100 points if you can give me the correct answer .Sarah is working in Scratch and trying to access the code editor. What does Sarah need to click on in order to do this?
Group of answer choices

the Codetab at the bottom right of the screen

the Codetab at the top right of the screen

the Codetab at the bottom left of the screen

the Codetab at the top left of the screen

Answers

Answer 1

Answer:

the Codetab at the bottom right of the screen

Explanation:

because i am smart

Answer 2

Answer: D

Explanation: :) im a scratch expert


Related Questions

Jorge wanted to find out how many 9-volt batteries connected in a series are required to create a 120-volt circuit. So, he divided 120 by 9 and concluded that he needed 13 1/3. Write a sentence explaining Jorge's mistake, and tell the correct answer.

Answers

Answer:

Jorge needed to have over 13 (thirteen) 9 volt batteries to create 120 volts.

Explanation:

Rather than saying he just needs 13 1/3 (one-quarter) 9 volt batteries, Jorge would have correctly concluded he needed over over 13 number of 9 volts battery to create 120 volts.

This is the case because in a series connection, two or more batteries are connected in a way that the same current would flow through each battery through their terminal. If he had taken note of the fact that each battery has an internal resistance, which may reduce the flow of current through the batteries Jorge would know that the  13 number of 9 volts batteries would not give exactly 120 volts because of the internal resistance of the battery circuit.

Emma’s project team has to create an application within a short period of time. after a few considerations, the team decided to go ahead with the rad model. how does the rad model decrease development time? a. by using automated tools and reusing existing code b. by gathering all requirements in the first phase of the project c. by testing at the end of the life cycle d. by producing detailed documentation

Answers

Answer is A, by using automated tools and reusing existing code

Because RAD uses reusable components, the amount of time and effort necessary for testing is decreased.

You can learn more about at:
brainly.com/question/16969631#SPJ4

listen to exam instructionsyou are concerned that wireless access points may have been deployed within your organization without authorization.what should you do? (select two. each response is a complete solution.)

Answers

In order to ensure that no wireless access points have been deployed without authorization, you should do the following two things:

1. Check the organization's inventory. Carefully review any records of hardware and software deployments to identify any unauthorized access points.

2. Monitor for suspicious activity. Regularly scan for any unauthorized access points by running scans or installing software to detect any suspicious activity.


A WLAN, or wireless local area network, is created by an access point, typically in an office or big building. An access point transmits a WiFi signal to a predetermined region after connecting via an Ethernet connection to a wired router, switch, or hub. A wireless access point, also known as a wireless AP or WAP, is a networking hardware device that bridges traffic from wireless stations into the LAN to provide Wi-Fi functionality to the already-existing wired network.

Learn more about wireless access points: https://brainly.com/question/30207492

#SPJ11

One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​

Answers

Answer:

flowchart errors

Explanation:

Answer:

flowchart errors

Explanation:

What is Ce stands for?
O Carbon character
O Carbon calender
Carbon copy
O character change​

Answers

Explanation:

hello I don't know ok sorry

difference between nintendo switch and switch lite

Answers

Answer:

thank you sa point labyu stay safe

Answer: The switch lite is the one you can't dock onto your tv and is mostly used for handheld purposes, also you can't take off the controllers.

Explanation:

Discuss the evolution of file system data processing and how it is helpful to understanding of the data access limitations that databases attempt to over come

Answers

Answer:

in times before the use of computers, technologist invented computers to function on disk operating systems, each computer was built to run a single, proprietary application, which had complete and exclusive control of the entire machine. the  introduction and use of computer systems that can simply run more than one application required a mechanism to ensure that applications did not write over each other's data. developers of Application addressed this problem by adopting a single standard for distinguishing disk sectors in use from those that were free by marking them accordingly.With the introduction of a file system, applications do not have any business with the physical storage medium

The evolution of the file system gave  a single level of indirection between applications and the disk the file systems originated out of the need for multiple applications to share the same storage medium. the evolution has lead to the ckean removal of data redundancy, Ease of maintenance of database,Reduced storage costs,increase in Data integrity and privacy.

Explanation:

o access an array element, use the array name and the element's ________. a. data type b. subscript c. value d. name e. None of these

Answers

Depends, it could be name, but it depends on how you are accessing the array.

Personally, I’d say None of them, since you access an array element/item with an index (the number that the element can be referred with).

E.g. In Python…

arr = [“a”, “b”, “c”]
print(arr[0] == “a”) # Output: “True”

firewall rules evaluate from top to bottom. the rule creators intended to block access to a website hosted at 10.15.1.2, except from hosts located on the 10.20.0.0/16 subnet. however, users on that subnet report that they cannot access the site. what is wrong?

Answers

The reason users cannot access the site is: The rules are misordered.

About Firewall:

A firewall is a type of network security device used in computing that keeps track of and regulates incoming and outgoing network traffic according to pre-set security criteria. A firewall often creates a wall between a reliable network and an unreliable network, like the Internet.

Firewall Rules:

The access control method employed by firewalls to protect your network from malicious apps and illegal access is called the firewall rules. Your firewall's acceptance and denial of different types of traffic are controlled by firewall rules. The firewall access policy is a set of firewall rules. Each network packet's control information is examined, and based on the standards you specify, they are either blocked or allowed. Each package is first assessed from top to bottom, and its constituent parts are contrasted with those of the policy regulations. Then, all of the steps specified in the stated parameters of the first matching rule's configured action are carried out.

Every firewall rule matches packet characteristics against a collection of shared rule elements. The packet's source address (Source), destination address (Destination), protocol and port numbers (Service), the interface it travels across (Interface), the direction it is traveling in (Direction), and the time of arrival are among the rule components that are displayed as fields (Time).

User can fix this mistake by reversing the order of rules 2 and 3. Any communication from the network 10.20.0.0/16 also matches rule 2, which blocks it, thus rule 3, which allows access, will never be activated.

To learn more about firewall rules visit:

https://brainly.com/question/13132276

#SPJ4

The question is incomplete. Below is the complete question:

The firewall rule creators intended to block access to a website hosted at 10.15.1.2 except from hosts located on the 10.20.0.0/16 subnet. However, users on that subnet report that they cannot access the site. What is wrong?

A.The protocol is incorrect.

B.The rules are misordered.

C.The source port is not specified.

D.There is no error in the rule, and Travis should check for other issues.

These are used to section the hair to make application of the color easier.

Answers

Answer:

Sectioning Clips

Explanation:

These are used to make segments or sections in the hair so that applying the color will be easier

true or false? according to the case of diamond v. diehr, computer programs can in principle be patented.

Answers

Answer: true

Explanation:

code-switching decreases the chances of achieving your communication goals

Answers

The statement "Code-switching decreases the chances of achieving your communication goals" is false.

What is Code-switching?

Code-switching is the use of more than one language or linguistic style in a conversation or interaction. Code-switching can be between different languages, dialects, registers, or speech styles.In various multilingual and multicultural societies, code-switching is a frequent and natural phenomenon.

People code-switch for a variety of reasons, such as to express identity, cultural allegiance, social distance, and so on.However, code-switching has been found to improve communication by allowing speakers to express themselves more accurately and fluently, as well as to communicate with a more diverse group of people

Learn more about code-switching at

https://brainly.com/question/31452528

#SPJ11

what is processing unit?​

Answers

Answer:

A central processing unit, also called a central processor, main processor or just processor, is the electronic circuitry within a computer that executes instructions that make up a computer program.

Explanation:

Answer:

CPU is processing unit.

The main computer case containing the central components of a personal computer is central processing unit.

Discuss the Autonomous Robots and Additive Manufacturing contribution to Smart Systems. Why are these two technologies are important for the Smart Systems? Explain the technologies with an example.

Answers

Autonomous robots and additive manufacturing are two crucial technologies that significantly contribute to Smart Systems. Autonomous robots, equipped with sensors, artificial intelligence, and navigation capabilities, can perform tasks with minimal human intervention. They enhance efficiency, safety, and flexibility in various industries. For example, in a smart warehouse, autonomous robots can navigate the facility, locate items, and autonomously pick, pack, and transport them, streamlining the order fulfillment process.

Additive manufacturing, also known as 3D printing, revolutionizes traditional manufacturing methods by constructing objects layer by layer. It enables rapid prototyping, customization, and on-demand production. For instance, in a smart healthcare system, additive manufacturing can be employed to produce personalized medical implants, such as customized prosthetics or dental implants, based on patient-specific requirements, resulting in improved patient outcomes and reduced lead times. Both technologies contribute to the advancement of Smart Systems by optimizing processes, enhancing productivity, and enabling customization in various industries.

who loves wwe and which game of it

Answers

Answer:

Literality me

Explanation:

Answer:

i do :)

Explanation:

i like to watch the wwe monday night raws with my dad

2
ng and Upgrading Computers: Mastery Test
Select the correct answer.
Which of the following can computer maintenance software determine?
O A.
O B.
O C.
O D.
whether your hard drive is about to fail
whether your monitor or screen is drawing too much power
the humidity inside your desktop computer
the amount of dust inside your laptop
Reset
Next

Answers

whether your hard drive is about to fail can computer maintenance software determine.

What is computer maintenance software ?

Software that centralises maintenance data and streamlines maintenance operations is known as a computerised maintenance management system, or CMMS. It aids in maximising the use and accessibility of tangible assets like machines, transportation, communications, plant infrastructures, and other assets. CMMS systems, also known as computerised maintenance management information systems (CMMIS), are used in the manufacturing, energy, transportation, building, and other sectors where physical infrastructure is essential.

A CMMS's database is its fundamental component. The information regarding the assets that a maintenance organisation is responsible for maintaining, as well as the tools, supplies, and other resources needed to do so, are organised using a data model.

Read more about computer maintenance software:

https://brainly.com/question/28561690

#SPJ1

when was "Rick Astley Never Gonna Give You Up" originally made?

Answers

Answer: See explanation

Explanation:

Rick Astley "Never Gonna Give You Up" was originally recorded in October 1986 and was then released on 27th July, 1987.

The song was recorded in South London at the PWL studios. On the American billboard hot 100, it reached number one in March 1988.

Answer:

1987

Please mark me as brainliest

Explanation:

five security-related rules for staff members who are adding web pages being added to your site

Answers

Here are five security-related rules for staff members who are adding web pages to your site:

a. Validate and sanitize user input: Ensure that all user inputs, such as form submissions and URLs, are properly validated and sanitized to prevent potential security vulnerabilities like cross-site scripting (XSS) or SQL injection attacks.

b. Use strong passwords: Staff members should be encouraged to use strong, unique passwords for their accounts. Strong passwords should be a combination of uppercase and lowercase letters, numbers, and special characters. Regular password changes and the implementation of multi-factor authentication (MFA) are also recommended.

c. Apply least privilege principle: Grant staff members the minimum level of access required to perform their duties. Restrict administrative privileges to only those who truly need them, reducing the risk of unauthorized access and potential damage caused by compromised accounts.

d. Keep software up to date: Ensure that all software, including content management systems, plugins, and themes, are regularly updated with the latest security patches. Outdated software may contain known vulnerabilities that can be exploited by attackers.

e. Regularly back up data: Implement regular data backups to ensure that in case of a security incident or accidental data loss, you can restore your website to a previous state. Backups should be stored securely, preferably off-site or in a separate location.

These security-related rules aim to protect your website and its data from various vulnerabilities and attacks. Validating and sanitizing user input helps prevent common attack vectors, such as XSS and SQL injection. Using strong passwords and implementing MFA adds an extra layer of protection against unauthorized access. Applying the principle of least privilege limits potential damage by minimizing access rights. Keeping software up to date is crucial for addressing known security vulnerabilities. Regular backups provide a safety net to recover from incidents and ensure data integrity.

Implementing these security-related rules helps minimize the risk of security breaches and protects your website and its data. By validating and sanitizing user input, using strong passwords, applying least privilege, keeping software up to date, and regularly backing up data, you can enhance the security posture of your website and mitigate potential threats. It is important to educate staff members about these rules and enforce them consistently to maintain a secure web environment.

To know more about web pages, visit

https://brainly.com/question/30004413

#SPJ11

true/false. using only the data provided above, calculate the capacity of the process stated in contracts per day. this is the theoretical capacity of this system.

Answers

The statement "using only the data provided above, calculate the capacity of the process stated in contracts per day. this is the theoretical capacity of this system" is False because without any data provided, it is not possible to calculate the capacity of the process stated in contracts per day. Theoretical capacity refers to the maximum amount of output that a system can produce under ideal conditions.

In order to calculate this, data such as the number of resources, time taken for each process, and efficiency of the system would need to be provided. Therefore, we need more information about the process, such as the production time per contract, the number of resources available, and the efficiency of the process, to calculate its theoretical capacity in contracts per day.

Learn more about theoretical capacity here: https://brainly.com/question/30831394

#SPJ11

Using the example code from Row vs. Column Major, answer the following questions in complete sentences:
1. Is Row-Major or Column-Major order faster? Why do you think that is. Please explain using execution counts.
2. In what scenario would you use Row-Major ordering when traversing a 2D array? In what scenario would you use Column-Major ordering?

Answers

In computing, methods for storing multidimensional arrays in linear storage, such as random access memory, include row-major order and column-major order.

What are Row and Column Major?

Array members are contiguous in memory determines how the ordering differ.

Whereas successive components of a row are located adjacent to one another in row-major order, consecutive elements of a column are situated next to one another in column-major order. The phrases refer to the rows and columns of a two-dimensional array, or a matrix.

For arrays to be effectively sent between programs written in various programming languages, data layout is essential.

Therefore, In computing, methods for storing multidimensional arrays in linear storage, such as random access memory, include row-major order and column-major order.

To learn more about random access memory, refer to the link:

https://brainly.com/question/13269453

#SPJ1

Mention at least five devices used for digitizing data

Answers

Answer:
1. Cloud Storage Solutions
2. Digital Communication Tools
3. Cloud ERP Systems
4. CRM Platforms
5. Digital Accounting Tools

For more information, please visit: https://www.gend.co/blog/the-digitisation-tools-with-the-biggest-impact-for-business?hs_amp=true

Hope this helps!!

Chief technology officers, with their experience, have the oppertunity to be a _______ speaker at events and forums.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer in this question (fill in the blank) is technologist.

Chief technology officers, with their experience, have the oppertunity to be a _technologist______ speaker at events and forums.

Chief technology officer is an expert person in the relevant technology. For example, cloud computing technology, biotechnology, etc. So such type of person knows as a technologist in their respective field/domain.

What were two weaknesses of the First New Deal?

A. It failed to end massive unemployment.
B. It created a huge national deficit.
C. It created tension within labor unions.
D. It failed to properly regulate the banks.
E. It caused people to distrust the banks.

Answers

Answer:B. It created a huge national deficit.

Explanation:

B.The New Deal failed because Roosevelt created uncertainty through experimentation, protectionism, regulation, and raising taxes.

The New Deal failed because the NRA, by fixing prices, damaged American business. Folsom explains that the traditional free market system, where businesses compete and innovate to sell products of varying price and quality to choosy customers was overthrown

D. It failed to properly regulate the banks.

.The next day, Roosevelt declared a four-day bank holiday to stop people from withdrawing their money from shaky banks. On March 9, Congress passed Roosevelt’s Emergency Banking Act, which reorganized the banks and closed the ones that were insolvent.

The Great Depression: Causes and Early Events: Mastery Test

-

Hope this helps :)

What were two weaknesses of the First New Deal?A. It failed to end massive unemployment.B. It created

for workstation coupler termination, use workstation devices, patch cords, and path/cross-connect blocks from the same manufacturer to?

Answers

For workstation coupler termination, use workstation devices, patch cords, and path/cross-connect blocks from the same manufacturer to Minimize the likelihood of component mismatches.

By "workstation," what do you mean?

A workstation is an individual-use computer that is quicker and more powerful than a personal computer. It is meant for usage in the workplace or by professionals (rather than home or recreational use).

Hence, The act of terminating a cable, such as by attaching it to equipment, panels, or a wall outlet, enables the cable to be connected to other cables or devices. Termination utilized in the telecom, datacom, and fiber optic industries will be covered in three primary categories.

Learn more about connector from

https://brainly.com/question/14329759
#SPJ1

Help!!! Who is this? Who is it from?

Help!!! Who is this? Who is it from?

Answers

Show: Dragon Ball Super
Character: Vegito
i have no idea who that is

A program can only create one object of each class.
True
False

Answers

False is the answer to the question

in mpls, packets are delivered based on a. ip destination addresses b. the location of switches c. port addresses d. pre-defined labels

Answers

In MPLS (Multiprotocol Label Switching), packets are delivered based on pre-defined labels, which is option (d).

MPLS is a protocol used in computer networks to efficiently route and forward data packets. It operates at the OSI layer 2.5, bridging the gap between traditional Layer 2 switching and Layer 3 routing. In MPLS, packets are delivered based on pre-defined labels, which distinguishes it from traditional IP routing where packets are forwarded based on IP destination addresses. MPLS labels are added to packets at the ingress router, and subsequent routers in the network use these labels to make forwarding decisions. This label-based approach allows for faster and more efficient packet forwarding, as it reduces the need to perform complex IP lookups at each hop. Instead, routers simply swap labels based on predetermined forwarding tables, resulting in faster packet delivery and improved network performance.

Learn more about pre-defined labels here: brainly.com/question/31974927

#SPJ11

(1 point) you are the head of a division of a big silicon valley company and have assigned one of your engineers, jim, the job of devising an algorithm to sort through an english text of n words and convert it into an esperanto document. jim comes up with an algorithm which takes 2n2 2n bit operations to handle an input text with n words. suppose the computers in your business can handle one bit operation every nanosecond (1 nanosecond

Answers

Answer:

Explanation:

a) 2n^2+2^n operations are required for a text with n words

Thus, number of operations for a text with n=10 words is 2\cdot 10^2+2^{10}=1224 operation

Each operation takes one nanosecond, so we need 1224 nanoseconds for Jim's algorithm

b) If n=50, number of operations required is 2\cdot 50^2+2^{50}\approx 1.12589990681\times 10^{15}

To amount of times required is 1.12589990681\times 10^{15} nanoseconds which is

1125899.90685 seconds (we divided by 10^{9}

As 1$day$=24$hours$=24\times 60$minutes$=24\times 60\times 60$seconds$

The time in seconds, our algortihm runs is \frac{1125899.90685}{24\cdot 60\cdot 60}=13.0312 days

Number of days is {\color{Red} 13.0312}

c) In this case, computing order of number of years is more important than number of years itself

We note that n=100 so that 2(100)^2+2^{100}\approx 1.267650600210\times 10^{30} operation (=time in nanosecond)

Which is 1.267650600210\times 10^{21} seconds

So that the time required is 1.4671881947\times 10^{16} days

Each year comprises of 365 days so the number of years it takes is

\frac{1.4671881947\times 10^{16}}{365}=4.0197\times 10^{13} years

That is, 40.197\times 10^{12}=$Slightly more than $40$ trillion years$

Correct option is E

write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000

Answers

Using the computational language in C++ it is possible to write a code that uses the salary values ​​of the employees of a company dividing between the number of employees.

Writing the code in C++ is possible:

#include<stdio.h>

#inc1ude<conio.h>

void main()

{

int i, n, count = 0;

Long int salary[25];

clrscr();

printf(“\n Input salary of 25 persons:- ");

for(i=0;i<25;i++)

scanf("%ld", &salary[i]);

for(i=0;i<25;i++)

{

if(Salary[i]>30000 && salary[i]<40000)

count++;

}

printf("There are %d persons whose salary is in between 30000 and 40000",count);

getch();

}

See more about C++ code brainly.com/question/17544466

#SPJ1

write the c programming that takes the input of 25 employees salaries and count the number of employees

----------------------------
Please summarize into 1.5 pages only
----------------------------
Virtualization
Type 2 Hypervisors
"Hosted" Approach
A hypervisor is software that creates and runs VM ins

Answers

Virtualization: It is a strategy of creating several instances of operating systems or applications that execute on a single computer or server. Virtualization employs software to reproduce physical hardware and create virtual versions of computers, servers, storage, and network devices. As a result, these virtual resources can operate independently or concurrently.

Type 2 Hypervisors: Type 2 hypervisors are hosted hypervisors that are installed on top of a pre-existing host operating system. Because of their operation, Type 2 hypervisors are often referred to as "hosted" hypervisors. Type 2 hypervisors offer a simple method of getting started with virtualization. However, Type 2 hypervisors have some limitations, like the fact that they are entirely reliant on the host operating system's performance.

"Hosted" Approach: The hosted approach entails installing a hypervisor on top of a host operating system. This hypervisor uses hardware emulation to create a completely functional computer environment on which several operating systems and applications can run concurrently. In general, the hosted approach is used for client-side virtualization. This method is easy to use and is especially useful for the creation of virtual desktops or the ability to run many operating systems on a single computer.

A hypervisor is software that creates and runs VM instances: A hypervisor, also known as a virtual machine manager, is software that creates and manages virtual machines (VMs). The hypervisor allows several VMs to execute on a single physical computer, which means that the computer's hardware can be utilized more efficiently. The hypervisor's role is to manage VM access to physical resources such as CPU, memory, and I/O devices, as well as to provide VM isolation.

Know more about virtualization, here:

https://brainly.com/question/31257788

#SPJ11

Other Questions
Question is DOWN PLS ANSWER I WILL MARK BRAINLIEST..... Please help me the picture is above Ill mark as brainliest. A cylinder has a height of 11 meters and a volume of approximately 1243 cubic feet. What is the height of a cone with the same volume and radius as the cylinder? how to say saaya says julie "get out" in indirect speech ? a lewis structure of so2 is shown. so2 has one other resonance structure that does not violate the octet rule. a partically completed resonance structure of this molecule is shown. complete the other resonance structure by dragging bonds and lone electron pairs to their appropriate positions. Zn + 2HCl ZnCl2 + H2What is the half reaction for the reduction of hydrogen in the reaction? Choose one effect of imperialism and explain WHY it was a positive effect. auditors __________ an opinion when they are unable to form an opinion. multiple choicea disclaim b qualify c concurd withdrawe agree A customer is ordering brick pavers to cover a rectangular walkway that is 3 feet by 15 feet and a square sitting areathat is 6 feet on a side. If one box of pavers covers 5.28 square feet, what is the minimum number of boxes of paversthe customer should buy?0710O 11O 16 Becca solved the division problem 1.8 0.3. Her work is shown below.Long division of 1.8 by 0.3 to get 0.6 with no remainder.Part AExplain the mistake Becca made.Becca should have multiplied the dividend and the divisor by 100 and moved the decimal point in the quotient to the left.Becca should have divided the dividend and the divisor by 10 and moved the decimal point in the quotient to the left.Becca should have divided the dividend and the divisor by 100 and moved the decimal point in the quotient to the right.Becca should have multiplied the dividend and the divisor by 10 and moved the decimal point in the quotient to the right. How could you test whether or not plants actually need carbon dioxide in order for photosynthesis to occur? The results of a survey of 200 adults are shown in the table? If anyone does this I will give 25 points and rate u on the thing please help me I have a hour until its due 19. Which statement describes the value of the expression below?57 X1/6 What is the process of citric acid cycle? How do clastic sedimentary rocks form?Fragments of rock are squeezed and cemented together.Plant and animal remains are squeezed and cemented together.Solid chemicals in water harden and form rocks.Lava cools and hardens into rock. "Summer Friday" program for employees. Please answer the questions below:What are some of the advantages & disadvantages of the "Summer Friday" program for the employees? For the employer?If your company implemented Summer Fridays, how would that impact your work? In the 10 years after nafta's enactment, from 1994 to 2004 in the united states growth was? what movie do they say rest in peace when somebody was going to sleep If you are a landfill engineer, which environmental concerns of landfill will you consider?