Which two features could be added to a game using an "if () then" block?
a. the game starts when the user clicks the cat sprite, not the green
flag.
b. when a player touches the treasure chest, a message displays "5
points!"
c. if the player touches a wall, it turns around and moves back 5
steps
d. a sprite changes to a random costume every 2 seconds and says
"ha ha' every 5 seconds.

Answers

Answer 1

The two features that could be added to a game using an "if () then" block are c. if the player touches a wall, it turns around and moves back 5 and d.

What does the If Then block mean?

The If-Then block is understood to be the output certainly considered one among given values, this is because of the fee of a Boolean enter.

Note that the entry fee could be very essential and as such, The functions will be introduced to a sport the use of an "if () then " block are: Using nested If-Then blocks. • Checks the particular Bid amount for the instrument.

Learn greater approximately game from :

https://brainly.com/question/1786465

#SPJ1


Related Questions

Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor to global warming. my phone is dead. What do you think is one of the greatest contributors to global warming? I have to make an app about the two things.

Answers

What I think the highest is carbon dioxide . Because we use a lot of CO2 in every single day . So image that for 365 . We use a lot of carbon dioxide . In which that is ruining our earth

What is an example of a situation in which you might use the append method? In what ways is the append method limited?


What is the difference between a method and a function? In what ways are they similar? Why do you think Python makes a distinction between methods and functions?

Answers

Answer:

An example of a situation in which I might use the append method is explained below in details.

Explanation:

Append Method

The append() arrangement in python combines a separate item to the present list. It doesn't recover a new record of items but will transform the primary list by combining the item to the conclusion of the record. After completing the process append on the list the size of the list advances by one.

List three ways computers can be network together

Answers

Answer:

The most common of these technologies include Local Area Network (LAN), Wireless Area Network (WAN), the Internet via client servers and Bluetooth. Each of these computer network types serves a different purpose and you may find a need to use each one.

Explanation:

LAN,wan, Bluetooth

Which computer science career is responsible for creating code for software? programmer hardware engineer user interface designer cybersecurity analyst

Answers

Answer:

programmer ⠀⠀⠀ ‌⠀⠀⠀ ‌⠀⠀⠀ ‌

Generalized goals are more likely to be achieved than specific goals. True or False

Answers

False

They are likely to be achieved because they are well defined, clear, and unambiguous.

NEED ANSWERS ASAP 50 POINtTS!!!!
Katie wants to use VLOOKUP for a column in a table. Which value of the mode parameter should she use to look for an exact match of the searched data?
Katie should use the __ value of mode parameter for an exact match with the searched data.

Answers

Answer:

The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data

Further Explanation:

The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.

Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.

To achieve this, select a cell in your Excel worksheet

Type =VLOOKUP in the type bar of the Excel sheet

Select the value to look up and then select the data range

Type the column number that you want to search and then type FALSE

Press enter

Answer:

The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data

Explanation:

The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.

Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.

To achieve this, select a cell in your Excel worksheet

Type =VLOOKUP in the type bar of the Excel sheet

Select the value to look up and then select the data range

Type the column number that you want to search and then type FALSE

Press enter

Which is best online C compiler?

Answers

It offers the greatest C++ compiler, and it's extremely simple to manage different versions of a single application.

What does a software compiler do?

Compilers are specific software tools that convert the source code of one programming language into machine code, bytecode, or some other computer program. Usually, the original code is created in a high-level, understandable language for humans, such Java or C++.

Are compilers present on all computers?

No. Operating systems do this frequently but not always. Not all computers, but the majority, come with an operating system. Some highly well-known operating systems (OSs) may not include compiler or interpreter for popular programming languages, although they may do so for less well-known but platform-specific languages.

To know more about compiler visit:

https://brainly.com/question/28232020

#SPJ4

differentiate between status bar and task bar​

Answers

Answer: The taskbar is for starting tasks, while the status bar shows information.

Explanation:

The taskbar is often at the bottom of the desktop, while the status bar may be at the bottom of a program's window.

The status bar displays information, but the taskbar is used to initiate tasks.

What is the status bar?

A graphics controller called a status bar displays an informational area there at bottom of windows. To organize the information, it might be split into sections. Since several status bars offer additional capabilities, their main duty is to provide knowledge about just the window's present state.

The status bar may appear at the bottom of a program's screen, although the taskbar is frequently at the bottom of the workspace.  They both have their own functions that help in running a system.

The status bar is presented at the bottom of internet browser displays or other software windows; a toolbar provides simpler access to operations generally carried inside the application.

Learn more about status bar, here:

https://brainly.com/question/3521461

#SPJ2

In this text, Boyce-Codd normal form is the same as _____.
a. unnormalized
b. first normal form
c. second normal form
d. third normal form

Answers

Boyce-Codd normal form is the same as third normal form. third normal form. Boyce-Codd normal form is a higher level of normalization than third normal form, meaning that it satisfies the rules of third normal form and also additional criteria related to functional dependencies. Unnormalized refers to data that has not been organized or structured according to any normalization rules. First normal form refers to the basic requirement of atomicity, meaning that each column should contain only one value. Second normal form refers to the requirement of removing partial dependencies, meaning that each non-key column should depend on the entire primary key.

What is Boyce-Codd normal form?

Boyce-Codd normal form (BCNF) is a higher level of database normalization that ensures that certain functional dependencies hold for every non-trivial dependency in a relation.

A functional dependency occurs when the value of one attribute in a relation determines the value of another attribute. For example, if the value of attribute A determines the value of attribute B, we say that B is functionally dependent on A. In a relation, a non-trivial functional dependency occurs when an attribute or group of attributes determines the value of another attribute or group of attributes.

To know more about Boyce-Codd normal form (BCNF) visit:

https://brainly.com/question/29735359

#SPJ11

suppose you are designing a sliding window protocol for a 1-mbps point-to-point link to the moon, which has a one-way latency of 1.25 seconds. assuming that each frame carries 1 kb of data, what is the minimum number of bits you need for the sequence number?

Answers

The maximum reasonable size is 306 frames, with a sequence number of 10 bits, in order to keep this pipe full.

Which of the aforementioned protocols has a sliding window and a transmit window size greater than one?

We therefore employ the Selective Repeat ARQ methodology. With this protocol, the transmitter window and receiver window sizes are always equal. The sliding window is always larger than one in size.

What is the sliding window protocol formula?

Sliding Window protocol efficiency is stated as N/(1+2a) where N is no. of window frames and an is ratio of propagation delay versus transmission delay. Full duplex is how the Sliding Window protocol operates.

To know more about window protocol visit :-

https://brainly.com/question/11158930

#SPJ4

Write a c program that asks the user to enter two numbers. the program should use the conditional operator to determine which number is the smaller and which is the larger

Answers

Using the knowledge in computational language in C++ it is possible to write a code that asks the user to enter two numbers. the program should use the conditional operator to determine which number is the smaller and which is the larger.

Writting in C++ code:

#include <iostream>

using namespace std;

int main(){

float a, b;

cout<<"Enter two numbers:";

cin>>a>>b;

if(a>b) {

cout<<"Larger Number:"<<a<<endl;;

cout<<"Smaller Number:"<<b;

}

else if(b<a){

cout<<"Larger Number:"<<b<<endl;

cout<<"Smaller Number:"<<a;

}else{

cout<<"Number are equal!"<<endl;

}

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

Write a c program that asks the user to enter two numbers. the program should use the conditional operator
CODE

#include <stdio.h>

int main() {

   // Variables

   int a, b;

   // User input

   printf("Enter a number: ");

   scanf("%d",&a);

   printf("Enter a number: ");

   scanf("%d",&b);

   // Conditional operators  

   (a>b)? (printf("%d is bigger than %d\n", a, b)) : (printf("%d is smaller than %d\n", a, b));

   (b>a)? (printf("%d is bigger than %d\n", b, a)) : (printf("%d is smaller than %d\n", b, a));

   

   return 0;

}

DISPLAY

Enter a number: 209

Enter a number: 190

209 is bigger than 190

190 is smaller than 209

EXPLANATION

Declare the variables a and b.

Ask the user to input two numbers.

Use conditional operators to check if a is smaller or bigger than b and b is smaller or bigger than a.

For a random data sequence of 10110010100001101, a. Find out the differential coding of the above data sequence if the reference bit is o b. Sketch the eye diagram of duration 21. for NRZ OOK coding c. For the above data sequence which line code is the best and why?

Answers

The best line code for the given data sequence is NRZ.

What is the most suitable line code for the random data sequence 10110010100001101?

The best line code for the given data sequence is NRZ because it provides a reliable and straightforward representation of the data. NRZ (Non-Return-to-Zero) line coding uses two levels to represent binary data, typically high and low voltage levels.

It does not rely on transitions between levels, making it less susceptible to timing errors and distortion. Differential coding with a reference bit of 0 means that the current bit is represented by the XOR (exclusive OR) operation between the current bit and the previous bit.

This helps in reducing the effect of long consecutive runs of 0s or 1s, enhancing data integrity. The eye diagram, which represents the signal quality, is not applicable for NRZ line coding as it does not involve transitions.

Learn more about line code

brainly.com/question/27591534

#SPJ11

. question 10 what file provides information about the pages, videos, and other files on your site, and the relationship between them?

Answers

Note that the file that provides information about the pages, videos, and other files on your site, and the relationship between them is called a Sitemap.

Why are sitemaps important?

A sitemap specifies a website's most significant pages, ensuring that search engines can discover and index them. Sitemaps also aid in comprehending your website's structure, making it easier to explore.

A sitemap can help you establish your site's aims before you begin developing or generating content. By establishing exactly what you want from your site and then planning it out, you can ensure that every component of your website is reinforcing your aims.

Learn more about Sitemaps:
https://brainly.com/question/15004381
#SPJ1

if you go up to the bell and it says there is a message and there was no message what should i do?

Answers

No worry! It happens to me too, it’s nothing to worry about :)

develop a python code to compute molar volume, enthalpy, and entropy at given temperature and pressure for a fluid modeled by the peng-robinson equation of state,

Answers

The Peng-Robinson equation of state is a fluid model that is utilized for a wide range of applications, particularly in petroleum engineering and process control.

This equation is utilized to estimate the thermodynamic properties of a fluid at a given temperature and pressure. The thermodynamic properties that can be computed using the Peng-Robinson equation include molar volume, enthalpy, and entropy. The following is a Python code for computing these properties at a given temperature and pressure.

This code makes use of the thermopy package that contains the Peng-Robinson equation of state.```
# Importing the thermopy package that contains the Peng-Robinson equation of state
from thermopy import pr
# Setting the parameters for the Peng-Robinson equation of state


params = {
   "Mw": 16.04, # Molecular weight of the fluid
   "Tc": 126.2, # Critical temperature of the fluid
   "Pc": 34.9, # Critical pressure of the fluid
   "Vc": 0.000117, # Critical volume of the fluid
   "Zc": 0.27, # Critical compressibility factor of the fluid
   "omega": 0.24 # Acentric factor of the fluid
}
To know more about petroleum visit:

https://brainly.com/question/29361672

#SPJ11

Asymmetric encryption, also called _____ encryption uses two keys, a public key and a private key, which are mathematically related.

Answers

The other name for asymmetric encryption that uses two keys a public key and a private key, which are mathematically related is; Public key

Data Encryption

Asymmetric Encryption could also be called asymmetric cryptography, or public-key encryption or cryptography.

It is a process that utilizes a pair of related keys namely one public key and one private key to encrypt and decrypt a message as well as protecting it from unauthorized access.

In conclusion, the other name for asymmetric encryption here is public key

Read more about data encryption at; https://brainly.com/question/9238983

Which form of architectural drawing shows a building as it will appear from the front, rear, and sides, depending on its design and complexity? The view of a construction plan shows a building as it will appear from the front, rear, and sides, depending on its design and complexity.

Answers

And pictures or graphs of so I can’t answer sorry but try looking it up

Answer:

elevation

Explanation:

i'm not sure, but an elevated view could show the given aspects needed to appear of the building..

what is the minimum weight spanning tree for the weighted graph in the previous question subject to the condition that edge {d, e} is in the spanning tree?

Answers

It is possible to use Kruskal's approach with a small modification to find the minimal weight spanning tree for the weighted graph under the constraint that edge "d, e" is in the spanning tree.

What is the minimal weight of a spanning tree edge?

An edge-weighted graph is one in which each edge is given a weight or cost. A minimum spanning tree (MST) is a spanning tree whose weight (the total weight of its edges) is equal to or less than the weight of any other spanning tree in an edge-weighted graph.

What do weighted graph spanning trees represent?

As a result, the number of labelled trees (which need not be binary) with n vertices equals the number of spanning trees in a complete weighted graph.

To know more about spanning tree visit:-

https://brainly.com/question/30051544

#SPJ4

(1) given the following filesystem info: a. 4 byte pointers and 4096 byte blocks b. Max data by just the 12 direct pointers in data node: 49,152 data bytes Max data by the single indirect plus the 12 direct pointers: 4,243,456 data bytes (slightly more than 4MB) c. Max data by the double indirect and the previous: 4,299,210,752 bytes (slightly more than 4 GB) d.Anything larger would require using the triple indirect. calculate how many physical reads (as a best case) would it take to access any particular data block in an 8MB file? assume you will have to read the inode.

Answers

To access any particular data block in an 8MB file, we need to calculate the number of physical reads in the best-case scenario.

Here's a step-by-step explanation:
1. Read the inode: Since we are assuming that we need to read the inode, this will count as the first physical read.
2. Determine which pointers to use: Given the file size of 8MB, which is more than 4MB but less than 4GB, we know that we will need to use the 12 direct pointers and the single indirect pointer to access the data.
3. Direct pointers: The 12 direct pointers can access 49,152 data bytes each, for a total of 589,824 bytes (49,152 x 12). This is less than 8MB (8,388,608 bytes), so we will need to use the single indirect pointer as well.
4. Indirect pointer: To access the data blocks through the single indirect pointer, we first need to read the block containing the indirect pointers. This counts as a second physical read.
5. Access the desired data block: Since the single indirect pointer can access up to 4,243,456 data bytes (slightly more than 4MB), it is enough to cover the remaining data in our 8MB file. We will need one more physical read to access the particular data block we are interested in.
In the best-case scenario, it will take a total of 3 physical reads to access any particular data block in an 8MB file.

To know more about data block visit:

https://brainly.com/question/13976538

#SPJ11

what is the name of the modern english keyboard layout

Answers

Answer:

The name is called QWERTY layouts.

Explanation:

This is because the first 5 letters on the English keyboard are QWERTY.

Hope this helped and have a great day,

Ginny

what is the network id of the ip address 172.19.48.16 with subnet mask 255.255.240.0?

Answers

The network id of the IP address 172.19.48.16 with subnet mask 255.255.240.0 is 172.19.48.0. Subnetting is a technique used by the organization to divide the assigned address space into smaller allocations for each subnetwork inside the organization.

Based on the probable number of networks and hosts, or endpoints, that enterprises may need, ISPs assign IP address ranges to organizations. The Classless Inter-Domain Routing (CIDR) assignment mechanism is used today for allotments.  Subnetting causes a drop in the number of useable host IP addresses while increasing the number of subnetworks. The term "IP subnet" refers to each subnetwork.

As part of the process to choose which interface to utilize to forward packets to their destination, routers compute the subnet address.  An address and its mask are combined in this process via a binary AND operation. The subnet prefix, which eliminates all of the host bits, is the outcome. The routing table item with the longest match, or the default route, is found by the router using the network prefix. The interface linked to the best match prefix is used to forward the packet out.

To learn more about subnet mask click here:

brainly.com/question/29507889

#SPJ4

. when we run the spectreattack.c program listed in the book, why do we always see array[0*4096 delta] in the cache?

Answers

The reason that we always see array[0*4096 delta] in the cache when running the spectreattack.c program listed in the book is that the program is designed to exploit the vulnerability in the Spectre CPU bug.

The program is designed to execute a specific sequence of instructions that will cause the CPU to speculatively execute code that should not be executed. When this happens, the program can read data that it should not have access to, including data that is stored in the cache. By always accessing array[0*4096 delta], the program is able to ensure that the data that it is accessing is always in the cache. This makes it easier for the program to access the data that it is interested in, and it also helps to ensure that the program is able to execute more quickly.

Learn more about array: https://brainly.com/question/28565733

#SPJ11

what is a paragraph on what i can write on what i learned from watching basic keyboard shortcuts using control functions video

Answers

Answer:

Write the following nonsensical paragraph:

Explanation:

I learned how to navigate the computer efficiently. I learned how to use Ctrl + (key) to quickly do (something). ( Now reword that multiple times with different commands. ) Now I can harness my inner laziness to browse the computer at a faster speed.

for the hdtv program in figure 3-3, which of the speeds shown will allow real-time streaming?

Answers

for real-time streaming of HDTV content. Streaming high-definition television (HDTV) content typically requires a stable and sufficient internet connection speed. The recommended minimum speed.

for streaming HDTV content in real-time is typically around 5 Mbps (megabits per second) or higher.

To ensure a smooth streaming experience without buffering or interruptions, higher speeds are often preferred. Depending on the streaming platform or service, higher quality settings or 4K streaming may require even faster speeds, typically ranging from 15 Mbps to 25 Mbps or more.

It is important to note that the specific speed requirements for real-time streaming can vary based on factors such as the streaming platform, the quality settings, the compression used, and the availability of bandwidth. It is always advisable to check the recommended speed requirements provided by the streaming service or consult their support documentation for accurate and up-to-date information.

Learn more about  HDTV    here:

https://brainly.com/question/29096596

#SPJ11

You are building a game that needs to do the following:

•Make the player unable to cross walls of yellow blocks

•Make the player "faint" and start
over if it touches a red block

•Make the player win if it touches a green block

Which three modules would you need to use?

A. An "if () then" block that outputs movement to the initial position if
the sprite touches a red block.

B. An "if () then" block that outputs a small change in position if the
sprite touches a yellow block, one for each direction

C. A "forever" block that outputs different messages in sequence as
the player navigates

D. An "if () then" block that outputs a happy sound
the sprite touches a green block
and message if the spirit touches a green block

Answers

green block and the red block

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

(25 POINTS) Some applications work on all devices while others work on some devices. True or False?

Answers

Answer:

True.

Explanation:

It is true that some applications work on some devices but not on others. This is so because it depends on the operating system of each device, that is, if the device has an operating system compatible with the application in question, said application will work, but if, on the contrary, the operating system is not compatible, the application will not be useful in this.

What is the main advantage for an operating-system designer of using a virtual-machine architecture? What is the main advantage for a user?

Answers

The main advantage for an operating-system designer of using a virtual-machine architecture is that it allows for greater flexibility and compatibility with different hardware and software environments. By creating a virtual environment that emulates a specific hardware or software configuration, the designer can ensure that their operating system will work seamlessly across a variety of different systems.

This is especially important in today's fast-paced technological landscape, where hardware and software configurations are constantly changing and evolving.

The main advantage for a user of using a virtual-machine architecture is that it allows them to run multiple operating systems on a single machine, without the need for separate hardware. This can be particularly useful for software developers or IT professionals who need to test applications across multiple platforms, or for individuals who prefer to use multiple operating systems for different purposes. With a virtual-machine architecture, users can switch between different operating systems seamlessly and easily, without the need for complex configuration or setup processes. Overall, the use of virtual-machine architecture offers significant benefits for both operating-system designers and users, making it a valuable tool in today's technology-driven world.

Learn more about operating-system here:

https://brainly.com/question/31551584

#SPJ11

Most presentations use text: A. To draw attention to content
B. At a minimum
C. Without restraint
D. To maximize area and style

Answers

i think it’s c hope this helps
Other Questions
Match the significance of the following terms and events.1. banned the buying and selling of liquor in the United States2. peace signed by Germany after World War I3. led to the United States involvement in World War I4. led to Austria declaring war on Serbia, beginning World War I5. led to German surrender in World War INEXT QUESTIONO2ASK FOR HELP345 6 7assassination of FerdinandEighteenth Amendmentsurrender of German alliessinking of LusitaniaTreaty of Versailles8 The internet and related technologies made their broad penetrations into the economy during what period Connor borrows $8,000 at a rate of 19% interest per year. What is the amount due at the end of 7 years if the interest is compounded continuously? $14,576. 95 $30,248. 35 $43,791. 58 $29,215. 37. albertsons operates more than 400 grocery store locations across the country. the chain is interested in determining the category of product that is best suited to promotions at end-of-aisle displays. albertsons selects 25 stores in different geographic areas and varies the types of products it features for two different end-of-aisle displays in each store. albertsons measures the sales for each product category tested and compares the sales during the end-of-aisle display promotion to the baseline sales. using this comparison, albertsons can determine whether any change in sales was observed as a result of the promotion. which type of research method did albertson's use? give a scientific reason for the following (in) the presence of a large central vacuole in a plant cell The school that Perry goes to is selling tickets to a spring musical. On the first day of ticket salesthe school sold 2 adult tickets and 8 child tickets for a total of $112. The school took in $160 onthe second day by selling 6 adult tickets and 8 child tickets. Find the price of an adult ticket andthe price of a child ticket. .5+y-534+37 -6 =45 explain the pressure-flow hypothesis by first completing the statements with the terms provided, and then rearranging the statements so that they appear in chronological order. If the net force on an object is zero, then it definitely has no ________.A. WeightB. VelocityC. MotionD. Acceleration Energy that is due to the motion of an object is Hi I really need help! 31 points!!So I have to write an essay, and I already have the first half. I just need another point and maybe some things on it. The question is "whats the most important thing(s) you learned in bible class?" I just need something that is relevant to the importance of the old testament. Tysm! I will report you if you give me invalid answers :) a conclusion on how music impacts you Explain the Historical context and key arguments of FrankfurtSchool Critical Theory (Culture Industry) (Paragraph Format) Diego is shooting portraits of a family. He thinks he might want to include some of the images in advertisements for his photo studio, although he probably won't use them until at least one year from now. What should Diego do in this situation?A. he should obtain a signed model release from the family members before finishing the photo sessionB. he should obtain a verbal permission to use the photos from the family members before finishing the photo sessionC. he should wait until he is ready to include the photos in his advertisements, then ask the family members to sign a model releaseD. He doesn't need to do anything because Diego is taking the photos, he holds copyright to them and can use them however he wants The State of California has decided to improve traffic safety. To do so, law makers look at a variety of options. These options include: Requiring safety features on all new cars. Expanding freeways to alleviate traffic congestion. Stricter punishments for drunk drivers. Lowering the speed limit. Increasing fines for drivers who break traffic laws. Identify the policy cycle step the lawmakers are currently on. Policy EvaluationAgenda SettingPolicy AdoptionPolicy ImplementationPolicy Formulation what disease is suggested by an increased hemoglobin concentration, leukocytosis, and thrombocytosis? What is the difference between a relation and a function? select all the true statements. Work to be performed can come from the work package level of the work breakdown structure as well as other sources. Which of these is NOT a source of authorized work to be performed? amy is building a house. the basement floor is at -15 feet, The roof of the house is above the ground 25 feet. Write an inequality to compare the heights. Which of these is found ONLY in eukaryotes?A)ribosomesB)chromosomesC)cell wallsD)endocytosis