Kali, a Python programmer, is using the turtle module to write the word “hello.” Which code should she use to indicate the location to begin writing the word?

Answers

Answer 1

Answer:

c

Explanation:


Related Questions

Select the correct answer
Which filter enhances the color contrast around the edges of an image?

A. Texture filters

B.Sharpen filters

C.Blur filters

D.Noise filters

Answers

Answer: C. Blur filters

Explanation:

The unsharp mask filters or blur filters can be used for professional color correction. This will adjust the contrast of the image. Edge details and may produce a darker and lighter line on all side of the edges. This helps in creating illusion or blur image giving a sharp contrast and sharper image.

So, the color answer C. Blur filters

Answer:

B, Sharpen Filters

Explanation:

i got it right lol

is it just me or do people delete other peoples questions and it shows up in my inbox staying its mine

Answers

Answer:

yessss same bru.h

Explanation:

Answer:

ive had that happen before i dont know why it happens

Kayla wants to know whether she should set her network up as a WAN or a LAN. What are the three questions you would ask her, and how would those questions affect your recommendation?

Answers

Due to it's typically massive size, WAN's are almost always slower then a LAN. The further the distance, the slower the network. One of the big disadvantages to having a WAN is the cost it can incur. Having a private WAN can be expensive.

Answer:

I would ask her: One, how large will the business be? Two, how secure she wants/needs the connection to be. And three, how much money she is willing to spend to install and/or maintain her network.

Since Kayla is just starting her business, my recommendation would be to set up her network as a LAN. A LAN is a group of computers and network devices connected together, and most often reside in one building. Kayla's business will start small, so it is not needed to set up her network as a WAN. WAN's are usually not restricted to a geographical location, and can be expanded to cover a whole country, or even a planet. A LAN would make sense in the coverage aspect, since Kayla's business has not expanded yet.

Depending on how secure she wants her network to be, she can choose whether or not she uses WAN or LAN. WAN is less secure, as it covers a large geographical area, while LAN is more secure. LAN is more secure because it covers a smaller area. I would recommend using LAN as it is better to have a secure network as a business.  

Finally, Kayla needs to address the cost of setting up and maintaining a LAN or WAN. I would recommend that Kayla uses a LAN because as a starting business, it is important to allocate money properly. LAN's usually cost less to install and maintain due to it's smaller geographical radius, so it would be best to choose to set up her network as a LAN.

Explanation:

What is the other name of the horizontal column graph?
graph is also known as the horlzontal column graph.

Answers

Answer:

Side Graph mabye?

Explanation:

Answer:

A bar graph.

Explanation:

A bar graph is also known as the horizontal column graph.

What kinds of circumstances would lead you to writing a function versus using a loop? please explain in simple terms

Answers

Answer:

1. You want to use parameters

2. You don't want your program to run multiple times

3. You want to call that snippet of code throughout your program

hope this helped :D

Which of the following best describes the protocol used on the internet?

Answers

Answer:

The protocols of the Internet are open and used by all devices connected to the network

Explanation:  

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

You’ve been tossed into an insane asylum. What do you tell the people there to prove to them that you don’t belong inside?

Answers

Was this a question on an assignment or are you in an asylum right now

An asylum is for crazy people. I'm crazy. Crazy people don't realize they're crazy. If I realize I'm crazy, then I'm not crazy. Therefore, I do not belong here.

Describe the history of computer in Nepal.​

Answers

Answer:

The first computer brought in Nepal was IBM 1401 which was brought by the government in lease for the population census of 1972 (2028 BS). Later in 1975 (2031 BS)YantrikSarinikaran Kendra (Electronic Data Processing Centre) was established which was later called as National Computer Centre ( NCC )

Answer:

The first computer brought in Nepal was IBM 1401 which was brought by the government in lease for the population census of 1972 (2028 BS). Later in 1975 (2031 BS)YantrikSarinikaran Kendra (Electronic Data Processing Centre) was established which was later called as National Computer Centre ( NCC )

Explanation:

if this answer is correct please make as brainlelist

What is the purpose of slicing?

a. To combine characters in order to form a single string
b. To combine two or more strings into one big string
c. To pull out a group of characters from a string
d. To pull out one specific character from a string

Answers

Answer:

C

Explanation:

Because a and b are talking about combining and when you slice you don't combine when you slice and when you slice something its into 2 or more parts, unlike what d says

The type of medium used to hide data in steganography is referred to as __________. This may be a photo, video, sound file, or Voice over IP, for example.

Answers

Answer:

:L

Explanation:

Answer:

symmetric cryptography

Explanation:

Which visual novels do you recommend and why?

Answers

Answer:

I rec recommend Fate/Stay Night. It's honestly so good!

Explanation:

help plz (will give brainliest)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This is the python program in the question that is:

def sum(n1,n2):

n=n1+n2

return n

The question is: write a function CALL that displays the return value on the screen.

So, the correct program is written below:

*********************************************************************  

def sum(n1,n2):# it is function that define sum

 n=n1+n2 # variable n that store the result of n1 and n2

 return n # return the result

print(sum(3,5))# call the sum function with parameter 3 and 5 , it will print 8

print(sum(4,101))

# call the sum function with parameter 4 and 101 it will print 105

********************************************************************************

you can also store the sum result into another variable, because this function return the sum. So, you can store that return value into another vairable and using the print function, to print the value of this variable such as:

*****************************************************************************

def sum(n1,n2):# it is function that define sum

n=n1+n2 # variable n that store the result of n1 and n2

return n # return the result

result= sum(6,9) # store the sum result into another variable i.e result

print(result)# print the result variable value

*****************************************************************************


8.10 Code Practice Question 1

Write code that takes in two words from user input and stores them in the variables x and y respectively. Then, the programs the values in x and y, and print x and y).

Note: The variable names x and y are required for this question

Answers

x = input("Enter a word: ")

y = input("Enter a word: ")

x,y = y, x

print(x)

print(y)

I hope this helps

Since we need to perform some coding functions such as:

Asking for the input of a numberStoring them as individual variablesPrinting/Displaying the values independently.

First thing we need to do is to declare the unknown variables as x and y

Next would be to write the input this way:

x= input ("Put a word:")

y= input ("Put a second word:")

x,y = y, x

Print(x0

Print(Y)

Read more about programming here:

https://brainly.com/question/18900609

Eli needs to export files from his mailbox into a single file that is portable and can be backed up to removable media. Which file type will he use?

Answers

Answer:

PST

Resource:

This question has already been answered here: https://brainly.com/question/18415952

Explanation:

PST is the personal storage table, which is a file built by Microsoft to store data from outlook and other services too.  Really quick, this may or may not be an option that you are looking for but, what I would do in my opinion would be to use the PST and export it on a removable USB, since USBs are removeable media.

What is the function of a web browser, and what are the main components of a web address?

Answers

Answer:

The primary function of a web browser is to render HTML, the code used to design or "mark up" webpages. Each time a browser loads a web page, it processes the HTML, which may include text, links, and references to images and other items, such as cascading style sheets and JavaScript functions.

Function of a web browser: A web browser allows users to access and view websites on the internet, request web pages from servers, and display their contents.

Main components of a web address (URL):

1. Protocol

2. Domain

3. Subdomain

4. Path

5. Query parameters

6. Fragment identifier

The Function of a Web Browser:

1. Requesting Web Pages: The web browser sends requests to web servers to fetch specific web pages or resources (such as images, videos, and stylesheets) associated with those pages.

2. Rendering Web Pages: Once the web browser receives the requested content from the server, it interprets and renders the HTML, CSS, and JavaScript code to display the web page's content and structure.

3. Supporting Multimedia: Web browsers are capable of handling various multimedia elements, such as images, audio, and video, allowing users to experience a rich and interactive web environment.

4. Managing History and Bookmarks: Web browsers keep track of the browsing history, allowing users to revisit previously visited sites. They also provide features to bookmark and save favorite websites for quick access.

Main Components of a Web Address (URL):

A web address, also known as a URL (Uniform Resource Locator), is the unique address used to identify a specific web page or resource on the internet. It consists of several components:

1. Protocol: The protocol is the method used to access the resource.

2. Domain: The domain is the address of the website or server hosting the resource. It is typically the main part of the URL.

3. Subdomain (Optional): Subdomains are prefixes added before the main domain.

4. Path: The path specifies the location of the specific resource on the server. It may include directories and filenames.

5. Query Parameters (Optional): Query parameters are additional data passed to the web server for processing.

6. Fragment Identifier (Optional): The fragment identifier is used to specify a specific section or anchor within a web page.

Learn more about Web here:

https://brainly.com/question/27961981

#SPJ6

help pleaseee!!!!!!! will give brainliest !!!!!
How do you increase the number of CPUs in a virtual machine in order to optimize it?

Answers

Answer:

Not sure if this will help

Explanation:

increase the number of motherboards, and install compatible CPUs on each motherboard

What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks

Answers

The correct answer is least functionality. I hope this helps.

Categorize each memory card as based on new or old technology. PLEASE HELP.

Answers

Answer:

SD Cards and XDQ Cards are new XD Cards and CF Cards are old.

Explanation:

Hope this helps.

Write a program to have the computer guess at a number between 1 and 20. This program has you, the user choose a number between 1 and 20. Then I, the computer will try to my best to guess the number. Is it a 18? (y/n) n Higher or Lower (h/l) l Is it a 5?(y/n) n Higher or Lower (h/l) h Is it a 10? (y/n) y I got tour number of 10 in 3 guesses.

Answers

Answer:

This question is answered using C++ programming language.

#include<iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   int num, computerguess;

   char response, hl;

   cout<<"Choose your number: ";

   cin>>num;

   srand((unsigned) time(0));

   int high = 20;    int low = 1;    int guess = 0;

   computerguess = low + rand() % high;

   cout<<"Is it "<<computerguess<<" ?y/n: ";

   cin>>response;

   while(response == 'n'){

       cout<<"Higher or Lower? h/l: ";

       cin>>hl;

       if(hl == 'h'){            low = computerguess+1; }

       else{   high = computerguess-1; }

       guess++;

       computerguess = low + rand() % high;

       cout<<"Is it "<<computerguess<<" ?y/n: ";

   cin>>response;

   }

   cout<<"I got your number of "<<num<<" in "<<guess+1<<" guesses.";

   return 0;

}

Explanation:

This declares num (user input) and computerguess as integer

   int num, computerguess;

This declares response (which could be yes (y) or no (n) and hl (which represents high or low) as char

   char response, hl;

This prompts user for input

   cout<<"Choose your number: ";

This gets user input

   cin>>num;

This allows the computer be able to generate different random numbers at different intervals

   srand((unsigned) time(0));

This declares and initializes the range (high and low) to 20 and 1 respectively. Also, the initial number of guess is declared and initialized to 0

   int high = 20;    int low = 1;    int guess = 0;

Here, the computer take a guess

   computerguess = low + rand() % high;

This asks if the computer guess is right

   cout<<"Is it "<<computerguess<<" ?y/n: ";

This gets user response (y or n)

   cin>>response;

The following iteration is repeated until the computer guess is right

   while(response == 'n'){

This asks if computer guess is high or low

       cout<<"Higher or Lower? h/l: ";

This gets user response (h or l)

       cin>>hl;

If the response is higher, this line gets the lower interval of the range

       if(hl == 'h'){            low = computerguess+1; }

If the response is lower, this line gets the upper interval of the range

       else{   high = computerguess-1; }

This increments the number of guess by 1

       guess++;

Here, the computer take a guess

   computerguess = low + rand() % high;

This asks if the computer guess is right

   cout<<"Is it "<<computerguess<<" ?y/n: ";

This gets user response (y or n)

   cin>>response;    }

This prints the statistics of the guess

   cout<<"I got your number of "<<num<<" in "<<guess+1<<" guesses.";

Soft skills are more likely to be transferable than hard skills?

True or false

Answers

Answer:

The correct answer is true.

Explanation:

Examples of Soft skills are

Communication TeamworkPositive Attitude etc.                              

These skill can be applied to any job. That is why we have said that soft skill are transferrable.

Now let look at hard skill,

Hard skill like programming in python. Making the architecture of computer. These skill can not be transferred to a new job like authoring a book.

so, hard skills are not easily transferrable.

What will you see on the next line?

>>> aList = [12, 3, 5, 7, 7]
>>> aList.index(7)

1

7

3

2

Answers

Answer:

its 3, just did it on edg 2020

Explanation:

sdfdsfdsfdsfsdfsdf vote me brainliest!

The next line after >>> aList = [12, 3, 5, 7, 7], >>> aList.index(7) is 3. The correct option is c.

What is an array?

A group of identical objects or pieces of data held near to one another in memory is referred to as an array. An array type is a user-defined data type that consists of an ordered collection of objects of a single data type. Ordinary array types have a set maximum number of elements they can hold and use the ordinal position as the array index.

The unordered list that is a part of the simple array is thus visible. The unordered list can be converted to an ordered list by executing the command "aList. sort()".

So, the next line will be:

>>> aList = [12, 3, 5, 7, 7]

>>> aList.index(7)

3

Therefore, the correct option is c. 3.

To learn more about array, refer to the link below:

brainly.com/question/14915529

#SPJ2

How does entertainment relate to coding?

Answers

Answer:

not sure if this is the type of answer you're looking for but: Entertainment can relate to coding because in TV shows and movies, there is lots of editing. Especially with cartoons. Inorder to make these, we have to use coding. This can even relate to real life plays and preformenses depending on how much technology you use to preform them.

Name the stringed instrument that's known for its haunting sound, wide pitch capability, and large numbers in the orchestra.

A. Harp
B. Violin
C. Viola
D. Clarinet

The subject is Music Technology.

Answers

Answer:

VIOLIN

Explanation:

The VIOLIN is the stringed instrument that's known for its haunting sound, wide pitch capability, and large numbers in the orchestra.

I think the correct answer would be harp!! BRANLIEST plz

When do you use a for loop?

Answers

Answer:

You use a for loop when you know how many times you want to run the loop

Explanation:

if you dont know, use a while loop

answer this now
and thanks

Answers

Answer:

the process of burning something

Answer:

Option D) the process of burning something

Explanation:

Combustion, or burning, is a high-temperature exothermic redox chemical reaction between a fuel and an oxidant, usually atmospheric oxygen, that produces oxidized, often gaseous products, in a mixture termed as smoke. 

What predefined match policy allows viewers to watch a claimed video but does not allow ads to display on the video

Answers

Answer:

The correct response is "Track".

Explanation:

Tracks encourage the individual that listens to that same music video to miss or ignore that same starting of almost any soundtrack at a certain moment. It might also impact an individual who accompanies a facility that implements or obeys guests.

For obvious reasons, a digital ad service can track client's internet search engine behavior patterns to continue providing accurate recommendations.

) Find and write the o/p :
X=[“F”,66,”QE”,15,”S”,34]
Y=0
Z=” ”
A=0
for c in range(1,6,2)
Y+=c
Z=Z+X[c-1]+'$’
A+=X[c]
Print(x,y,z)

Answers

Answer:

The output of this question is

['F', 66, 'QE', 15, 'S', 34] 9  F$QE$S$

Explanation:

In this question the user want to print the value of X,Y and Z

Let calculate the value of X first.

As the value of X is not altered in the program to its value will be the same that is:

['F', 66, 'QE', 15, 'S', 34]

Now we will calculate the value of Y

It is written as

Y+=c

which can be written as Y=Y+c

The loop here start form 1, the it go to 3 then 5 as explained below

Range(1,6,2) is written

The first value is the start value

The second value is stop value

While the third value is how much to increment.

So first its value will be 1 then increment it by 2. It will become 3

then increment it by 2 again it will become 5. in the next step it will become 7 which is out of range

so

Y=Y+c  =>  Y=0+1       (first loop)

                  Y=1+3       (second loop)

                   Y=4+5    (third loop)

  Some y will be 9

Now let focus on the value of Z

Z= " " +X[1-1]+'$'  (first loop)  value of  c=1

so it will become

Z=F$

Now in 2nd Loop

Z=" " + X[3-1]+'S'  (2nd loop)    value of c=3

it will become

Z=QE $

Now in 3rd Loop

Z=" " + X[5-1]+'S'

it will become

Z=" " S + $

so the overall answer of print will become

['F', 66, 'QE', 15, 'S', 34] 9  F$QE$S$

select the correct option
and thanks

Answers

M cucumber
Should be the ans

Answer:

Cucumber

Explanation:

Cucumber has the largest portion. .08 kg/tray/day. The entire graph equals 100%, and the cucumbers take up 17.8% of it.

List five types of system information that can be obtained from the Windows Task Manager. How can you use this information to confirm the presence of malware on a system

Answers

Answer:

Part A;

Five types of system information that can be obtained from the Windows Task Manager includes;

1) The processes taking place

2) The performance of the system components, including the, CPU, Memory, Disk, Wi-Fi, GPU, and a live summary of the metrics of the computer

3) The App  history

4) The list of startup

5) The current users of the computer

Part B;

By going through list of active processes on the Windows Task Manager, a malware can be detected as a rogue or unidentified process that may be running on the background. The name of a process may seem legit, but however, the process is not supposed to be running, such as a program which is not running or installed on the system  but the process is seen running on the Windows Task Manager, that is a sign of a malware on the system

Explanation:

Kris is the project manager for a large software company. Which part of project management describes the overall project in detail?

1) Analysis report

2) Resources document

3) Scope

4) Scope creep

Answers

The answer is 2), good luck.

Answer:

Scope or 3)

hope this helps

always love to be marked brainliest

Other Questions
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional questions.Online Content: Site 1Explain why the Democratic Party was dominant in Texas during statehood, but was also not very organized. In the equation y=2X+7 whichnumber is the slope?Slope (m) True or False: Ecological succession happens very quickly, usually just a few years. True False Dominic is signing up for a gym membership with a one-time fee to join and then a monthly fee to remain a member. The total cost of the gym membership over t months is given by the equation C=45t+100. What is the y-intercept of the equation and what is its interpretation in the context of the problem? the explanation for energy Cytosine makes up 24% of the nucleotides in a sample of DNA from an organism.What percent of the nucleotides in this sample will be thymineA) 48%B) 26%C) 24%D) 13% please urgent please beg ANSWERRR PLZZZ TYYYY IF YOU HAVE THE RIGHT ANSWER YOU WILL GET BRAINLIEST AFTER I CHECKKK plz help! will give brainliest!!! a hotel with 75 rooms has 45 for doubles and 30 singles. singles can be booked in any room, but reservations for two or more people must be booked in double rooms. what inequalities represents this situation? what is mean by drugs write in a sentence Calculate the change in entropy of 0.020 kg of ice when it melts at 0.0C. The heat of fusion of ice is 3.36 x 10'J/kg. B. Here is what a typical weekend is like at a university. Complete the following passage with verbs from thelist, the correct form of the definite, indefinite, or partitive article, or with de.Verbes: aimer, aller, attendre, tre, faire, jouer.Please help I need the answer ASAP?! Plezzzzzwzzzzzzzz help Many argue that GPS technology is harmful because it:A. is expensive and difficult to navigate.B. violates people's privacy and personal space.C. shows us places we've never visited.D. will get people lost because it's unreliable. Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second, regardless (within limits) of size. Assume the workstation uses direct memory access (DMA) to move data in and out of its main memory, which has a bandwidth of 2 Gbps, and that the I/O bus has a bandwidth of 1 Gbps. At what packet size would the bus bandwidth become the limiting factor Which is the most accurate generalization that can be made about thispassage?A)Sojourner Truth believes that women should haveequal rights to men.B)Sojourner Truth believes that she is a woman equalto all other women.C)Sojourner Truth does not want to upset anyone withher personal beliefs.D)Sojourner Truth lists all the ways that she's beenmistreated and abused. Certaines personnes pensent que la fte en famille est une perte de temps et d'argent. Partagez vous cette opinion? What are the main functions of the human skeletal system?A To support the body, protect the organs, produce blood cells, and store calcium.To regulate the composition of body fluids by removing metabolic wastes and retaining a balance of water, salt, and othernutrientsOcTo regulate and maintain bodily functions by producing hormones and releasing them into the bloodstream.D. To enable the diffusion of oxygen into the bloodstream and the removal of carbon dioxide from the bloodstream. Which of the following is not a sign that chemical reaction has taken place?a. temperature change b. formation of a liquid c. color change d. formation of a gas