Answer: Honestly, code.org wont get you far. I recommend you get a IDE and pick a language to learn.
I would be happy to help you im not going to make it for you but i can help walk you thought it. I know a little bit of code.org had to make something in it last year.
1. The structural framework for greenhouses is typically made of
A. metal or plastic tubing.
B. wooden slats
C. glass beams
D. All of the above
HELP ASAP 10 POINTS COMPUTER SCIENCE
Answer:
B
Explanation:
What is the purpose of HTML?
A. to store data
B. to structure a document
C. to style a document
D. to add functionality
plz it a test
Which type of digital picture is made by strong individual pixel value
Answer :a bitmap because it is a 'map' of where the 'bits' of information are stored
Explanation:
This information is stored as a sequence of numbers defining the colour of each pixel.
Answer:
raster
Explanation:
Raster images, such as digital photographs, store the color value of each individual pixel.
How do libraries let you write programs at a higher level? Why is testing important when building and sharing libraries?
Answer:
libraries do this so that you dx chae
Explanation:
What do you type in the “subject” box
(A)The title of your email/summary of what you need
(B) The persons name you are sending an email to
(C) The question you are asking
I will mark brainliest
Answer:
the correct answer is: (A) The title/summary of what you need.
Explanation:
The subject is what the receiver see's when going across the email. Putting the summary of what the email is about in subject allows them to see what the email is mainly about seeing if they should continue reading the email or not. So providing the summary pf the email lets the receiver know what the email is about. Hope this helps! :D
Which of these is not a common type of programming design?
~object-oriented design
~structured programming design
~graphic design
~top-down programming design
Answer:
structured programming design.
Explanation:
Answer:
I can confirm its structured programming design
Explanation:
What is the Denary representation of this 8 bit number > 01001111 ?
The Denary representation of this 8 bit number 01001111 is 79.
Decimal numberA binary number is a number expressed in the base-2 numeral system or binary numeral system. Binary numbers are either 0 or 1.
The decimal numeral system is the standard system for denoting numbers. Decimals are a set of numbers lying between integers on a number line.
Converting the number 01001111 to decimal:
01001111 = (0 * 2)⁷ + (1 * 2)⁶ + (0 * 2)⁵ + (0 * 2)⁴ + (1 * 2)³ + (1 * 2)² + (1 * 2)¹ + (1 * 2)⁰ = 79
The Denary representation of this 8 bit number 01001111 is 79.
Find out more on Decimal number at: https://brainly.com/question/1827193
What are the differences between linear algorithm and iterative algorithm
Answer:
For example Tower of Hannoi algorithm is made easy by recursion while iterations are widely used, efficient and popular. Recursive vs Iterative Algorithms: Approach: In recursive approach, the function calls itself until the condition is met, whereas, in iterative approach, a function repeats until the condition fails.
Jiwoo is a professional photographer. Identify and describe a photography scenario where Jiwoo would need to consider the ethics and aesthetics of photography before proceeding. Clearly examine what ethical and aesthetic consideration she would have based on the scenario that you describe and how these relate to photography as a career or art form in general.
Answer:
Photography ethics are the principles that guide the way we take and share photos. Why is photography ethic so important? If we don't have morality in the way we use photography, we risk Aesthetics Ethics deals with the rights and wrongs and Aesthetics deals with beauty or otherwise. When we correct, manipulate or enhance images, the factors of ethics and aesthetics must always be kept in consideration. Where Does One Draw The Line if you add or remove something there that wasn’t in the scene you have crossed from documentary to fictional art. Exceptions In other cases, the only way to present a truer representation of reality is through a composite rather than with a single exposure.
Explanation:
I hope this helps I little
Lin wants to play an online game with her friends. She read the description of the game and knows it contains several features with addictive design, including rewards for completing levels and long game times with penalties for quitting early. She likes the game but doesn’t want to get sucked in and skip her homework (which has happened before)! Name two guidelines Lin should set for herself before playing the game.
Answer:
Set a time limit for herself. Ask her parents for help monitering her app usage.
If y varies inversely as x, and y =23 when x=8, find y when x=4 .
True or false: Machine learning lets computers
learn how to do things they weren't
specifically programmed to do.
Answer:
True
Explanation:
A beam of light travels in air and then passes through a piece of glass at an angle of 45 degrees to the normal. As the light passes from the air into the piece of glass, the light ray is bent, what is the angle of refraction measured from the normal?
Answer:
The angle of refraction measured from the normal is approximately 28.13°
Explanation:
The angle of refraction is the angle made by the refracted ray and the normal line drawn at the point where the ray passes through the interface of the two mediums
According to Snell's law, we have;
[tex]_1 n_2 = \dfrac{n_1}{n_2} = \dfrac{sin \, \theta _2}{sin \, \theta _1}[/tex]
n₁·sin (θ₁) = n₂·sin(θ₂)
Where;
₁n₂ = The refractive index of air to glass = 1.5
n₁ = The refractive index of air = 1
n₂ = The refractive index of glass ≈ 1.5
θ₁ = The angle of incidence = 45°
θ₂ = The angle of refraction measured from the normal
Therefore, we have;
1/1.5 = sin(θ₂)/sin(45°)
sin(θ₂) = sin(45°)/1.5 = (√2)/2/(3/2) = (√2)/3
∴ θ₂ = arcsin((√2)/3) ≈ 28.13°
The angle of refraction measured from the normal = θ₂ ≈ 28.13°.
How does segmenting your network increase network security?
Answer:
By segmenting networks, it becomes easier to protect the most sensitive data that you have on your internally-facing network assets. The creation of a layer of separation between servers containing sensitive data and everything outside of your network can do wonders to reduce your risk of data loss or theft.
Explanation:
PLEASE MARK ME AS BRAINLIEST
Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.
o Passwords should be used only once.
o It could be easily guessed.
o Passwords must be unique.
o It contains insufficient personal information.
o Passwords should be changed regularly.
Answer:
it could be easily guessed
Imagine you are playing a video game like Super Mario or Sonic and you lose your last life. What are THREE distinct things that will happen once your lives become 0? Give three examples. Then put on your programmer's hat. Describe your examples using pseudocode; in other words, you don't have to use the exact language Scratch blocks would, as long as you write out each step in such a way that it's clear what the code would do.
Answer:
Three distinct things that would happen are
1) There would be a death animation played
2) GAME OVER text would appear
3) The game would most likely start over at the first level
Explanation:
The pseudocode:
1) Play death animation and music
2)Stop animation and music
3) Display Game over text
4) Remove game over text
5) Reset level
6) Open on beginning screen/level
Which are the following 4 things something must be able to do in order to be a computer? *
Answer:
There are four main equipment functions of a computer system: Input, Processing, Storage and Output.
Explanation:
Nano technology uses include...
A: Tennis racquets (high strength to weight)
B: Self-cleaning fabrics
C. Antibacterial fabrics
D: All of the above
Someone please tell me what lambda does! in python!! I need help
Answer:Lambda Technologies is the he is the group name encompassing a Premier materials research laboratory with an engineering and production enterprise dedicated to the development and optimization of of surface treatments our company has been selling materials for over four decades with over 150 years of combined experience in more than 20,000 research programs we are proud of our corporate legacy in record or around standing performance in meeting or customers needs room training all excellence groundbreaking innovation and committed hard-working employees we are able to provide more than just data we provide complete service enhancement solutions are resources that can include all of our technical papers he studies defraction notes and downloads we are a well known source of research in education materials on the understanding measurement and controls of residual stress
Explanation:
Why is it a good practice to use functions in programming? Select the best answer.
A.It is faster to run the code using functions.
B.Functions allow us to reuse common code.
C.All of these are correct.
D.It is easier to debug the code using functions.
Answer:
C. All of these are correct answer from the options for the question that u have given...
The good practice to use functions in programming is all of these are correct. The correct option is C.
What are functions in programming?The repetitious codes are removed by breaking a program down into functions, which not only reduces the size of the program but also improves its effectiveness. If there were repetitive codes, we would need to alter the program from several locations rather than just one.
As a result, organizing programs into functions aid in good administration and shortens programs by removing repeated code. A functional programming language is a particular kind of language that allows for the creation and application of pure mathematical functions, along with the use of conditional expressions and recursion to carry out various computations.
Therefore, the correct option is C. All of these are correct.
To learn more about functions in programming, refer to the link:
https://brainly.com/question/24297344
#SPJ6
Some Tiny College staff employees are information technology (IT) personnel.
Some IT personnel provide technology support for academic programs, some provide technology infrastructure support, and some provide support for both.
IT personnel are not professors; they are required to take periodic training to retain their technical expertise.
Tiny College tracks all IT personnel training by date, type, and results (completed versus not completed).
Given that information, create the complete ERD that contains all primary keys, foreign keys, and main attributes.
A “drone” is:
A. A helicopter with four propellers.
B. Any vehicle used on a seek-and-destroy mission.
C. Any experimental test vehicle.
D. An unmanned aircraft.
Color codes are stored as:
A) int
B) float
C) dec
D) Strings
Answer:
the correct answer is Strings, have a great evening yall
Explanation:
Even though data travels at the speed of light, networks can be slow. What affects the download speed of the network? Check all of the boxes that apply.
Answer:
bandwidth and internet connection
Explanation:
Answer: bandwidth and internet connection
Explanation:
Choose all items that are true about the two example of HTML shown on the right.
A. Example 1 will display differently than example 2 in a web browser.
B. They are styled differently, but will look the same in a web browser.
C. Example 2 is easier to analyze and repair.
D. The styling in example 2 is required by modern web browsers.
Answer:
“They are styled differently, but will look the same in a web browser” & “The styling in example 2 is required by modern web browsers”.
Explanation:
Answer:
B and C
Explanation:
WILL MARK BRAINLIEST!!! Practice working with diagrams, shapes, and graphic text using this document. Complete each sentence. Steps 2, 4, and 6 involve using ___ under the Insert tab. The blue box is ___ in Step 7. The handle used to rotate the arrow in Step 8 is ___. To complete Step 13, the ___ tab needed to be used. Then, the WordArt options could be found under ___.
Answer:smart art
Enlarged
Green
Insert
Text
Explanation:
Which of the following is NOT an acceptable way to create a color?
A) O "cyan"
B) O "#ff2341"
C) blue
D) "RGB (0, 15, 234)"
The option that is not an acceptable way to create a color is blue.
How can I create a color?There are a lot of ways to create some unique color such as the additions of colors together. An example is the addition of purple, orange, and green together.
Note that blue on its own cannot create another color and as such, The option that is not an acceptable way to create a color is blue.
Learn more about color from
https://brainly.com/question/4431200
#SPJ2
You have been given an assignment to create a webpage that has a calming effect on the viewer. Which of these is most likely to achieve that goal?A.multiple font sizes B.a textured background C.rotating elements D.use of blues and greens
Answer:
The answer should be D.
Explanation: Cool colors make someone feel calm,mainly blue and green
Answer:
“Use of blues and greens”
Explanation:
can someone help me answer this, I can’t fail tysm :)