In order to move a character on a canvas, which of the following are required? Select all that apply.
Group of answer choices

A. Adding keyboard listeners.

B. Keeping track of the coordinates.

C. None of these.

D. Redrawing the characters on the canvas.

Answers

Answer 1

Answer:

B

Explanation:

keeping track of the coordinates


Related Questions

True or False
User Interface brings together concepts from interface design, visual design, and information architecture.

Answers

Answer:

true

Explanation:

qqqqqqqqqqqqqqqqqqqq

What are different method of selecting items??​

Answers

Answer:

Hold down the "Ctrl" key and the "Shift" key. Press the right arrow key to select the word to the right, or press the left arrow key to select the word to the left. Select one character at a time by holding down the "Shift" key and and using either arrow key (right or left).

Explanation:

follow= return follow

is a formal document containing detailed information about the destruction of your
A
data.

Answers

Where is the formula

time 20,36,48
answer please!!

Answers

Answer:

Pls subscribe my channel on yt

Name- CREATIVITY WITH MS

pls help me reach 500 subscribers

your subscription really matters

After subscribing pls make sure to comment also

I will give you 10 thanks and also if you have a channel I can subscribe it also

What is the difference between packaged and tailored software ​

Answers

Answer:

Packaged software is a collection of programs that perform similar functions or have similar features to meet various goals and objectives. e.g Microsoft Office While tailored software is software specially developed for some specific organisation or other user. e.g Amazon, Netflix.

Give an example (other than clothes) where the must-have feature could be APPEARANCE.​

Answers

Answer:

Assuming you are talking about UI or something graphical on a computer screen we'll just say the must-have features (in terms of appearance) are:

The UI/Web/Graphical Designers basic knowledge of color theory so they don't end up putting #0000FF text on a #FF0000 backgroundA good font (if there is text) that looks nice with the colors usedA proper aesthetic to the software (I.E. Spotify's green on black modern/techno aesthetic)

The design of mobile phones is an example of a must-have feature that is in appearance.

What are the features of appearance?

Features of appearance mean the visual qualities of an object or product.

Such as:

- Color

- Shape

- Texture

- Finish

- Branding

We have,

One example where the must-have feature could be appearance is in the mobile phones design

Many consumers prefer mobile phones that not only have the latest technology and features but also look sleek and stylish.

Companies invest heavily in the design of their mobile phones to make them visually appealing to consumers.

The appearance of the phone can often be a deciding factor in the purchasing decision, even if the phone has similar features to a competitor.

Thus,

The design of mobile phones is an example of a must-have feature that is in appearance.

Learn more about appearance here:

https://brainly.com/question/15851729

#SPJ2

# program-01-steps
Using steps.py in this repository for a starter file, write a Python program to calculate average number of steps per month for a year.
The input file (which you will read from the command line, see the sample program on how to read command line arguments in this repository) contains the number of steps (integer) a person took each day for 1 year, starting January 1. Each line of input contains a single number.
Assume this is NOT a leap year.
Your output must follow this format:
```
The average steps taken in MONTH NAME was 9999.9
```
Where 9999.9 represents that month's average. Be sure to output only a single decimal digit (digit to the right of the decimal)
Be sure to spell out the name of the month. First letter must be caps. For example: June
For a grade of A your program should handle a leap year by looking at the number of steps in the file, if 365 then non leap year, if 366 then leap year.
***commandlines.py***
# Python program to demonstrate
# command line arguments
# notice that the first command line argument that is passed to a program comes after the name of the program file
# it has an array index of 1 in the sys.argv array
# sys.arg[0] is always the name of the python program file
# all command line arguments are strings, so if you want to perform math you have to convert

import sys
# total arguments
n = len(sys.argv)
print("Total arguments passed: %i" % n)
# Arguments passed
print("\nName of Python script: %s" % sys.argv[0])
print("\nArguments passed:")
for i in range(1, n):
print("%s" % sys.argv[i])
# Addition of numbers
Sum = 0
for i in range(1, n):
Sum += int(sys.argv[i])
print("\n\nResult: %i" % Sum)
***steps.py***
# Named constants - create one for each month to store number of days in that month; assume this is NOT a leap year
def main():
# Open the steps file using the first command line argument to get the input file name. For example: python steps.py steps.txt would open the file steps.txt to read the steps
# Display the average steps for each month using a function to calculate and display
# Close the file.
def average_steps(steps_file, month_name, days):
# compute the average number of steps for the given month
# output the results
main()

Answers

Answer: https://www.chegg.com/homework-help/questions-and-answers/using-stepspy-repository-starter-file-write-python-program-calculate-average-number-steps--q58620888

Explanation: your awnser is in the link

a digital camera is an_____​

Answers

Answer:

A digital camera is a hardware device that takes photographs and stores the image as data on a memory card. Unlike an analog camera, which exposes film chemicals to light, a digital camera uses digital optical components to register the intensity and color of light, and converts it into pixel data.

Explanation:

its a hardware device.

Write the pseudocode to this flowchart.

Answers

Answer:

I don't understand

Explanation:

1. What is meant by data losing its value?

2. Explain what is meant by an automatic backup

3. Explain how phishing and pharming trick a user into giving up personal data

4. Explain how anti-virus software may help to prevent distributed denial of service attacks

5. Explain why computer security is more effective when anti-virus software end firewalls are used

6. Describe how a proxy server can help keep data safe

7. Explain the difference between symmetric and asymmetric encryption

8. Describe what a protocol is and how protocols help protect data

Answers

Explanation:

1.Data loss occurs when valuable or sensitive information on a computer is compromised due to theft, human error, viruses, malware, or power failure. It may also occur due to physical damage or mechanical failure or equipment of an edifice.

2.Automatic backup is a type of data backup model that requires little or no human intervention in backing up and storing data from a local network/system to a backup facility. Automating the backup process saves time and complexity required to manually back up a computer, network or IT environment.

3.A phishing attack is basically social engineering and identity theft that generally targets users with the aim to con them into revealing their personal and confidential information. In this technique, hackers send spoofed emails in the name of a legitimate source to victims and trick them into clicking on a malicious link or attachment to acquire their personal information. 

In many instances, these phishing scams use software or security vulnerabilities to install malicious software in the targeted user’s device. In any case, the human factor remains the key element in the successful phishing attempts of these cyber crooks. 

4.Equip your network, applications, and infrastructure with multi-level protection strategies. This may include prevention management systems that combine firewalls, VPN, anti-spam, content filtering and other security layers to monitor activities and identity traffic inconsistencies that may be symptoms of DDoS attacks.

5.While antivirus software helps to protect the file system against unwanted programs, a firewall helps to keep attackers or external threats from getting access to your system in the first place. Other threats travel from computer to computer without the knowledge of the user.

6.Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests. A good proxy server keeps users and the internal network protected from the bad stuff that lives out in the wild internet.

7. The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption, and the asymmetric encryption uses public key for encryption and a private key for decryption.

8. A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design.

MARK ME BRAINLIEST!!!PLSSSSS

What is the first phase of the project process?
A. Planning
B. Pre-planning
C. Monitoring
D. Implementation
SUBMI

Answers

A, most don't have a pre-plan process

planning is the first step because most dont have a pre planning process so in most cases, you would just plan first.

What are the revised version of water mill and horse cart

Answers

Answer:

A watermill or water mill is a mill that uses hydropower. It is a structure that uses a water wheel or water turbine

Explanation:

What allows an individual to avoid capital outlay?
paying cloud by the month
paying cloud by the year
paying cloud by the hour
paying cloud by the day

Answers

The daily payment for cloud services would be most reasonable. Hence option A is correct.

Capital Outlay refers to the expenditure or payment for the acquisition cost of capital assets.

In this case, the assets whose cost of purchase is being avoided by expenditure on cloud services is IT Server Hardware and Software which can be outsourced to companies that provide Cloud as a Service.

Cloud Services is the provision of Cloud computing services on a pay-per-use basis.

One of the advantages of this service is that it mostly consists of self-service on-demand. Hence, no need for the physical asset which usually is very costly.

Learn more about Capital Outlay in the link below:

https://brainly.com/question/832717

The ________ join clause is based on all the columns in the two tables that have the same datatype. ​

Answers

The Natural join clause

5. Power Trio
by CodeChum Admin

Multiplying two numbers is a piece of cake, but how about multiplying three of them, either being a negative of positive number? With programming and proper code, these tasks are easy to handle.

You're a programmer, right? Then code this one for me!

Input
A line containing three numbers (positive or negative, may have decimal places) separated by a space.
1.6·-2·-1

Output
A line containing a decimal/float with one decimal place.
3.2

Answers

Answer:

from decimal import *

li = list(map(Decimal,input().split()))

result = li[0]*li[1]*li[2]

print(abs(result))

Explanation:

The proper or programming code to handle that multiplies three numbers is as follows:

from decimal import *

value = list(map(Decimal,input().split()))

result = value[0]*value[1]*value[2]

print(abs(result))

Code explanation:

The code is written in python.

From the decimal module we have to import *. The decimal module incorporates a notion of significant places so that 1.3*1.2 = 1.56The variable value is used to store the list of the decimal inputThe variable result multiplies the three numbers in the list Finally we print the absolute value of the result.

learn more on python here: https://brainly.com/question/19175881

How can I fix this?

I’m on school Wi-Fi and “your connection isn’t private” keeps popping up every time I try to look up something, can someone please help!

Answers

Answer:

Try these

Reload page.

Clear Browsing Data.

Restart Router.

Avoid Incognito Mode.

Check Computer Date and Time.

Disable VPN.

Explanation:

Which of these lines of code will generate a random number between 1 and 50? A. input("1-50") B. print("1-50") C. import random D. num = random.randint(1,50)

Answers

Answer:

D. num = random.randint(1,50)

Explanation:

The option given above will assign a random integer in the range of 1 through 50 to the variable number is: "number = random.randint(1, 50)"

What is a random integer in programming?

This is a random sequence of integers that may be used to imitate things like shuffling a deck of cards or creating distinct behaviors every time a program runs. The RND function in BASIC generates random numbers. This yields a value between 0 and 1.

Random number creation is a technique that generates a series of numbers or symbols that cannot be realistically anticipated better than by random chance, generally using a random number generator (RNG).

Therefore, The option given above will assign a random integer in the range of 1 through 50 to the variable number is: "number = random.randint(1, 50)"

Learn more about random integers:

brainly.com/question/15247918

#SPJ3

que cambios le harias a Chrome

Answers

Nada, porque em Chrome tiene todo los respuestas y Soluciones que necesitas.


[If you were the queen of the world .... What would you change ?]


Can anyone help me i want 5 slides powerpoint

Answers

Answer:

poverty and bad roads and help the needy

Which of these statements are true about Domain Controllers (DCs)? Check all that apply.

Changes that are safe to be made by multiple Domain Controllers at once are tasked by granting them Flexible Single-Master Operations.

The default Organizational Unit (OU) called Domain Controllers contains all Domain Controllers in the domain.

Delegation can be used in Active Directory.

You should always use your Domain Admin or Enterprise Admin for day-to-day use.

Answers

A domain controller is known to be a type of computer server that often responds to security authentication requests and verifies users. The true statements about Domain Controllers (DCs) are:

The default Organizational Unit (OU) called Domain Controllers contains all Domain Controllers in the domain. Delegation can be used in Active Directory.

Default user groups often do exist. The Domain Controllers user group has all Domain Controllers in the domain.

Delegation can be used in Active Directory  as they help to give accounts permission in the file system so that an individual can set Access.

Learn more from

https://brainly.com/question/24931494

three types of query​

Answers

It is commonly accepted that there are three different types of search queries:

Navigational search queries.

Informational search queries.

Transactional search queries.

write a function to swap two variables using a third variable ​

Answers

Answer:

Explanation:

Assign var1 value to a temp variable: temp = var1.

Assign var2 value to var1: var1 = var2.

Assign temp value to var2: var2 = temp.

Which wireless standard runs on both the 2.4 and 5 GHz frequencies?

Answers

Answer:

Approved in 2009, Wi-Fi 4 enables operation in both the 2.4 and 5 GHz frequencies, a game changer at the time. It was the first standard to use MIMO (Multiple In, Multiple Out) and offered better speed, 300 Mbps, better range, more resistance to interference and backward compatibility with Wi-Fi 2 and

Hope this is helpful to you.......

a) Viết chương trình tính tổng từ 20 – 50

b) Viết chương trình tính tổng từ a – b, với a, b nhập từ bàn phím. Yêu cầu: a
không phải thông báo lỗi.

cứu tôi 2 câu này sài lệnh lặp

Answers

Answer:

Program viet_chuong_trinh_tinh_tong;

Uses Crt;

Var i,s:integer;

Begin

Clrscr;

i:=20;

While (i>=20) and (i<=50) do

Begin

s:=s+i;

i:=i+2;

End;

Writeln(S);

Readln;

End.

Explanation:

what is multimedia software​

Answers

Answer: A program that plays or records audio files or playing or recording video files. Audio of famous speeches is a multimedia software

Explanation:

a simple C program to find the logarithm of any number in any base.....​

Answers

Answer:

tera bur mast hai jwjvszvVbzNjz

Giả sử biến x có giá trị là x:= ‘a5’, khai báo nào sau đây là đúng:

Answers

Answer:

Sorry im not Vietnam so please explain it in English or ask someone who can speak Vietnam to help you.

A computer uses
to follow a set of instructions

Answers

Answer:

A set of instructions that directs a computer's hardware to perform a task is called a program, or software program.

Answer:

which is called a program

Explanation:

state two advantage of using the internet

Answers

Answer:

Seemless communication with other parts of the world

Being able to share files easily

Explanation:

Answer:

communicate with family.

Able to get information from the internet.

Game progression is the underlying structure of a game level or mission in terms of layout, presentation of obstacles, and options for movement.
Group of answer choices

False

True

Answers

Answer:

False

Explanation:

Game progression is when a character in a game reaches a new checkpoint or level.

Other Questions
Choose one of the 5 caste systems and explain how hinduism would affect their daily life. What is the axis of symmetry for f(x) = 2x2 4x + 5? x = 2 x = 1 x = 1 x = 2 Take notes on your second source Eat Healthy How does the movement of water in ecosystems differ from the movement of energy? GIVING BRAINLIEST ANSWERAsignatura:1. Fill in the chart with the correct endings.AR endingsER EndingsIR EndingsSingularPluralSingularPluralSingularPlural y=-4(x+2)(x-8) rewritten in standard form what is 750 decreased by 13% eleven less than twice a number is 17 more than four times the number What do you think is the hardest part of an art critique? Explain. Find the value of 3a when a equals -4 Around 1805, only a few years after Conrads discovery, newspapers began reporting on gold-mining activities and people coming into the area to search for gold. William Thornton, of Baltimore, Maryland, designer of the United States Capitol, was one of these seekers. After learning of the gold, he purchased thirty-five thousand acres of land in Montgomery (now Stanly) County and formed the North Carolina Gold Mine Company. By 1806, investors in this company included a former governor of Maryland and the treasurer of the United States.The North Carolina Gold Rush,Rebecca LewisWhat does this passage suggest about the discovery of gold in North Carolina?A) The gold rush brought many different kinds of people to the state.B) The gold rush resulted in many people from North Carolina moving to other states.C) The gold rush attracted only unskilled laborers to the state. D) The gold rush had little effect on population changes in North Carolina. Please help me with these problems! (4, 7); y = 3x + 6 plz help me What is pictured below? Hello can someone please help me with this U+t=7Ut=12Solve simultaneously using formula method Write an article to the editor for publication in a national newspaper on menance of street children in your community list all the factors for 24 synonyms for equality starting with a with the suffix of ity Solve9-)12OA)00101008OB)OC)512OD)olu512