Can someone pass me Unit 2 Basic Animations from CMU CS ACADEMY, I'll pay you if you pass it to me.

Answers

Answer 1

Answer:

i could but it depends on how much pay

Explanation:

Answer 2

Answer:

ii have the awmsers

Explanation:

unit two

# speedX should be -5 and speedY should be -25.

### Fix Your Code Here ###

Circle(350, 350, 50, fill='ghostWhite', border='black')

ballStitches = Oval(350, 350, 50, 95, fill='ghostWhite', borderWidth=3, dashes=True,

                   border=gradient('red', 'red', 'red', 'ghostWhite'))

gloveThumb = Oval(260, 375, 75, 120, fill='brown', border='black', rotateAngle=25)

glove = Oval(200, 375, 130, 150, fill='brown', border='black')

   # This moves the ball to be 250 away from the mouse in the x-position.

   ball.centerX = glove.centerX + 250

   ball.centerY = mouseY

   # Move the ball stitches to where the ball is.

   ### Place Your Code Here ###

ball=Circle(350, 350, 50, fill='ghostWhite', border='black')


Related Questions

How has technology has impacted Ghana​

Answers

Answer:

there are many ways that technology has impacted Ghana.

1. The republic of Ghana have been making some plans that can help with economic growth in the last decade.

2. Ghana has a higher productivity rate than the neighboring nations.

3. The republic of Ghana made a shift onto incentive-driven economic policies, so that way it could help improve leadership.

Why do some computer systems not allow users to activate macros?
O Amacro can be used by only one person.
0 You must close all other programs to run a macro.
O The Word software does not work well with macros.
O Macros can carry viruses that can harm a computer.

Answers

Macros can carry viruses that can harm a computer.

Please help me !!!!!!!

Answers

Answer:

Explanation:

CTRL+F

To open the Find pane from the Edit View, press Ctrl+F, or click Home > Find. Find text by typing it in the Search the document for… box. Word Web App starts searching as soon as you start typing

When you create a _____ query, the value the user enters in the dialog box determines which records the query displays in the results. a. parameter

Answers

When a parameter query is created, the value entered in a dialog box by an end user determines the record that would be displayed in the results.

A query refers to a computational request for data (information) that are saved either in a database table, from existing queries, or from a combination of both a database table and existing queries.

Basically, there are four (4) main types of query and these include:

Select query.Action query.Aggregate query.Parameter query.

A parameter query is designed and developed to display a dialog box that prompts an end user for data or field criteria, which determines the record that would be displayed in the results.

Read more: https://brainly.com/question/23388493

Edhesive 4.3 code practice question 2

Answers

Sos shacahacwhaveusbsusvs js

Given an array of String objects, use streams to count how many have a length less than or equal to three. StringLengthDemo.java

Answers

The array of String objects, use to count how many have a length less than

or equal to three is as follows:

string_object = ["brainly", "mathematics", "boy", "girl", "us", "joy", "key"]

x = []

for i in string_object:

   if len(i) <= 3:

       x.append(i)

print(len(x))

The code is written in python

The string array is declared.

Then an empty variable array is declared.

Then we loop through the array.

If any of the string length in the array is less than or equals to 3 , we append it to the empty array.

Then finally, we print the counted number of strings

learn more: https://brainly.com/question/22081416?referrer=searchResults


A machine that converts energy to useful work.

Answers

Answer:

heat engine

A heat engine is any machine which converts heat into useful work for example, a steam engine or a car engine. Real heat engines are complex and there are many ways of converting heat energy into useful work. We can abstract and generalise the workings of any heat engine into three parts:

Explanation:

CAN I GET BRAINLIEST

Your company is building a new architecture to support its data-centric business focus. You are responsible for setting up the network. Your company's mobile and web-facing applications will be deployed on-premises, and all data analysis will be conducted in GCP. The plan is to process and load 7 years of archived .csv files totaling 900 TB of data and then continue loading 10 TB of data daily. You currently have an existing 100-MB internet connection. What actions will meet your company's needs

Answers

The actions will meet your company's needs is to Lease a Transfer Appliance, upload archived files to it, and send it to oogle to transfer archived data to Cloud Storage.

Data centric is simply known to be an architecture where data is said to be of primary and permanent asset, and applications is temporary.

Businesses is all about functionality, and as such, firms often buys or build application systems.

Each application system is known to have its own unique data model, and its code is often linked with the data model used.

Conclusively, Transferring large datasets needs manpower that is the right team, planning early, and testing your transfer plan before its use.

 

Learn more data-centric business from

https://brainly.com/question/21810261

What are two drawbacks of using netbook ? (Choose two)
A. Portability
B. Screen size
C. Boot up time
D. Storage capacity

Answers

Answer:

D and C

Explanation:

I would say D and C because they don't have fast processors they normally only use Celerons. and normally they only have a 64GB internal SSD.

It's definitley not a because they are extremely portable and have amazing battery life

I don't think its B because they have small screens but you can also get them in bigger 14" variants which is normally the generic size.

Please describe how you can use the login page to get the server run two SQL statements. Try the attack to delete a record from the database, and describe your observation.

Answers

The only sure way to prevent SQL Injection attacks is input validation and parametrized queries including prepared statements. The application code should never use the input directly. ... Database errors can be used with SQL Injection to gain information about your database.

Why does a computer need an operating system?

Answers

Answer:

An operating system helps it to manage and run its designed duties.

If it lacks an operating system, it wouldn't be able to work

What was the goal of the COMPETES Act of 2007?

Answers

Simply put, the goal was, "To invest in innovation through research and development, and to improve the competitiveness of the United States."

Answer:

Increasing federal investment in scientific research to improve U.S. economic competitiveness.

Explanation:

Hope this helps!

Without proper synchronization, which is possible, a deadlock, corrupted data, neither or both? Give reasons for your answer.
need answer pls​

Answers

Without proper synchronization, corrupted data is possible due to the fact that a shared datum can be accessible by multiple processes.

Data synchronization simply means the idea of keeping multiple copies of dataset in coherence with one another in order to maintain data integrity. It's the process of having the same data in two or more locations.

Without proper synchronization, corrupted data is possible because a shared datum could be accessed by multiple processes without mutual exclusive access.

Read related link on:

https://brainly.com/question/25640052

Partially-filled Arrays
Write the function rindby() which stands for remove mark>if not divisiby by. The function removes all elements from the array that are not evenly divisible by the argument n. You can find out if a number is evenly divisible by n using the remainder operator: % (there will be nothing left over).
The function returns the number of items removed or -1 if the array was originally empty.
The function takes 3 arguments:
the array of int that may be modified.
the size of the array (use size_t as the type)
the int n used to check for divisibility
Here are two short examples:
int a[] = {2, 3, 4, 5, 6};
size_t size = 5;
int removed = rindby(a, size, 2);
// removed->2, a = [2, 4, 6], size = 3
size = 0;
removed = rindby(a, size, 3);
// removed-> -1, no change otherwise
In the first case, the numbers 3 and 5 are removed because they are not divisible by 2. Only the numbers that are divisible by 2 are left in the array.
In the second, size has been set to , so the input array is empty and the function returns - 1.
Exam C++ Quick Reference
p1.cpp
1 #include // size_t for sizes and indexes
2 using namespace std;
3
4 ////////////////WRITE YOUR FUNCTION BELOW THIS LINE ///////////////
5 int rindby(int all, size_t& size, int number)
6 {
7 int result;
8 // Add your code here
9 return result;
10 }
11

Answers

Answer:

um

Explanation:

Project managers have the overall responsibility for planning, executing, and completing a project. (3 points) True False

Answers

True, project managers are responsible for all of those things.

Consider the following class. public class ClassicClass { private static int count = 0; private int num; public ClassicClass() { count++; num = count; } public String toString() { return count + " " + num; } } What is printed when the following code in the main method of another class is run? ClassicClass a = new ClassicClass(); ClassicClass b = new ClassicClass(); ClassicClass c = new ClassicClass(); System.out.println(a + ", " + b + ", " + c);

Answers

The the code in the main method is run, it will print

"3 1, 3 2, 3 3"

The static/class field count stores the number of instances of the class created. count is always incremented when the instance constructor is called.

The instance field num acts like an identifier/serial number for the instance created. When the constructor is called, the current count is stored in the num field of the instance.

Each instance's toString( ) method will output the total count (from count) and the serial of the instance (from num).

When the code runs in the main method, it creates three instances (making count==3), so that we have

a = {count: 3, num: 1}b = {count: 3, num: 2}c = {count: 3, num: 3}

and implicitly calls toString( ) in the println method for each of the three instances to produce the following output

"3 1, 3 2, 3 3"

Learn more about programs here: https://brainly.com/question/22909010

Which two are computing devices? (Choose two)
A. Unix
B. Laptop
C. Server
D. Mac OS

Answers

Answer:

ANS is no.B and no. C

hope it helps

What does “The Principle of Least Privilege” mean as applied to security?

Answers

Answer:

The principle of least privilege (PoLP) refers to an information security concept in which a user is given the minimum levels of access – or permissions – needed to perform his/her job functions. ... Least privilege enforcement ensures the non-human tool has the requisite access needed – and nothing more.

Explanation: let me know if this helps!

Can someone help me explain Nvm scheduling in operating systems?

Answers

Low-power and short-latency memory access is critical to the performance of chip multiprocessor (CMP) system devices, especially to bridge the performance gap between memory and CPU

.tag is used to draw a horizontal line

Answers

Answer:

<hr>  tag.

Explanation:

<hr> tag makes a line along the webpage :)

Fill in the blank with the correct response.

_____is considered a reliable source of free and trial software.

Answers

Shareware hope that helps

#include
void main()
{
int m=45,first,last;
first=m/10;
last=m%10;
printf("%d",first);//line 1
printf("\n%d",last);//line 2
printf("\nSum=%d",first*last);//line 3
printf("\n%d",first*last);//line 4
printf("\n%d",last*last);//line 5
printf("\nCube=%d",first*first*first);//line 6
}


Select the correct output for line 1 ~
1 point
4
5
0

Answers

Answer:

4

Explanation:

45 divided by 10 using integer division is 4

I ran the program, output is below.

how can computers be a threat to public safety??

help asap marking brainiest ​

Answers

Loss or theft of your computer, smartphone or tablet. Malware, including spyware, on public computers. Theft of personal information from, or access to browsing history on public computers.


An engine that creates ignites fuel with highly compressed air.

Answers

Explanation:

An engine that creates ignites fuel with highly compressed air. air engine

If you will choose among the multimedia mentioned, what will you use to promote this advocacy: Stop strand discrimination. We are all equal.

Answers

The media that I would choose to promote the arrest of discrimination would be television, radio, newspaper, and social media.

When we want to transmit a message to many people, the most appropriate thing is to use mass media, that is, media that have a large coverage of people, such as:

TVRadioNewspapers

 

On the other hand, in recent years people can expose their ideas or disseminate information through social networks, because their messages can become a trend among people and have an even greater reach than conventional media.

Another positive aspect of social networks is that they reach a greater diversity of people with different characteristics such as:

ReligionPolitical positionSocioeconomic positionEducational levelAgeSexBirthplace

Therefore, to spread an anti-discrimination message the best option is to spread it through mass media such as television, radio, newspapers and social networks.

Learn more in: https://brainly.com/question/23228635

Which one of the following is small and portable?
• Server
• Notebook
• Mainframe
• Desktop

Answers

Answer:

server is small and portable

Which invention made it possible to have an entire computer for a single circuit board

Answers

Answer:

ok lang                                                    

Explanation:

Natural language generation is focused on?

Answers

While natural language understanding focuses on computer reading comprehension, natural language generation enables computers to write. NLG is the process of producing a human language text response based on some data input. This text can also be converted into a speech format through text-to-speech services.

- BRAINLIEST answerer

The major advantage of the Waterfall approach to software development is the _____. Group of answer choices high degree of management control high level of user interaction throughout the process rapid pace of product iterations informality of ongoing evaluation

Answers

A major advantage of the waterfall approach in software development life cycle (SDLC) to software development is the: A. high degree of management control.

What is software development life cycle (SDLC)?

Software development life cycle (SDLC) can be defined as a strategic process (methodology) that defines the key steps or stages that are for the creation and implementation of high quality software programs (applications).

The types of models in SDLC:

Generally, there are six (6) types of models in software development life cycle (SDLC) and these are:

Agile ModelV-Shaped ModelIterative ModelSpiral ModelBig Bang ModelWaterfall Model

What is a waterfall model?

In SDLC, a waterfall model refers to a process which involves the sequential breakdown of software development into linear stages (steps or phases). Thus, its development stages takes a downward flow like a waterfall and as such, each stage must be completed before starting another and without any overlap in the process.

In conclusion, a major advantage of the waterfall approach in software development life cycle (SDLC) to software development is the high degree of management control because its development stages and there isn't any room for overlap.

Read more on waterfall model here: https://brainly.com/question/18369405

Which of the following can you do after switching to Outline view? Select all the options that apply.
a. Change the level of text.
b. Change the order of slides.
c. Move text within a slide.
d. View an outline of the presentation.

Answers

On PowerPoint, the tasks that can be performed after switching to Outline view include:

a. Change the level of text.

c. Move text within a slide.

d. View an outline of the presentation.

PowerPoint can be defined as a software application (program) that is generally designed and developed by Microsoft Inc., to avail its end users an ability to create multiple slides containing textual and multimedia information which can be used during a presentation.

Generally, there are five (5) main view that are available in PowerPoint and these include:

Normal viewReading viewNotes pageSlide sorterOutline view

An outline view allows an end user to see a whole (entire) presentation in logical order. Thus, the presentation is displayed as an outline comprising the titles and main text from each slide of the presentation.

Hence, the tasks that can be performed after switching to Outline view include:

1. Change the level of text.

2. Move text within a slide.

3. View an outline of the presentation.

Read more: https://brainly.com/question/19543735

Other Questions
tw // blood gore s/hrepost because a bot sent a link and i want actual criticism ://I pursed my lips as I dug the knife into my skin, drawing blood into a bowl. I whimpered and screamed as I forced myself to go further, as far as possible. With a final wail of pain, I let the blade go and wrapped my arm in a rag.Twirling my finger in my own blood, I whispered a few words. My eyes became white, pale, and I felt rays of light emit from them. To be blinded by your own sight is frightening. But I knew what would come. So I disappeared, not to be seen for years.Would you like to hear a tale?Of course you do. But, my story is not the one that needs to be told. Perhaps one day youll learn about the wicked witch, the one who wished only to save two children from the burdens of royalty and the shackles of society. Maybe youll learn about the mage, who in a desperate attempt to survive planted one of three seeds, that which only bloom a singular day, invisible to those who are unaware of its existence. Or maybe, youll see the story that's unfolding all around us, in an empire that's shattered in half and dangling on a thread.This tale has not yet started. But its beginning. It surrounds us, it watches us, it kills us. Our stories our our beginnings and our ends. There can be no tale without death, and if anyone insists otherwise, a liar they are.My dear Gloriana, I know I have wronged you. But I can make this right. Your children will not be alone. Til we meet again, in Heaven. common factor of 24 plz What two things should be in your description of a story's theme?A.what the theme is and why you think soB.the parts of the plot that show theme, and the conflictC.what the theme is and who the characters areD.when and how you figured out the theme What was the road like through the forest? Kindly write a specific answer.This is from the wizard of OZ Chapter 4I might mark you brainiest Is krypton a good or poor conductor of electricity? Why? I please write a fictional narrative short story at least 300-200 words If you have flares or any other emergency signaling devices, place them ____ feet before and after the scene of the accident.A.500B.100C.1000D.200 Which expression simplifies to 53? What are some of the posible signals of male quality in widowbirds and what information might they convey? What are the females choosing and why The one thing all Progressives had in common was their desire to:A clean up cities.B help childrenC help the poor.D pass reform laws. weakness of this structure is one of the causes of gastroesophageal reflux disease How many solutions does this equation have. 3x + 99 = 3 (x + 33) Use the periodic table to identify the number of core electrons and the number of valence electrons in each case below. Given numbers 2 ,5,11, 4.5, 1/10, V3 then a. Write two prime numbers from the above. b- An integer root 121 c- A number 25 % of 18 d- An irrational number g(n)=n^2-4h(n)=4n+5find gh is this linear or not and why The statement below is from Article II of the U.S. Constitution.The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors.Which characteristic of rule of law and which type of law are best represented by this statement? When wearing a suit of armor, one would notice that it was generallyA.heavy and hot when worn.B.easy to put on by oneself.C.not worn in horse back.D.constructed of only a few pieces. help me will mark as brainlist We throw open our city to the world, and never . . . exclude foreigners from any opportunity of learning or observing, although the eyes of an enemy may occasionally profit by our liberality; trusting less in system and policy than to the native spirit of our citizens. Funeral Oration, Pericles What is Pericless point of view about allowing foreigners into Athens? Because foreigners can learn things, Pericles wants to ban them. Pericles wants to watch foreigners carefully so Athens can profit from them. Pericles thinks there should be more laws to protect Athenians from foreigners. Although it might benefit the enemy, Pericles believes it shows Athens's good intentions.