Write a program that draws an 8 8 chess board, with alternating gray and white squares. You can use the SetTextColor and Gotoxy procedures from the Irvine32 library

Answers

Answer 1

Using the knowledge in computational language in C code it is possible to write a customized chess code.

Writting the C code as:

Wait      PROTO

Write     PROTO

CrLf          PROTO

Delay         PROTO

Clrscr        PROTO

PROTO times:byte, color:dword

PROTO times:byte, color:dword

ROTO color:dword

PROTO color:dword

UpdateColor   PROTO

See more about C code at brainly.com/question/15301012

#SPJ1

Write A Program That Draws An 8 8 Chess Board, With Alternating Gray And White Squares. You Can Use The
Write A Program That Draws An 8 8 Chess Board, With Alternating Gray And White Squares. You Can Use The

Related Questions

Write a Java expression that converts the value of 'y' into an integer, and assigns the value to 'x'.

Answers

[tex]\huge{\purple{\underline{\underline{\mathfrak{\red{\bigstar answer:: \bigstar}}}}}}[/tex]

int y = (int) y;

int x = y;

Hope it helps..♪

The destination transmission control protocol (TCP) process has set a 1,000-byte receive buffer window. The source TCP sequence number starts at 23,100 and sends the following segments, in order: Segment 1-200 bytes; Segment 2-300 bytes; Segment 3-200 bytes; and Segment 4-300 bytes. The last acknowledgment the source received was sequence number 23,600 saying the receive buffer can now hold 800-300 byte streams. The retransmission timer for sequence number 23,600 has expired, so what will the source TCP do next

Answers

Because the retransmission timer for sequence number 23,600 has expired, the source TCP will trigger a process that resends segments 3 and 4.

What is TCP/IP?

A term in Computer Networking Protocol, it stands for Transmission Control Protocol/Internet Protocol.

It serves the function of indicating how data is transported over the internet by ensuring that there is communication from end to end.

This end-to-end communication process is able to spot how such data can be sectionalized into packets, addressed, routed, transmitted and how it is received when it gets to the terminal point.

Learn more about TCP at:
https://brainly.com/question/17387945
#SPJ1

Pls help me po:{

I need the answer lang po talaga , pls:{

Answers

Answer:

for cutting it's scissors for measuring it's the tiny measurement spoonlikes for mixing it's the blender and preparatory

Please help quick!! 20 points

a table is a ___ of rows and columns that provides a structure for presenting data.

Answers

Answer:

vertical and horizontal

A good algorithm should have which three components?
OA. Commands, inputs, and outputs
OB. Clarity, readability, and sequencing
OC. Steps, order, and outcomes
OD. Clarity, simplicity, and brevity

Answers

A good algorithm should have these three components: C. steps, order, and outcomes.

What is an algorithm?

An algorithm simply refers to a standard formula which is made up of a set of finite steps and instructions that are executed on a computer system, in order to enable a software solve a particular problem under appropriate conditions.

In Computer technology, there are three (3) components that a good algorithm should have these include the following:

StepsOrderOutcomes

Read more on algorithm here: brainly.com/question/24793921

#SPJ1

As the user moves out of the range of one access point, their wireless device must re-associate with a new access point as it comes within range. What is this process known as

Answers

This process is known as “Roaming”.

Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original string in reverse. For example, calling reverse with the string goodbye returns the string eybdoog.Reversing a string involves:

Answers

The program is an illustration of recursive functions in Python;

Recursive functions are functions executed from within itself

The python program

The program written in python, where comments are used to explain each action is as follows:

#This defines the function

def revStr(myStr):

   #This returns an empty string if the string is empty

   if myStr == "":

       return myStr

   #If otherwise, this returns the reversed string recursively

   else:

       return revStr(myStr[1:]) + myStr[0]

Read more about python recursions at:

https://brainly.com/question/19089783

#SPJ1


in which part of the scratch interface does a programmer combine code blocks to build the program?

a. sprite info pane
b. block palette
c. stage
d. scripts area

Answers

Answer:

D

Explanation:

The sprite info pane is for an overview over your sprites and their visibility, coordinates, etc.

The block palette is where you select blocks from.

The stage is where your figures move and do stuff.

The scripts area is where you combine blocks from the palette together.

A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing information protocol) on an edge router in a network so that it demands more memory and cpu power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. identify and analyze which characteristic of ospf signifies this.

Answers

The option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

What is OSPF about?

The OSPF is known to be called an open Shortest Path First protocol.

It belongs to the family of IP Routing protocols as it serves as  Interior Gateway Protocol (IGP) used mainly for the Internet, and the option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

See full question below

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.

Shared data

Low overhead, fast convergence

Stability

Multi-vendor routers

Learn more about OSPF  from

https://brainly.com/question/14604232

#SPJ1


what is a program answer these question
of grade-6​

Answers


a series of coded software instructions to control the operation of a computer or other machine.

A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includes a few macros designed to secretly gather and send information to a remote server. how is the malicious actor accomplishing this task

Answers

Thay is the malicious actor accomplishing this task is done by using the VBA code.

What is The Visual Basic button?

It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.

To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.

Read more about the spreadsheet :

https://brainly.com/question/26919847

#SPJ1

write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000

Answers

Using the computational language in C++ it is possible to write a code that uses the salary values ​​of the employees of a company dividing between the number of employees.

Writing the code in C++ is possible:

#include<stdio.h>

#inc1ude<conio.h>

void main()

{

int i, n, count = 0;

Long int salary[25];

clrscr();

printf(“\n Input salary of 25 persons:- ");

for(i=0;i<25;i++)

scanf("%ld", &salary[i]);

for(i=0;i<25;i++)

{

if(Salary[i]>30000 && salary[i]<40000)

count++;

}

printf("There are %d persons whose salary is in between 30000 and 40000",count);

getch();

}

See more about C++ code brainly.com/question/17544466

#SPJ1

ANSWERS FOR PLATO!!!

What does the second element in a pair of HTML tags contain?

ANSWER: /

when would you use the code snippet <input...(randome code stuff)...> American?

ANSWER: while inserting a RADIO BUTTON

assume you are creating a website for school... yada yada,

ANSWER: <img>

Why is it preferable to code web pages in HTML format?

ANSWER: to display properly as search results in all browsers

drag tiles, somthinf about creating a web page and wich dose the html tags define


new paragraph ---> <p>

define a term ---> <dd>

define single line break ---> <br>

define heading ---> <h3>


HOPE THIS HELPS GUYS YOU GOT THIS KEEP ON KEEPING ON <3<3<3<3 #platogang #edementumegang​

Answers

The thing which the second element in a pair of HTML tags contain is "/" and is known as the Closing Tag.

What is an HTML Tag?

This refers to the keywords that are used in the building block of a website to indicate how a web browser would interpret and display the content.

Hence, we can see that in HTML tags, there are always the Opening and Closing Tags that are used to enclose lines of code and when paired together are known as container tags.

Read more about HTML elements here:

https://brainly.com/question/9069928

#SPJ1

What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.

Answers

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.

What type of hackers are motivated by social or political issues?

Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated  aim or reason.

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.

Learn more about Hacktivism from

https://brainly.com/question/5483494

#SPJ1

To notify the browser that we have JavaScript code, we should use .............

Answers

Answer:

almost all browsers allow you to type JavaScript code directly into the browser, using something called the “console

pls help will mark as brainliest i need help in html.​

Answers

Answer:

This is how I did it. Try it out and see if it works for you

What do you prevent when you use data validation in your database forms?
O code injection
O phishing
O botnet
O denial-of-service

Answers

Answer:

code injection

Explanation:

Validating the data in a database prevents someone from sneaking code to run without permission, aka code injection.

Phishing - this is disguising as a reputable company/person and trying to steal info (passwords, credit card numbers)

Botnet - this is a network of computers (most likely in the network because of a virus) that are used as a group for malicious purposes (like spam)

Denial-of-service - this is an attack which aims to deny users from accessing the content they want. a common example of this is flooding a server with spam requests, rendering it overloaded and unable to handle any user requests

In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.

Answers

They were worried that the software had too many bugs.

advantages and disadvantages of algorithm​

Answers

Answer:

\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\

Explanation:

It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program

Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.

The entities on which data are collected are _____.

Answers

The entities on which data are collected is known as variables.

Answer:

The entities on which data are collected is known as variables.

Explanation:

Consider the following method: public int mystery(int n) { if(n > 6) { return 1 mystery(n - 1); } return n % 3; } What is the value of mystery(10)

Answers

Answer:

Ans1--- The output is 9 Explanation--- mystery(5)=mystery(4)+2 mystery(4)=mystery(3)+2 mystery(3)=mystery(2)+2 mystery(2)=2+1=3

The function ____ can check whether an expression meets the required conditions; if the conditions are not met, it terminates the program.

Answers

Answer:

assert()

Explanation:

The assert function takes a boolean as an input, and when true, it just continues the flow, however if false it prints an error and calls exit.

Match the Job description with the job titles.

Answers

1) Bricklayer 2) Roofer 3) Architectural drafter 4) landscape architect
number 1 to first box
number 2 to second box
number 3 to third box
number 4 to forth box

Why is it important for companies to invest in building a complete data and analytics platform?.

Answers

Companies need to invest in data and analytics platform as it  generates insights by housing data in one place and converting it into easily consumable information at high speed.

Why is it vital to use the analytics of a platform?

Analytics platforms is known to have helped a lot of data scientists as it has help to boast access to a lot of data sources and hardware.

Note that Companies need to invest in data and analytics platform as it  generates insights by housing data in one place and converting it into easily consumable information at high speed.

See options below

It produces cultural support and alignment, a growth mindset, and new ideas and priorities to improve business processes.

It creates awareness of what data can do to improve business processes.

It generates insights by housing data in one place and converting it into easily consumable information at high speed.

It stores large amounts of data that are easily retrievable for future business growth.

Learn more about analytics platform from

https://brainly.com/question/26468036

#SPJ1

Who invented Napier's Bones and when? Write its functions. field of comm​

Answers

Explanation:

Napier's Bone was invented by Scottish mathematician John Napier in 1617 AD.... It's function is that it was very useful for finding multiplication at that time...

Question an administrator of a linux network is writing a script to transfer a list of local host names, contained in a file called hostnames, directly into the syslog file. predict the cli command the admin is likely to use to accomplish this. a.

Answers

The Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

What is a Linux command?

A Linux command simply refers to a software program that is designed and developed to run on the command line, in order to enable an administrator of a Linux network perform both basic and advanced tasks by entering a line of text.

In this scenario, the Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

Read more on Linux commands here: https://brainly.com/question/25480553

#SPJ1

This program has a bug. When the green flag is clicked, nothing happens. How would you fix it?
A. Change the number inside the “Move” block
B. Change the number inside the “repeat” block
C. Make the sound louder with the purple block
D. Connect the event block directly to the “repeat” block

Answers

The correct answer is D, if you connect it, the program will operate properly.

Complete the following sentences using each of the words provided ONCE only. KEYBOARD DESKTOP STORE PRINTER COMPUTER MOUSE MONITOR CD Bay PRINTER TOWER CASE CENTRAL PROCESSINGENIT is an electronic device that retrieves, and processes shows you what is going on in the computer. is the first image you see on your screen when the computer is is used for telling the computer what to do. is used for typing documents. is used for putting documents on paper. you can insert a CD or Compact Disc. is is box inside and shaped 1) A 2) The 3) The data. switched on. 4) The 5) The 6) The 7) In the 8) The it​

Answers

Answer:

Explanation:

Monitor is an electronic device that retrieves, and processes shows you what is going on in the computer.

Desktop is the first image you see on your screen when the computer is is used for telling the computer what to do.

keyboard

is used for typing documents. Printer is used for putting documents on paper. CD Bay you can insert a CD or Compact Disc. is is box inside and shaped

Give three reasons why it is important to have hci-based software programs.

need this soon

Answers

The three reasons why it is important to have HCI-based software programs As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

What is HCI and why is it important?

The Role of Human Computer Interaction withinside the Workplace. Human Computer Interaction (HCI) and User Experience (UX) are interdisciplinary fields that draw on human-focused disciplines like psychology and sociology to layout and increase technological merchandise that meet human needs.

As its call implies, HCI includes 3 parts: the user, the pc itself, and the methods they paint together.HCI is vital on account that it'll be important for items to be extra successful, safe, helpful, and functional. It will make the users revel in extra fun withinside the lengthy term. As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

Read more about the software programs:

https://brainly.com/question/1538272

#SPJ1


Which statement best describes one reason why assembly language is easier
to use than machine language?

Answers

Answer:

machine language uses binary code and assembly language uses mnemonic codes to write a program.

Explanation:

In a nutshell, machine language uses binary code, which is almost impossible for humans to decipher, whereas assembly language uses mnemonic codes to write a program. Mnemonic codes make it simpler for humans to understand or remember something, and so make the language a bit easier for humans to use than machine code.

Other Questions
The person who makes things happen usually regrets being so forward and optimistic about life. The profit from a business isdescribed by the functionP(x) = -5x + 30x + 8, where xis the number of items made,in thousands, and P(x) is theprofit in dollars. How manyitems will maximize the profit? Zahid started the construction of an equilateral triangle inscribed in a circle. Which segments need to be drawn to create the triangle?To finish his construction, Zahid needs to draw segments df , , and . Marco set aside 50 minutes before dinner to work on his homework. He spent 22 minutes on math. Marcos grandmother wants to know what percent of his study time he spent on math. Please help meeeee! Which event resulted directly from the Allies' discovery of the Holocaustatrocities?A. Allied leaders forced germany to split into two countriesB. German landwas set aside to create new jewish nationC. The allied powers forced germany to pay them war preparations D. Former nazi leaders were tried for war crimes If a hot air balloon pilot inflates the balloon at an average wind speed of about 5 miles per hour with an altitude of 35,000 feet, how fast will the radius of the balloon increase as it goes up higher and higher performing certain tricks? Using the differentiation formula applicable for this situation, estimate the speed of inflation and the speed of landing. Will this be able to help the pilot still perform other tricks before making a colorful landing? Give at least two comprehensible reasons and explain your answer. You have been asked to write an essay about the outcomes of the Civil Rights movement. Which of these is the most effective topic sentence for aparagraph in this essay?There were two main results from the March on Washington: it gave a national platform to the voices of African-Americans who wanted reforand it created momentum for the Civil Rights Act of 1964.A group of thirteen Freedom Riders boarded a bus in Washington D.C. and headed for New Orleans, Louisiana, on May 4, 1961.Barry Goldwater, a senator from Arizona who would later run for President of the United States, said in opposition to the Civil Rights Act:"You can't legislate morality."O The Civil Rights Act of 1964 was signed by President Lyndon B. Johnson on July 2, 1964, in Washington, D.C. find the midpoint of the line segment between the points (11, -5) and (-3, -7) Determine the true statements about trend lines in scatterplots. Check all that apply.A trend line can be used to make predictions in real-world situations.A scatterplot that shows no correlation between the variables does not have a trend line.A line of best fit must contain at least two of the original points.A regression line and trend line are equivalent terms. At what point in the american revolution did the second continental congress approve the declaration of independence? a. the day the revolution began. b. one month into the revolution. c. one year into the revolution. d. at the end of the revolution. Please Help!!! Two parallel lines are cut by a transversal. What is the measure of 7? why does the sloth have both a scientific name and common name Although the integument is a covering, it is by no means simple, and some of its functions include Group of answer choices epidermal blood vessels serving as a blood reservoir. the dermis providing the major mechanical barrier to chemicals, water and other external substances resident macrophage-like cells whose function is to ingest foreign invaders and present them to the immune system cooling the body by increasing the action of sebaceous glands during high temperature conditions Select the correct answer.Which set of words best describes the woman's character?A. energetic, attractive, friendly B. worried, shy, intimidatedC. independent, eccentric, nervousD. lonely, languid, desperate Usually the body needs to excrete excess acid. sometimes, however, the body is in alkalosis. in the collecting duct, there are special cells (type b intercalated cells) whose sole job is to deal with alkalosis. what would you expect these cells to do Use this tax table to find how much tax you need to pay on a taxable income of $40,000.If taxableBut notThe tax is:income is over--over-$0$7,82510 percent of theamount over $0$7,825$31,850$782.50 plus 15 percentof the amount over7,825$31,850$77,100$4,386.25 plus 25percent of the amountover 31,850$77,100$160,850 $15,698.75 plus 28percent of the amountover 77,100$160,850$349,700 $39,148.75 plus 33percent of the amountover 160,850$349,700no limit$101,469.25 plus 35percent of the amountover 349,700OA $6,423.75OB. $8,150.50OC. $12,536.25 (08.05 LC)The histogram shows the number of prizes won by different numbers of students at a sports competition. Which of the following statements is correct regarding the number of students and the number of prizes won? A histogram titled Prizes Won is shown. The horizontal axis is labeled Number of Prizes with bins 0 to 3, 4 to 7, 8 to 11, and 12 to 15. The vertical axis labeled Students with values from 0 to 10 at intervals of 1. The first bin goes to 3, the second goes to 6, the third goes to 1, and the last goes to 9. help me to solve maths Read the stanzas below from the poem Ballad of Birmingham by Dudley Randall and answer the question that follows.Mother dear, may I go downtownInstead of out to play,And march the streets of BirminghamIn a Freedom March today?No, baby, no, you may not go,For the dogs are fierce and wild,And clubs and hoses, guns and jailsArent good for a little child.But, mother, I wont be alone.Other children will go with me,And march the streets of BirminghamTo make our country free.No, baby, no, you may not go,For I fear those guns will fire.But you may go to church insteadAnd sing in the childrens choir.What is ironic about the mothers wishes?The protest will be deadly, while the church will be safe.The daughter doesnt listen to her mother and goes to the protest.The daughter has already been to church that morning.The church will prove just as dangerous as the protest. How can something that happens in a terrestrial system affect an aquatic system? Give an example.