit. Are we talking machines and devices, or the uses themselves, like fire from rubbing two sticks together to fire from an ‘electronic,’ cigarette lighter?Some things are just novelties. There are times when cheap, non electronic devices provide practical and very necessary service in places where an electronic device is too high-maintenance to be equally practical. There is no need to put a computer on a well pump if you’re in a back-water where electronic replacement parts are hard to come by. You just hand pump the thing and it works fine and at your convenience. Certain ‘Green,’ tech, like solar ovens, are a far cry from a fire pit, or even a gas barbecue, and though it’s marketed as ‘new’ technology, depending of course on design and materials used, it is very low-tech. Useful technology seems really only cosmetically changed, with new clothes over old bones, so-to-speak. A different package, a different color, but it’s the job it does that matters. The best comparison between ‘modern,’ tech and ‘traditional,’ tech that springs to mind though, is that modern tech is very modular and if it breaks it’s often disposable, rather than fixable, for most of us.
The differences between modern and traditional technologies are: Traditional technology was based on simple laws and mechanics while modern technology is formed by the integration of many simple mechanics. Modern technology is built on the existing traditional technology. An example of local technology is plough, water mill and water pump. Example of model technology could be a statue or a painting.

You are performing digital forensics in an enterprise that recently experienced a security breach. You successfully retrieved all volatile data, and your next focus is hard drives. How should you collect evidence from the hard drives without tainting any evidence

Answers

How should you collect evidence from the hard drives without tainting any evidence is to: Use mirror image backup.

What is mirror image backups?

Mirror image backups can be defined as a type of backup that enables you to backup all the document or items that you have on your computer hard drive.

Mirror image backup is vital because it enables you to have the same copy  of all the data or information that is store on your hard drive.

Therefore how should you collect evidence from the hard drives without tainting any evidence is to: Use mirror image backup.

Learn more about Mirror image backups here:https://brainly.com/question/21465714

Which tab can help start a query? Create External Data File Home

Answers

The Create, External Data, File and Home tabs are in Microsoft Office Access

The Create tab can help to start a query

How to determine the tab?

There are several tabs in Microsoft Office Access.

Of all these tabs, the Create tab is used to help the user to start a query and return the required data of the query.

The other tabs such as file and home are used to perfom other tasks which include open files, save query, etc.

Read more about database at:

https://brainly.com/question/518894

Answer:

Its A Your Welcome

Explanation:

nums = [30, 10, 30, 14, 10, 3, 9, 7]
print(nums)

nums.extend([24, 3, 21, 19])
print(nums)
What is output by the second print statement in the code above?

Group of answer choices

[30, 10, 30, 14, 10, 3, 9, 7, 24, 3, 21, 19]

[30, 10, 30, 14, 10, 3, 9, 7]

[24, 3, 21, 19]

[24, 3, 21, 19, 30, 10, 30, 14, 10, 3, 9, 7, 24, 3, 21, 19]

Answers

The range function must have two parameters? False. ~Range has three possible sets of parameters: range(stop) - Returns 0 to the given stop value, counts by one.

The range function must have two parameters is False. ~Range has three possible sets of parameters: range(stop) - Returns 0 to the given stop value, counts by one.

What is program?

A computer can run multiple programs simultaneously, and each program can be in a different state. There are three states a program can be in: running, blocked, and ready. If a program is running, it means that it is currently using the computer's resources, such as the processor, memory, and I/O devices, to perform its tasks.

On the other hand, if a program is blocked, it means that it is waiting for a resource to become available, such as a file, network connection, or input from the user. In the scenario you mentioned, "Program A" is in the running state, meaning it is actively using the computer's resources.

Therefore, Program B" is in the blocked state, meaning it is waiting for a resource to become available so it can continue to run.

Learn more about program on:

brainly.com/question/30613605

#SPJ3

how academic skills for teachers help students at the university​

Answers

Academic skills for teachers has help students at the university​ because  with its use,  students are able to have test-taking strategies and understands their courses more better.

Why are academic skills vital for university?

The use of Academic skills is one that act to encourage students so they can be able to be more efficient and better learners.

Conclusively, It is one that give students the power or confidence to be involved fully in any courses that  are useful for them outside of the classroom.

Learn more about skills from

https://brainly.com/question/1233807

29. The startup configuration file is stored in ________________ a. ROM b. NVRAM c. Flash Memory d. RAM

Answers

Answer:

The start configuration is stored on the nonvolatile random-access memory aka NVRAM for the vast majority of systems.

25 points for this answer
Unethical uses of computer devices include _____. Select 3 options.
financial theft
surfing websites
identity theft
media piracy
downloading videos

Answers

Answer:

financial theft

identity theft

media piracy

Unethical uses of computer devices include the following:

Financial theft.Identity theft.Media piracy.

What is an unethical use of a computer?

The unethical use of a computer can be defined as the unauthorized and illegal (illegitimate) use of a computer system to perpetrate cyber crimes and other criminal inclined practices.

In Cybersecurity, unethical uses of computer devices by a hacker include the following:

Financial theft.Identity theft.Media piracy.

Read more on computer crime here: https://brainly.com/question/13109173

#SPJ2

The most popular productivity suite in the world is microsoft office. please select the best answer from the choices provided t f

Answers

Statement, the most popular productivity suite in the world is microsoft office is correct. The statment is ture (T).

What is productivity suite?

productivity suite is a collection of programs desgined for the computer whcih has a word processor, presentation creater and spreadsheet creater.

Types of productivity suite-

Computer based productivity suite- This type of productivity suite are need to be installed the program on the computer, which can be work offline mode too.Online productivity suite- Online productivity suite are availeble on the internet and can be use whenever required without preinstallation.

Microsoft office 365 is the best and the oldest productivity suite. Most of the people are familier with this suite and it is most popular productivity suite in the market.

Thus, the statement, the most popular productivity suite in the world is microsoft office is correct. The statment is ture (T).

Learn more about the productivity suite here;

https://brainly.com/question/2764685

which of the following phase change when heat is removed form the material
A. sublimation
B. vaporization
C. Melting
D. Freezing​

Answers

Answer:

It will be D.Freezing

Explanation:

If heat is removed from a substance, such as in freezing and condensation, then the process is exothermic. In this instance, heat is decreasing the speed of the molecules causing them move slower (examples: liquid to solid; gas to liquid). These changes release heat to the surroundings.

GOOD LUCK

write a program to calculate sum of first ten natural numbers​

Answers

Answer:

Explanation:

total = 0

i = 0

while i<=10:

   total = i +total

print(total)

One way to check if a website is secure is to look for a/an
in the address bar.

Answers

Answer:

One such sign to look for is in the URL of the website. A secure website's URL should begin with “https” rather than “http”. The “s” at the end of “http” stands for secure and is using an SSL (Secure Sockets Layer) connection. Your information will be encrypted before being sent to a server.

T - True. One way to check if a website is secure is to look for a padlock icon in the address bar.

How does this work?

This padlock indicates that the website is using a secure HTTPS connection. HTTPS encrypts the data transmitted between the user's browser and the website, ensuring that sensitive information such as login credentials or financial details remains private and protected from unauthorized access.

Additionally, a secure website's address will start with "https://" instead of "http://". Users should always verify these security indicators before entering any personal or sensitive information on a website to safeguard their online privacy and security.

Read more about websites here:

https://brainly.com/question/28431103

#SPJ2

Select all examples of ethical and appropriate use of business e-mails.

1 ) Claudia shares a joke with her coworkers.
2) Celia forwards an e-mail asking for donations to the relief fund for hurricane victims.
3) Lucia sets up a 2:00 meeting with her marketing team.
4) Iris sends a message about a rally to stop the sale of furs.
5) Ken deletes a message from his boss without reading it.
6) Karl sends a graphic to his coworker in an attachment. Karl sends a graphic to his coworker in an attachment.

Answers

Answer:

Number 3 only I believe, sorry if im wrong.

Explanation:

Time machine could not create a local snapshot to back up from

Answers

Answer:

Time machine could not create a local snapshot to back up from Disk Error.

Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select

Answers

The type of animation that Alejandro should select show a series of images displayed in sequence is: Animated GIF.

What is graphic design?

Graphic design can be defined as an artistic process that is used for the creation of various art works and animations.

In the creation of various graphic files such as in 2-D or 3-D, graphic designers can use a variety of software applications or programs to create still images and animations.

In this scenario, Alejandro should select an animated graphics interchange format (GIF) to show a series of images displayed in sequence.

Read more on graphic design here: brainly.com/question/25299426

The area that we can see just after windows is started is subject​

Answers

Answer:

The area that we can see just after windows is started is desktop or working area.

What will her profit be is she sells her CDs at this price?

Answers

I need the rest of the question before I can help you



Differentiate between
Operating system and
language translator

Answers

It is a program or a series of programs which provides communication between the user and the computer hardware. Translators are programs which convert instructions in assembly language or high level languages into machine languages because computer can only understand machine language.

Which three steps might be included in an algorithm for a digital thermostat?
✓ A. The thermostat uses the resistance detected to calculate the
temperature.
B. The thermostat sends an electrical signal to either the air
conditioner or the heater.
C. The thermostat measures electrical resistance with its thermistor.
O D. The thermostat automatically installs itself by wiring itself to the
house's electrical system.

Answers

Answer:

Explanation:

It certainly isn't D. It would cost a fortune to make that happen. It's not impossibe. Just impractical.

It's not A. Resistance is a floating physical thing present in the air.

B could be correct, but there is a better answer.

The answer is C. A thermistor is a resistance that is temperature sensitive.

How would a user ensure that they do not exceed the mailbox quota?


The user can select a mailbox that does not have a quota.

The user can flag the items as Junk Mail.

The user can just move items to the Deleted Items folder.

The user must empty items from the Deleted Items folder or Archive items.

Answers

Answer:

I don't know about this one

Packet analysis can also help _____ understand protocol and application behavior to see how routines behave, as well as help determine if it is the application OR the network that is causing slow response times.

Answers

Packet analysis can also help developers to understand protocol and application behavior to see how routines behave.

What is the Packet analysis  about?

Packet analysis  is known to be a tool that can help a lot of developers to be able to have a lot gains from understanding protocol and application behavior to see how routines behave.

Conclusively,  Packet analysis can be used to know or determine  when an  application or a given network is having or leading to slow response times.

Learn more about packet analysis from

https://brainly.com/question/6962155

#SPJ1

Other Questions
Find the surface area of the can of milk at the right. [tex] \bold{Use \: = 3.14}[/tex][tex] \red{*}[/tex] a) Qu importancia tiene lacomunicacin no verbal, por qurazn? Please answer this question. In addition to natural factors, human activity can also alter ecosystems. Conduct research on a human activity thatcurrently affects or can theoretically affect your chosen ecosystem. Use your food web model to explain how thischange can affect the competition for food resources. In World War II, Great Britain, France, the Soviet Union, and the United States joined together as the _ A rocket designed to place small payloads into orbit is carried to an altitude of 12.0 km above sea level by a converted airliner. When the airliner is flying in a straight line at a constant speed of 850 km/h, the rocket is dropped. After the drop, the airliner maintains the same altitude and speed and continues to fly in a straight line. The rocket falls for a brief time, after which its rocket motor turns on. Once its rocket motor is on, the combined effects of thrust and gravity give the rocket a constant acceleration of magnitude 3.00g directed at an angle of 30.0 above the horizontal. For reasons of safety, the rocket should be at least 1.00 km in front of the airliner when it climbs through the airliners altitude. Your job is to determine the minimum time that the rocket must fall before its engine starts. You can ignore air resistance. Your answer should include (i) a diagram showing the flight paths of both the rocket and the airliner, labeled at several points with vectors for their velocities and accelerations; (ii) an x-t graph showing the motions of both the rocket and the airliner; and (iii) a y-t graph showing the motions of both the rocket and the airliner. In the diagram and the graphs, indicate when the rocket is dropped, when the rocket motor turns on, and when the rocket climbs through the altitude of the airliner. factors that makes mining sector have competitive advantage over it's competitors PART A: Which of the following identifies the central idea of the text?A. Researchers successfully fixed a genetic mutation in an animal embryo and are nowready for human trials.B. Researchers used gene editing to repair a mutated gene, but also caused severedamage around the target gene.C. Researchers found that DNA is able to repair genetic mutations on its own and doesnot require help from scientists.D. Researchers used improved gene editing techniques to repair a mutated gene thatcaused a genetic disease. Which table represents a relation that is not a funtion? 20 POINTS!What lasting impacts from the Dust Bowl and the Great Depression can still be felt today? what is the pH of 3.65 grams of HCl dissolved in 1250 mL distilled H2O Krystal was given $3000 when she turned 2 years old. Her parents invested at a 2% interest rate compounded annually. No deposits or withdrawals were made. Determine how much money Krystal had in the account when she turned 18. How is permeability related to the size of the grains that make up the sediment? Why are females more likely to contract bladder infections than males? Characteristics of plant cells include which of the following? Select all that apply.cell plate in cell divisioncleavage furrowlarge hypertonic vacuoleno chlorophyll or chloroplastsno cell wall, only plasma membrane Check the sentence with the bolded wordthat makes better sense:1- a. The girl's positive words made me feel better.b. We took the village out of the house.2-a. The calm girl yelled a lot.b. The team members asked Kate to represent them atthe dinner 3-a. I was content to stay at home by the warm fire.b. My mom punished me for doing my homework.4-a. The man expected me to say yes.b. The issue did not taste very good.5- a. I behaved wisely while I was asleep..b. I avoided my friend because she had laughed at meat mga Conclusion on jews how were treated 1933 to 1946 List three things that are limiting factors on the growth of a population. Write an informative research-based essay to compare the culture and power of Athens and Sparta. Use evidence from your research to support your essay.The ancient Greek city-states of Athens and Sparta are two of the most famous societies of the ancient world. They have inspired numerous stories, myths, and even modern books and movies. Although they were both Greek, their cultures were very different, and the two were rivals in their dominance over the Greek world. In an essay of four paragraphs, answer: How was society in Athens similar to and different from society in Sparta?For your comparison, be sure to include three of the following:EducationGovernmentBeliefs/valuesEconomyThe roles of women and childrenYour essay should be a total of four paragraphs including: an introduction, a paragraph about the similarities between ancient Athens and Sparta, a paragraph about the differences between ancient Athens and Sparta, and a conclusion.DONT COPY ANYBODY ELSE Help!!! Photography class!! ASPWhich of the following represents aperture priority mode?Select all that apply..The photographer needs to select the value of aperture manually.B.The camera determines the value of aperture automatically.The camera determines the value of shutter speed automatically.DThe photographer needs to select the value of shutter speed manually.