COMPUTER CODING

I NEED HELP ASAP

I am so stuck and I have no idea how to do it. The website is CMU CS Academy. I have to put code under the yellow highlighted words put code under here.

COMPUTER CODINGI NEED HELP ASAPI Am So Stuck And I Have No Idea How To Do It. The Website Is CMU CS Academy.

Answers

Answer 1

Answer:Maybe put in Ball.move.left.right(100)

Explanation:

If the ball should move then the code might be left and right,

I don't know if I am right but I do coding too.


Related Questions

As a programmer, you have been developing problem solving and critical thinking skills reviewing each step and practicing ________________ strategies, along the way.

Answers

Answer:

Explanation:coding

The answer of this question is coding.Your welcome

Here is a list of storage devices:
hard disk drive
solid state drive
blu-ray
dvd rom
sd card
usb memory stick
cd rom
magnetic tape

which of these devices can store the most data?
which of these devices can store the least data?
which of these devices is the cheapest per mb?
which of these devices is the most expensive per mb?
which of these devices is easiest to take somewhere with you?
which of these devices is most likely to get damaged?

Answers

I think it’s common number three I hope this helps

Answer:

which of these devices can store the most data?

hard disk drive

which of these devices can store the least data?

dont  know

which of these devices is the cheapest per mb?

hard disk drive

which of these devices is the most expensive per mb?

solid state disk

which of these devices is easiest to take somewhere with you?

dont  know

which of these devices is most likely to get damaged?

phones

hope it helped you !!

Using AI to predict future crimes might be considered

bias
fair
helpful
smart

Answers

Answer:

helpful

Explanation:

Answer:

I think using Al to predict future crimes might be considered HELPFUL

If you see that your bank account has had some money taken out that you did not authorize, which of the following is one action you can take to defend yourself?
A. File a police report.
B. Add more money to the back account.
C. Try to contact the person you think took your money.
D. Leave the bank account open to see if more money is taken.

Answers

I think the answer is A. File a police report,
A, File a police report

Brainliest for correct answer

Which of the following statements describes circuit boards?
They have billions of tiny switches.
They operate according to the decimal system.
They have been replaced in modern computers by hard drives.
They make the keyboard function properly.

Answers

Answer: A

Explanation: Been asked before.

A
Explain: I did this in a test

Help me please. I dont really understand this.

Help me please. I dont really understand this.

Answers

I didnt see the 2022 year date (sob sob) mbb

what computer languages should i start with + learn if i want to be a pentester/programmer and where can i learn them

Answers

Answer:

Chinese

Explanation:

I'm not sure I understand your question. Good day.

How do the text feature help on the text?

Answers

Answer:

Text features help you locate important information in a text. Knowing the purpose of the text feature helps you decide at which text feature to look when you want to understand your text better. Organized by purpose, the chart identifies text features and how they help the reader.

Explanation:

Here is your answer
How do the text feature help on the text?

Which of the following lines of code creates a division called answer?

A.


B.


C.


D.

Answers

Answer: ‎

Explanation:

i believe the answer is C

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

Why does my brainliest keep going down when I didn't use any? I had 7 but now I have 4.

Answers

Answer:

Explanation:

because ur posting this quastion and the more u post the more ur points go down

Answer:

The questions that you got brainliest on might have been deleted.

Explanation:

Complete the statement below with the correct term. The best place to start when you are looking for information about a device or an application is the "blank" of the company that manufactured the device or programmed the software. whoever answered first will get brainleast plsssssss

Answers

Answer:

website

Explanation:

The best place to start when you are looking for information about a device or an application is the website of the company that manufactured the device or programmed the software.

Answer:

The companys help page.

       

List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)

Answers

Answer:

There are several different industries that are involved in the production and use of computers. These industries include:

Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.

Answer:

Hardware Manufacturers

Software Developers

System Integrators

Service Providers

Data Providers

ISP

Cloud Computing Providers

Consulting Firms

Explanation:

It is in order..

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

Which file type is typically used to save Microsoft Word files? Group of answer choices DOC MPEG PDF XLSX

Answers

Answer:

DOC

Explanation:

It's the common file used.

Hi there!

The answer is “PDF”.

When sending an email and adding an attachment it’s usually labeled as a “PDF”. Whenever saving an image to your computer it’s also considered a PDF.

Which gases are carried by red blood cells? Select two options.
science question

Answers

Answer:

oxygen and carbon dioxide, they carry oxygen to other cells, and carbon dioxide back to the lungs.

Answer:

oxygen and carbon dioxide.

Explanation:

blood Carries co2 to the lungs and oxygen away from them.

can a msi b450 tomahawk motherboard fit into a darkflash dlm21 mesh micro atx tower

Answers

Answer:

Use PCPartPicker

Explanation:

If you use PCPartPicker (extremely popular and good low prices), it will give you the best deals and give you information about every component compatibility.

Riley receives an email containing several grammatical errors with a link to sign a petition. Which of the following strategies should he use to make sure the email is trustworthy? (5 points) Evaluate source credibility. Fact check. Listen to his gut. Look for authenticity.

Answers

The Answer:

Explanation:

He should evaluate the source credibility.

Hey people I'm Beatrix!

I have a fun question for all of you..

If you could have any device that you don't have what would it be?

Answers

A computer, I want one but I don’t have a job yet
I’d be looking for a Super computer god i wanna be able to have access to everything space related that’s what i’d use it for :)

Are there any Potential Dangers in Artificial Intelligence?

Answers

Answer:

Without the proper considerations, AI could lead to bias on the basis of race or gender, inequality, human job loss, and, in extreme cases, even physical harm. In the second article of our two-part series, we'll examine some of the most commonly raised concerns about artificial intelligence and the risks it poses.

Answer:

The other person was correct i believe

Explanation:

(Day 2) Name the video game character (first), and I will give you brainliest.


* You COULD reverse image search to find the characters name, but that ruins the point of enjoying the little moment of enjoyment of someone who actually knows what the chacter is.

(Day 2) Name the video game character (first), and I will give you brainliest.* You COULD reverse image

Answers

Answer: Scratch

Explanation:

flappy bird

Scratch from the scratch jr game

Is a poster the best media form to make a call to action to the government and major corporations? What other media forms could be effective?

Answers

Answer:

A Poster can be an effective media form to make a call to action to the government and major corporations, as it allows for visually impactful messaging. However, other media forms could also be effective, such as:

Social media campaigns: Utilize platforms like Twitt..er, Fa..cebook, or Ins..tagram for awareness and mobilization.

Online petitions: Collect signatures and demonstrate public support.

Video campaigns: Engage viewers emotionally through compelling videos.

Mass media advertising: Utilize TV, radio, or print media for broader reach.

Advocacy websites: Provide information, resources, and a platform for action.

Public demonstrations and rallies: Gather supporters for visible advocacy.

Answer:

Explanation:

Online petitions: Collect signatures and demonstrate public support.Video campaigns: Engage viewers emotionally through compelling videos.Mass media advertising: Utilize TV, radio, or print media for broader reach.Advocacy websites: Provide information, resources, and a platform for action.Public demonstrations and rallies: Gather supporters for visible advocacy.

The commands available from a menu may change as a result of a user's actions. True False .

Answers

i guess it may depend on the context but if someone where to get in trouble they may get privileges taken away so i think the answer is true (not 100% sure)

That’s definitely true, I used to do this a whole lot

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

What is the purpose of the website directory provided by the website host?

Answers

Answer:

to get info

Explanation:

To look up user account information to provide help and training

What are all the names of different Mechanical Watch, Sundial Watch, Pocket Watch,Digital Watch, Electric Watch, Smart Watch and the Computer? What im trying to say is different type of watches that are above for example different type of tyota cars camry, century and etc

Answers

Answer:

mechanical watch: Grand Seiko T0 Constant-Force Tourbillon caliber

sundial watch: police

pocket watch: tissot savonnette pocket watch

digital watch: casio g shock ga100

electric watch: timex m40

smart watch: apple watch 7

computer: mac book air 2021

Explanation:

mark me brainliest if it helped

Mechanical watches: Omega Speedmaster, Rolex Submariner

Sundial watches: ‍♀️

Pocket watches: Bulova, Tissot, Longines

Digital watch: Bran prestige, Timex expedition WS4

Electric watch: ☝️

Smart watch: apple?

Computer: Mac Book, Windows 10

HOW DO YOU TURN CAPS LOCK OFF ON CHROMEBOOK

Answers

Press the caps lock button
Press caps lock again

I have 1111 emails lol

I have 1111 emails lol

Answers

Why you lyin LOLL I-
Imagine couldn’t be me

explain the history of computing of mechanical era

Answers

Answer:The Mechanical Era

Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.

Explanation:Hope this helped

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers
Other Questions
An excessively high amount of self-esteem is also known by the psychological term: The _______ feature shows the results that would occur in your document if you clicked the option to which you are pointing. Small amounts of Liquid A and Liquid B are sprayed into the air, where they form perfect spheres with a volume of 45.0L. The diameters of these drops are measured with a high-speed camera, and their surface areas SA and SB calculated.a. SA will be greater than SB b. SA will be less than SB c. SA will be equal to SB d. It's impossible to predict whether SA or SB will be greater without more information. Now assume the gas has no interaction energy but does have an excluded volume per particle, b=1.9 10 m which means that S = Nk ln(V-Nb) + f(T,N) , where f is some function you won't need to know since T and N don't change. How much does G change when the gas expands isothermally until the pressure is reduced from 4 10 Pa to 2 10 Pa? Gfinal-Ginitial= ? Solve the following system of equations by substitution. Which of the following is the solution? WILL MARK BRAINLIEST IF CORRECT nicole prepares for an upcoming presentation, focusing primarily on what her message is and what she wants to convey to the audience. when the day of the presentation arrives, her speech is not very well received. why is this The movement of water is able to transport minerals and nutrients. Which statement best explain why water is able to do this? A- water is a liquid at room temperature.b- water has a density of one gram per milliliter.c- water absorb heat energy. D- water is an excellent solvent what are the names (in order) of the parts of this function definition? int my_fun (double a) The Romantic era began circa 1800 CE. What is another way to describe the beginning of the Romantic era?after 1800before 1800around 1800exactly 1800 Stambovky, a resident of New York City, contracted to buy a house in the Village of Nyack, New York, from Ackley. The house was widely reputed to be possessed by poltergeists, which Ackley and members of her family had reportedly seen and reported to both Reader's Digest and the local press. In 1989, the house was included in a five-home walking tour of Nyack and described in a newspaper article as a "riverfront Victorian (with ghost)." Ackley did not tell Stambovsky about the poltergeists before he bought the house. When Stambovsky learned of the house's reputation, however, he promptly sued for rescission.What legal theory will Stambovsky use to seek rescission?Is Stambovsky likely to be successful? Which of the following is NOT a property of metals?A - shinyB - ductileC - can be solids, liquids, or gasesD - malleable You drive in a straight line at 18.0 m/s m / s for 10.0 miles, then at 34.0 m/s m / s for another 10.0 miles. Model the relationships between exergonic, exothermic, endergonic,and endothermic reactions by completing the Venn diagram below.The first step has been done for you. a ball is thrown upward in the air from a roof at a height of 40 ft. the equation for the path the ball take can be modeled by: h(t)=-16t + 14t + 40. with t being time in second. How many seconds will it take the ball to hit the ground? Please help me if you can calculate itI can only calculate Q1 a b cQuestion 1A taxi company reveals that the daily earnings of taxi drivers in the company follows a normal distributionwith a mean of $1062.5 and standard deviation of $350.(a) Find the probability that a taxi driver earns less than $1500 in a day.(b) 93.7% drivers earn more than $k a day. Find the value of k.John is a taxi driver in this company. Besides driving taxi, he has another part time online job. The dailyearnings from the part time online job follow a normal distribution with a mean of $235.5 and standarddeviation of $84.5. The daily earnings from driving taxi and part time online job are assumed to beindependent.(c) Use T to denote the total daily earning for a day he drives taxi and works on the part time online job.Find the mean and standard deviation of T. (Round off the mean and standard deviation to the nearestinteger.)(d) Hence, by using $(L1, L2) to denote the middle 96.6% of the total daily earning T, find the values of L1and L2. (Round off L1 and L2 to the nearest integer.)Question 2Tom is a supermarket manager. He reviewed transaction time when a customer paid by credit card. Thetransaction time is normally distribution with mean of 20 seconds and standard deviation of 5 seconds.(a) For a group of 6 customers, find the probability that 5 customers can finish the transaction within 20seconds. (Assume that the transaction times of customers are independent.)After discussion with the network provider, he will upgrade the network so that it is promised that eachtransaction time can be reduced by 15%.(b) Use Y to denote the transaction time after network upgrade. Find the mean and standard deviation of Y.(c) Calculate the 97th percentile of Y. (i.e. find the value of t such that P(Y(d) Compare with the transaction time before upgrade, is it (I) a higher proportion, (II) a lower proportion,or (III) the same proportion of all customers can finish the transaction within 20 seconds? (Just stateyour answer, no calculation is needed.) Use: 0, 4, 6, 11, 9, 8, 9, 1, 5, 9, 7 to construct a line plot. Describe the line plot to the best of your ability in the box below. (2a2 + a + 3) (a - 1) If one force on an object is 5 N upward and the other is 10 N downward what is the objects motion? One of Americas basic values is that of equality? How is equality described?Everyone in a society defines freedom the same way.Everyone in a society tries to stand out as unique.Everyone in a society has the same kind of job.Everyone in a society has the same basic rights.