Answer:
Basic Communication Tools. A wide variety of communication tools are used for external and internal communication. These tools include mail, email, telephones, cell phones, smartphones, computers, video and web conferencing tools, social networking, as well as online collaboration and productivity platforms.
If you were going to construct a table that only included shapes name with number prefixes, which shape would you inlcude?
Asap
Answer: Triangle
Explanation: Triangle has Tri
SELF-CHECK 1.1 A. Directions: On your answer sheet, write the letter of your answer. 1. It is the type of metal conduit which is designed to lessen or eliminate fire hazard. a. EMT b. RSC c. PVC d. BX 2. It is the allowable number of quarter bends which can be done in a one run of electrical metallic conduit. b. 2 d. 6 a. 4 C. 3 3. It is a type of fitting which is used to secure EMT to metallic boxes. a. connector b. condulets c. adaptor d. coupling 4. It is the size of conduit which can accommodate a maximum of 10 wires_ AWG # 12. a. 3/8 b. 1/2 c. 3/4 d. 1 44 5. It is the type of bend which makes one quarter turn. a. offset b. elbow c, saddle d. goose neck B. Direction: Name the following conduit fittings.
There are different kinds of instrument. The answers to the questions are below.
RSC is known as the type of metal conduit which is designed to lessen or eliminate fire hazard. 4 is the allowable number of quarter bends which can be done in a one run of electrical metallic conduit.Connector is a type of fitting which is used to secure EMT to metallic boxes. 3/4 is the size of conduit which can accommodate a maximum of 10 wires_ AWG.Elbow is the type of bend which makes one quarter turn.Rigid Metal Conduit (RMC)Rigid metal conduit often used in place of RSC is known to give a good protection from any kind of impacts and damages. It is often used as a grounding conductor for short runs and also as wiring.
Learn more about Wire from
https://brainly.com/question/15703197
What do you think about the future of Moore’s Law? Will it continue to hold true? Will other technologies help us keep on track? Is it a self-fulfilling prophecy? Write one paragraph.
There will come a time when Moore's law can no longer hold true. Past a certain point, it will be physically impossible to make a transistor any smaller. Microscopic technology will always be limited by the size of an atom. Yes, Moore's law can be regarded as a self-fulfilling prophecy, because tech companies do not want to fail to keep up with it.
Moore's Law, which states that the number of transistors on a microchip will double about every two years, has been a driving force behind the rapid progress of the semiconductor industry for several decades.
How Moore's Law benefited?Moore's Law has benefited the technology industry in numerous ways.
By driving the rapid miniaturization of transistors and increasing the number of transistors on a microchip, Moore's Law has enabled the creation of increasingly powerful and energy-efficient electronic devices such as smartphones, laptops, and servers.
This has led to significant advances in fields such as artificial intelligence, data analytics, and cloud computing, which in turn have transformed many aspects of society, from business and entertainment to healthcare and transportation.
In addition, the continued progress of Moore's Law has helped to drive down the cost of computing, making technology more accessible to people around the world. Overall, Moore's Law has played a critical role in driving technological innovation and shaping the modern world.
However, as we approach the physical limits of how small transistors can be made, it is becoming increasingly difficult to continue doubling their number on a chip every two years.
While some experts believe that Moore's Law will eventually come to an end, others believe that new technologies such as quantum computing or carbon nanotubes may help us continue to increase computational power in the future.
Ultimately, whether Moore's Law continues to hold true will depend on a complex interplay of technical, economic, and social factors, and it is difficult to predict with certainty what the future of the semiconductor industry will look like.
Nonetheless, it is clear that the development of new technologies will be crucial in ensuring that we continue to make progress in computing and other fields.
Learn more about Moore’s Law at:
https://brainly.com/question/17600211
#SPJ2
Moving your Sprite from right to left is considered the X coordinate?
Question 12 options:
True
False
Answer:
True.
Explanation:
X coordinates run from left to right, while Y runs from the top to the bottom.
To help you remember it, think of this:
A plane takes off and lands at the X coordinates and can choose whichever way it wants to take off from: left or right. Until the plane takes off, your Y coordinate is at 0. Once it's in the air, Y coordinates jumps in with our X and the plane can go up and up as it pleases (of course, there are limits) until it lands at the next airport.
Please note that x and y coordinates are always there, but in some cases they will stay at 0,0.
Hope this helped!
Source(s) used: N/A
Use parallel and highway in a sentence
Answer:
The road ran parallel to the highway, with the Uncompahgre River separating the unpaved road from the main thoroughfare to the east.
Answer:
QUESTION:
Use parallel and highway in a sentence
ANSWER:
We were on the highway parallel to the train tracks.
Explanation:
Hope that this helps you out! :)
If any questions, please leave them below and I will try my best and help you.
Have a great rest of your day/night!
Please thank me on my profile if this answer has helped you!
Difference between software developer and software engineer.
Answer:
The core difference between the two jobs is that software developers are the creative force that deals with design and program implementation, while software engineers use the principles of engineering to build computer programs and applications.
Explanation:
Answer: The terms "software developer" and "software engineer" are often used interchangeably, but there are some subtle differences between the two roles.
Explanation: Here are some key differences:
Focus: A software developer typically focuses on the implementation of software code and applications based on design specifications, while a software engineer is involved in the entire software development lifecycle, including design, development, testing, deployment, and maintenance.Education and training: Software engineers usually have a broader education and training than software developers, with a strong foundation in computer science and software engineering principles. Software developers may have more specialized training in specific programming languages, frameworks, or technologies.Job responsibilities: Software engineers often take on more managerial or leadership responsibilities, such as project management, requirements analysis, and team leadership, while software developers typically focus more on writing and testing code.Professional standards: Software engineering is typically governed by professional standards and codes of ethics, which may not apply to software development. This reflects the more rigorous and disciplined approach to software engineering compared to software development.To learn more about software developer; https://brainly.com/question/3188992
hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.
What should Chris do?
Which of the following statements are true about how technology has changed work? Select 3 options. Businesses can be more profitable by using communication technology to reduce the costs of travel. Technology has not really changed how businesses operate in the last fifty years. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before.
Answer:
Businesses can be more profitable by using communication technology to reduce the costs of travel. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely.Explanation:
As a result of technological advancements, businesses are spending less on travel because they can simply communicate with partners from the country they are based in without having to travel. Where in the past a person would have had to travel to another country to meet a client and finalize a deal, this can now be done by video call and email. These costs that are saved on travel mean the business is more profitable.
Technology has also led to the emergence of a gig economy where businesses can hire people temporarily to do specific jobs for the short term. With technology, this hiring can be from around the world thereby enabling the employer to get the best skills needed at an affordable price as evident by the number of freelance websites on the net today.
Also, internet and other collaboration technology has led to more workers being able to perform their jobs remotely and no time has this been more evident than now as the ongoing pandemic has forced people to stay at home.
The statements that are true about how technology has changed work are:
Businesses can be more profitable by using communication technology to reduce the costs of travel.In a gig economy, workers are only hired when they are needed for as long as they are needed.Through the use of the Internet and collaboration tools, more workers are able to perform their jobs remotely.What is Technology?Technology is applied science. Technology is evident in many devices around us such as the telephone, computers, tablets, etc. Technology has benefitted businesses in many useful ways.
Some of these are; improving profitability, contracting workers thus saving cost, and working remotely. So, the above options represent these points.
Learn more about technology here:
https://brainly.com/question/25110079
Consider a byte-addressable main memory consisting of 8 blocks and a fully associative cache with 4 blocks, where each block is 4 bytes, what will be the tag bits if the memory address 10101 is in the cache?
We must ascertain the number of blocks in order to achieve it. This is a 4-way set-associative cache, therefore each set contains four blocks as a result. It can contain 220 / 26 = 214 #Blocks = Capacity / BlockSize.
There are 210 lines in a way (32KB/32B) that are accessed by 10 index bits since each way is 32 KB in size and cache lines are 32 bytes. Thus, there are (32 - 2 - 3 - 10) or 17 tag bits. In the tag and data memory, there are 210 rows, or the number of sets. A memory block corresponds to each cache line or slot. Since main memory is divided into 32 blocks, each cache line has a size of 16 bytes. Any block may appear in any cache line. Any block from the 32 memory blocks can therefore appear on any cache line. In order to represent any block in any cache line, 5 bits are needed.
To learn more about BlockSize click the link below:
brainly.com/question/29897867
#SPJ4
what is the correct java syntax to output the sentence: My dog's name is "dee-dee"?
Answer:
System.out.println("My dog's name is \"dee-dee\"");
Explanation:
You need to use the backslash to use quotes inside a string.
write the definition of a void method named dashedline with one parameter, an int. if the parameter is negative or zero, the method does nothing. otherwise it displays a complete line terminated by a newline, consisting of dashes (hyphens) with the parameter's value determining the number of dashes.for example, if the parameter is 5, the method will print 5 dashes on a single line. or, if the parameter is 12, the method will print 12 dashes on a single line.
A void method is a method in programming that does not return a value. In this case, the void method named "dashedline" has one parameter, which is an integer (int).
The purpose of the dashedline method is to display a line consisting of dashes (hyphens) based on the value of the parameter. However, if the parameter is negative or zero, the method will not do anything.
To implement this method, you can use an if-else statement.
Here is the step-by-step explanation of the method:
1. Start the definition of the void method named "dashedline" with the parameter (int).
2. Inside the method, use an if-else statement to check if the parameter is negative or zero.
3. If the parameter is negative or zero, the method should do nothing and simply exit.
4. If the parameter is greater than zero, proceed to the next step.
5. Use a for loop to iterate the number of times determined by the parameter.
6. Inside the for loop, print a dash (hyphen) for each iteration.
7. After the for loop, print a newline character (\n) to terminate the line.
8. The method execution is complete.
For example, if the parameter is 5, the method will print "-----" (5 dashes) on a single line. Similarly, if the parameter is 12, the method will print "------------" (12 dashes) on a single line.
To know more about execution visit :
https://brainly.com/question/29677434
#SPJ11
When computing complexity, long running operations that occur infrequently may be
A. amortized
B. make the complexity non-linear.
C. made available to static members
D. ignored
E. None of the above.
A. amortized. When computing complexity, long-running operations that occur infrequently may be amortized, meaning that their cost is spread out over multiple operations to reduce their impact on overall complexity.
It's crucial to consider both frequently occurring operations and less frequently occurring ones when calculating an algorithm's complexity.
An algorithm's overall performance can be significantly impacted by long-running actions that happen infrequently.
Ignoring these processes could result in an erroneous complexity estimation.
An amortized analysis is a method for examining how well algorithms function when they occasionally perform expensive actions.
The cost of the operations is averaged across a series of executions, taking into consideration both frequent and rare operations.
By taking into account both the frequent and infrequent actions, we are able to better comprehend the algorithm's overall performance.
Making the operation accessible to static members or making the complexity non-linear may not be enough to solve the problem of rare, lengthy operations.
On the other hand, amortized analysis can assist in offering a more accurate evaluation of the algorithm's overall performance and complexity.
Learn more about the amortized analysis :
https://brainly.com/question/31479691
#SPJ11
A Hospital wants to store different types of data I need to find the best storage device for each type and why what is the best storage device to store the patient's data
Answer:
On-Premise Data storage
Explanation:
On-Premise Data storage prefers on-premise data to store and manage patient data. The main reason is straightforward and control over the in-house data. On-premise data centers do not need wireless connections, and no risk of downtimes. Healthcare can access the data from secure, making on-premise data storage choices.
On-premise data storage stored and managed escalates and demand more physical space. When hospitals use on-premise data storage, they have to arrange the physical space within the premises of the host of the server. On-premise data is connected to the local network and could consider the secure data option in upkeeping the security of premise healthcare with anti-virus software, firewalls, and multifactor authentication.
Hospital moves toward holistic data storage option. The on-premise to cloud data storage for healthcare affirms that challenges are nullified.
which layer is responsible for determining the best path a packet should travel across an internetwork?
The Network Layer of the OSI Model is responsible for determining the best path a packet should travel across the internetwork.
The Network Layer is responsible for routing, addressing, logical topology, and switching of packets.
The layer that is responsible for determining the best path a packet should travel across an internetwork is Layer 3 or the Network Layer. The network layer offers routing services that allow data packets to be routed from one network to another, regardless of whether the networks are the same or different. IP (Internet Protocol) is an example of a protocol that operates at this layer.
This layer is also responsible for IP addressing, which assigns a unique IP address to each device on the network. In addition, the network layer is responsible for fragmentation and reassembly. Fragmentation is the process of dividing packets into smaller pieces to accommodate the maximum transmission unit (MTU) of each network segment. When the packet reaches its destination, reassembly occurs.
Read more about the Network :
https://brainly.com/question/28342757
#SPJ11
12. When 2.00 g of H2 reacts with 32.0 g of O2 in an
explosion, the final gas mixture will contain:
a.H2, H2O, and O2
b. H2 and H20 only
c.O2 and H20 only
d. H2 and O2 only
e.H20 only
the reaction consumes all of the H2 and O2, the resulting gas mixture will contain only H2O. Therefore, the correct answer is a. H2, H2O, and O2.
When 2.00 g of H2 reacts with 32.0 g of O2 in an explosion, they undergo a chemical reaction to form water (H2O). The balanced chemical equation for this reaction is:
2H2 + O2 → 2H2O
According to the stoichiometry of the reaction, 2 moles of H2 react with 1 mole of O2 to produce 2 moles of H2O. The molar mass of H2 is 2.02 g/mol and the molar mass of O2 is 32.00 g/mol.
Using these values, we can calculate the number of moles of H2 and O2 present in the reaction:
Moles of H2 = (2.00 g H2) / (2.02 g/mol H2) ≈ 0.99 mol H2
Moles of O2 = (32.0 g O2) / (32.00 g/mol O2) ≈ 1.00 mol O2
Since the reaction consumes all of the H2 and O2, the resulting gas mixture will contain only H2O. Therefore, the correct answer is a. H2, H2O, and O2.
learn more about molar mass here:
https://brainly.com/question/31545539
#SPJ11
College is considered _____ education. Please type the correct answer in the following input field, and then select the submit answer button or press the enter key when finished.
Answer:
Postsecondary education
Explanation:
Why can fiber optics enable the internet to evolve into a “planetary computer,” where distance doesn’t limit cloud computing
Fiber optic is used to provide fast internet by using a cable filled with plastic fibers, which is not altered by electromagnetic interference.
What is fiber optic?Fiber optic is an excellent material to provide a very fast Internet while avoiding many problems associated with the connection.
These fibers (fiber optic) consist of flexible and transparent fibers of silica, i.e., silicon dioxide (SiO2) and plastic materials.
Fiber optic is not altered by electromagnetic interference around the Earth's geomagnetic field and other conditions that hamper fast connections.
Learn more about fiber optic here:
https://brainly.com/question/26259562
How can you benefit from an internship, even if it is unpaid?
college class
i couldnt find it in article
The ways that a person can benefit from an internship, even if it is unpaid is that Unpaid internships can be a fantastic way to begin developing your professional network, gain skills, and get insightful input from industry experts. They may also be a reliable predictor of your future career satisfaction.
How do you anticipate using this internship to your advantage?Some of the gains from internship are:
Obtain useful professional experience.Consider a career route.Gain a competitive advantage in the job market.Develop and polish your skills.Obtain compensation in money.Build a network with industry experts.Gain self-assurance.Change over to employment.Note that unpaid intern do assist you in putting your knowledge and talents to use at work. You can better comprehend the everyday responsibilities of that role by participating in work experience as part of your study.
Hence it is seen as a wonderful approach to develop and show off abilities like dependability and communication is through unpaid work experience.
Learn more about internship from
https://brainly.com/question/25385643
#SPJ1
Which of the following statements about your computer's primary hard drives is FALSE?
a. Some hard drives hold up to 8 TB of information
b. Hard drives are nonvolatile storage devices
c. Internal hard drives are enclosed in the system unit
d. Internal hard drives use a laser to read and write data
The statement "Internal hard drives use a laser to read and write data" is FALSE. Option C is correct.
Internal hard drives do not use a laser to read and write data. Instead, they use a technology called magnetic recording to store data. Magnetic recording works by using a magnetic head to read and write data to the hard drive's magnetic disks.
Magnetic recording works by passing a magnetic field over the surface of the disk, which changes the orientation of the magnetic particles on the disk. The magnetic head on the hard drive's read/write head reads and writes data to the disk by changing the orientation of the magnetic particles on the disk.
It's worth noting that some hard drives use a type of magnetic recording called perpendicular recording, which involves recording data perpendicular to the surface of the disk. This type of recording can allow hard drives to store more data than traditional magnetic recording, which is why some hard drives can hold up to 8 TB of information.
The other statements in the question are all true. Hard drives are nonvolatile storage devices, which means that their data is not lost when the power is turned off. Internal hard drives are typically enclosed in the system unit and are not exposed to the outside environment. Internal hard drives are also slower than external hard drives, which use a different technology to connect to the computer.
Learn more about hard drives visit: brainly.com/question/28098091
#SPJ11
During an election year, why would a senator want to determine a mode?
to determine which issue is most important to the general public
to learn the average number of women versus men who supports the senator
to figure out the highest campaign contribution received
to hire volunteers with an average amount of campaign experience
Answer:
To determine which issue is most important to the general public.
Explanation:
Took the Edge assignment!
Kuya Kyle is writing an academic paper on the Filipina poet Conchitina Cruz. What citation style guide/s can he use? What label should he use for his list of sources?
The citation style guide that he can he use for his academic paper is APA format and the label should consist of:
Your name.Person's name.Article name or number.Date.What is the name of an academic paper?Academic papers, also known as scholarly papers, are published in scholarly publications and include fresh research findings, reviews of prior findings, or demonstrations of wholly novel inventions.
The social and behavioral sciences, which is known to be made up of disciplines such as those of business, psychology, and education, employ the APA format extensively among professionals, researchers, and students.
To make sure you're using the correct style, do double-check the requirements of your university or the journal you want to publish in.
Therefore, based on the above, the The citation style guide that Kuya Kyle can he use for his academic paper is APA format
Learn more about citation from
https://brainly.com/question/8130130
#SPJ1
universal containers wants the sales team to access information about closed won opportunities with a common competitor for all pending big deals. which features should the system administrator implement?
To enable Universal Containers' sales team to access information about closed-won opportunities with a common competitor for all pending big deals, the system administrator should implement the following features:
1. Custom Reports: Create custom reports focusing on closed-won opportunities that include details about the competitors. This will allow the sales team to access valuable insights into the factors that contributed to past successful deals.
2. Dashboards: Design dashboards that display key metrics and trends related to closed-won opportunities with the common competitor. This will provide an easy-to-understand visual representation of the data and help the sales team make informed decisions.
3. Shared Folders: Set up shared folders to store relevant documents and resources, such as competitor profiles and market analyses. This will ensure that the sales team has easy access to the information they need to effectively address pending big deals.
4. Custom Fields: Add custom fields to the opportunity object, capturing essential information about competitors, such as strengths, weaknesses, and potential strategies. This will help the sales team better understand the competitive landscape and tailor their approaches accordingly.
5. Collaboration Tools: Implement collaboration tools, such as Chatter, to facilitate communication among the sales team. This will enable team members to share insights and best practices related to the common competitor, ensuring a coordinated effort in addressing pending big deals.
By implementing these features, the sales team will be well-equipped to access and leverage the necessary information to successfully compete against the common competitor in pending big deals.
Learn more about Dashboards here:
https://brainly.com/question/31843071
#SPJ11
If an admin wants to allow any user to run a particular file named getpass as root (that is already owned by root) what command must they run?
To allow any user to run a particular file named getpass as root, the admin can use the command "chmod +s getpass". This command sets the setuid bit on the file, allowing it to be executed with the privileges of the file owner, which in this case is root.
The setuid bit allows any user who executes the file to temporarily gain root privileges while running it. By running this command, the admin grants the permission for any user to run the getpass file as root, regardless of their own privileges. It is important to exercise caution when using setuid, as it can potentially introduce security vulnerabilities if not properly managed.
To know more about particular visit:
https://brainly.com/question/28320800
#SPJ11
Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message
Really appreciate the help.
#Swap this value by your name. Mine is Hamza :)
my_name = "Hamza"
#Get input from user.
inp = input("What's your name?: ")
#Print the length of his/her name.
print("The length of your name is",len(inp),"characters.")
#Check if the input matches with my name?
#Using lower() method due to the case insensitive. Much important!!
if(inp.lower()==my_name.lower()):
print("My name is",my_name,"too! Nice to meet you then.")
The symbols on the numeric row are secondary characters accessed with the shift key.
True or False?
Answer:
I've never used the shift key, I'd say false.
True, because they are the extra keys that can't go anywhere else.
How do you think Galante might respond to a hacker who says “information wants to be free,” a common slogan for those opposed to limiting access to information? Is information like the emails of the Democratic National Committee (DNC) being released by hackers truly “free” (as in, liberated, not no-cost) information?
Note that Joe Galante, a music industry executive, might argue that the unauthorized release of information, such as the DNC emails, is not a liberation of information, but a violation of privacy and intellectual property rights.
What is the rationale for the above response?Given the above, Joe would argue that the right to access and share information must be balanced with the right to privacy and protection of proprietary information.
Galante would also challenge the oversimplified concept of "information wants to be free" and assert that information creation and distribution requires investment and resources, therefore those who produce and manage information have a right to control its dissemination and use.
Note that Galante might argue that the unauthorized release of information is not an act of liberation, but a breach of privacy and intellectual property rights.
Learn more about Violation of Privacy:
https://brainly.com/question/24194350
#SPJ1
Sydney Bark is twenty-three years old, and is looking forward to celebrating her birthday on April 12. For her birthday, she saved up to buy a new computer, and now she must come up with a password for it.
What is the best password for Sydney to use?
Answer:
a future date
Explanation:
Because most people when trying to guess a password, start with basic ones like: 1234,abcde, password,l and dates (like their birthday). whereas, the person would never guess it was a future date like when the person would be 30 or when they are going on a trip .
Answer: Its B or Second one
Explanation:
Correct edge 2021
We wish to create 15 subnets in a /8 network.(Assume that we wish to use the minimum number of bits for the subnet id.) How many bits are used for the subnet id? O 15bits O 4bits O 5bits O 3bits
To create 15 subnets in a /8 network while using the minimum number of bits for the subnet ID, we need to determine the number of bits required for the subnet ID. The correct answer is 4 bits.
In a /8 network, we have a total of 8 bits available for the network ID, which leaves us with 24 bits for the host ID. The number of bits required for the subnet ID can be calculated by finding the smallest power of 2 that is greater than or equal to the number of subnets needed.
In this case, we need 15 subnets. To find the smallest power of 2 greater than or equal to 15, we can start by calculating 2^4, which is 16. Since 16 is greater than 15, we can conclude that 4 bits are required for the subnet ID.
By using 4 bits for the subnet ID, we can create up to 16 (2^4) subnets. This allows us to accommodate the 15 subnets we need while still leaving room for one additional subnet.
To summarize, to create 15 subnets in a /8 network while using the minimum number of bits for the subnet ID, we require 4 bits for the subnet ID.
To learn more about network click here:
brainly.com/question/29350844
#SPJ11
A centrifugal pump operates steadily to increase the pressure of water from 175kPa to 1230kPa. The volumetric flow rate is 0.017m3/min. The pump operates such that one can ignore changes in kinetic and potential energy. For an isentropic efficiency of 75%, what is the minimum power needed to drive this pump (kW).
The minimum power needed to drive this pump is 46 W.
The centrifugal pump is a type of pump that operates by using centrifugal force to increase the pressure of the fluid. In this case, the pump operates steadily to increase the pressure of water from 175kPa to 1230kPa.
The volumetric flow rate is 0.017m3/min, and it can be assumed that changes in kinetic and potential energy are negligible.
Given an isentropic efficiency of 75%, the minimum power needed to drive this pump can be calculated using the formula:
P = (Q * ΔP) / (η * ρ)
where P is the power, Q is the flow rate, ΔP is the pressure difference, η is the efficiency, and ρ is the density of the fluid.
Substituting the given values, we get P = (0.017 * (1230 - 175)) / (0.75 * 1000) = 0.046 kW or 46 W (rounded to three significant figures).
Learn more about The pressure at
https://brainly.com/question/14446567
#SPJ11
You decide that you want your character to jump and land on platforms in a Scratch game. How do you create the platforms?
Group of answer choices
by adding code to your backdrop in the code editor
by drawing them onto your backdrop in the Backdropstab
by inserting additional backdrops into your Backdropslist
by adding landing code to your sprite in the code editor
Answer:
The third one hope this helps.
Explanation: