Which two extensions in scratch are correctly matched to their accessibility goals
A. Pen extension
B. Translate extension
C. Video sensing extension
D. Text to speech extension
Choose two answers

Answers

Answer 1

The two extensions in scratch are correctly matched to their accessibility goals Translate extension and  Text to speech extension.

What are Scratch Extensions?

Scratch extensions are known to be used in an interface with external hardware and information outside of the Scratch website via new blocks.

Note that The two extensions in scratch are correctly matched to their accessibility goals Translate extension and  Text to speech extension.

Learn more about scratch  from

https://brainly.com/question/25720264

#SPJ1


Related Questions

how does abstraction make programming languages easier to use
A. It eliminates the need for codes to be automated
B. It uses calculations that all computers understand
C. It uses words instead of binary code
D. It uses letters instead of numbers

Answers

Abstraction make programming languages easier to use as  It eliminates the need for codes to be automated.

How does abstraction make programming languages easier to implement?

Data abstraction is known to be a tool that helps a person to change a complex data structure into simple ones which can be used easily.

Note that Abstraction make programming languages easier to use as  It eliminates the need for codes to be automated.

Learn more about abstraction from

https://brainly.com/question/7994244

#SPJ1

the building of an online presence and authority is called
A. a status update
B. social media
C. social capital
D. Web feed

Answers

Answer:

I think A sorry if wrong

Explanation:

have a good day

Answer: C, social capital

Explanation: I just did the test

How often your users’ geolocation and your geofences trigger depends on your:
age.
interface.
event models.
user base.

Answers

Answer:

user interface

Explanation:

Geofences are like virtual boundariesThey define your boundaries or limit while dealing with something virtually.They try to help in locating you or use your proximate location sometimes for privacy

What is returned by the code: range (20, 100, 20)

Answers

The code that is returned by the code: range (20, 100, 20)  is known as  (20, 50, 80).

What is this code about code?

The line of code is known to be one that often returns the ASCII code as the ASCII is known as American Standard Code for Information Interchange.

Note that the code is made up of   seven bit code and thus the code returned for range (20, 100, 30) is (20, 50, 80).

Learn more about code from

https://brainly.com/question/20796198

#SPJ1

With the cold winter months fast approaching, Lungi wants to improve the overall effectiveness of
operations at his NGO. He wants to keep track of all the blankets he has in stock and be able to
determine how many he has left on distribution days. In the past, it has happened that Lungi thought
he had blankets to hand out but in fact had none left.
Lungi found out that you are an IT student who needs to find a client for their final year IT project. He
has volunteered to be your client.
Q.1.1 Plan the logic for Lungi’s application using pseudocode. The logic needs to satisfy
the following needs:
 The application will need to allow Lungi to enter the number of blankets he
wishes to distribute on a given day.
 The application should keep track of the number of blankets handed out to
ensure that Lungi does not hand out more blankets than he has.
 The application will need to warn Lungi when he has only one (1) blanket
left to hand out.
 Once all the blankets have been handed out, the following report should be
produced:
 The pseudocode should incorporate the use of modules.
 The pseudocode should implement the features of good program design.
 Use at least one loop structure appropriately.
 Use at least one selection structure appropriately.

Answers

Answer:

please can you make this question make sence so i can at least try to help by answering this question for you

: Compute the 9 partial derivatives for the network with two inputs, two neurons in
the hidden layer, and one neuron in the output

Answers

Using the python code we can say that it will be possible to calculate the neutrons and organize them as:

The code can be written as:

def get_total_derivative(self,l_id):

def sigmoid(x, div = 0):

if div == 1:

return np.exp(-x) / (1. + np.exp(-x))**2.

if div == 2:

return - np.exp(x) * (np.exp(x) - 1) / (1. + np.exp(x))**3.

return 1. / (1. + np.exp(-x))

def linear(x, div = 0):

if div == 1:

return np.full(x.shape,1)

if div > 2:

return np.zeros(x.shape)

return x

See more about python at brainly.com/question/18502436

#SPJ1

An example of people working for a social cause is when a:
A.family complains to a restaurant manager that the food and service were poor
B.group stands on the corner with signs urging people to spray or neuter their pets
C.government decides that a certain newspaper company must be shut down.
D.student writes in his journal about how much he enjoyed visiting a national park

Answers

Answer:

B. Group stands on the corner with signs urging people to spray or neuter their pets.

Explanation:

It is B because they are fighting for people to neuter their pets to probably to avoid having so many strays

Controlling costs and managing a budget are important only at the beginning of a project. Figuring out the total cost of a project after work has started is good management. The project manager must be aware of all costs when allotting a specific amount of money to each task throughout the project.

Answers

Answer:

bank offinjiniwniqnwjwnnww. jwiejien3I2n2 jwiwjwn2 no2no2n2I2nwjn2i

Answer:

False False True

Explanation:

because yes

A particular talent competition has five judges, each of whom awards a
score between 0 and 10 to each performer. Fractional scores, such as 8.3, are allowed. A
performer’s final score is determined by dropping the highest and the lowest score received, then
averaging the three remaining scores. Write a program that uses these rules to calculate and
display a contestant’s score. It should include the following functions:
• getJudgeData() should ask the user for a judge’s score, validate it, and then return it. This
function should be called by main once for each of the five judges.
• calcScore() should drop the highest and lowest score and then calculate and print the
average of the three scores that remain. This function should be called at least once by
main and should be passed the five scores. These averages should be rounded to the
tenths decimal place. Make sure you are rounding after your calculation (3.57 = 3.6 and
3.54 = 3.5)
Two additional functions, described below, should be called by calcScore, which uses the
returned information to determine which scores to drop.
• findLowest() should find the lowest of the five scores passed to it.
• findHighest() should find and return the highest of the five scores passed to it.
In JAVA programing

Answers

Using the C++ code we can say that it will be possible to calculate the points as follows:

Writing this code we will have:

#include <iostream>

using namespace std;

void getJudgeData(double *);

void calcScore(double[], int);

double findLowest(double[], int);

double findHighest(double[], int);

int main()

{

double scores[5];

int i;

int s=5;

double avgScore;

cout << "\n Enter each Judge's score.\n\n\n";

for(i=0;i<5;i++)

{

cout << "\n Enter Judge #"<< i+1 <<" score: ";

getJudgeData(&scores[i]);

}

See more about C code at brainly.com/question/17544466

#SPJ1

Wollongong City council is interested in the growing tourism market and opens an office to launch services for people who travel on holidays and cannot look after their properties (houses or units) while they are away. This new office currently has 200 employees whose PCs are linked by a small LAN. Each PC shares files and also services (such as printing) with the others on the LAN. What type of network model is suitable to build a small LAN for this new office? How can you protect your LAN from Malware attacks?

Answers

Answer:

list five characteristics of cpu

Which of the following algorithms is deterministic, in the sense that for a given input, a constant output will necessarily be given?

Select the best answer



Select one:
A.
The K-Means algorithm with the Lloyd method

B.
The K-Means algorithm with the Forgy method

C.
The K-Means algorithm with the K-means++ method

D.
The K-NN algorithm with a weighted average

Answers

The following algorithms is deterministic, in the sense that for a given input, a constant output will necessarily be given are C.The K-Means algorithm with the K-means++ method.

What is the difference between What is the distinction among K method and K-method ++?

Both K-method and K-method++ are clustering strategies which comes beneath neath unsupervised learning. The fundamental distinction among the 2 algorithms lies in: the choice of the centroids round which the clustering takes place. okay methodthe ++ eliminates the disadvantage of K method that's it's miles depending on initialization of centroids.

This set of rules guarantees a wiser initialization of the centroids and improves the first rate of the clustering. Apart from initialization, the relaxation of the set of rules is similar to the same old K-method set of rules. That is K-method++ is the same old K-method set of rules coupled with a wiser initialization of the centroids.

Read more bout the  K-Means algorithm:

https://brainly.com/question/15016224

#SPJ1

What is the biggest advantage of flow batteries?

A. the complete simplicity and purity of the energy provided by the battery

B. their use of solid conductive material like ceramic or polymer to function

C. their ability to almost instantly recharge by replacing the electrolyte liquid while simultaneously recovering for re-energization

D. the power efficiency of their operating systems that never fail or shut down

Answers

Answer:

C. Their ability to almost instantly recharge by replacing the electrolyte liquid while simultaneously recovering for re-energization

Explanation:

The main advantage of these types of batteries is the instantaneous response time due to the energy that had been stored as circulating current.

MissSpanish

which set of possible outputs can result from a Boolean function
A. Movement or sound
B. If or then
C. True or false
D. High or low

Answers

The set of possible outputs that can result from a Boolean function is known to be True or false.

What is the output of Boolean?

In Boolean Algebra terms, that which is known to be the output will only come out as TRUE only if all of its inputs are TRUE and false if it is not.

Therefore, The set of possible outputs that can result from a Boolean function is known to be True or false.

Learn more about Boolean function from

https://brainly.com/question/13265286

#SPJ1

Help me please!!!. And if you gonna copy from the internet make the sentence sound different so the teach doesn’t know I’m copying ty!

Answers

Answer:

10. Letter 'm'

11. It's about baseball. The catcher and the umpire

12. An anchor

A leading pharmaceutical company is launching a major transformation of its entire Cloud operations in order to more quickly and efficiently perform research and conduct clinical trials.

How can a Cloud-first strategy help this client?


by providing a data and analytics platform that keeps the client's legacy systems intact


by providing a data-centric approach that offers more speed, agility, and security


by transforming and upskilling the client's workforce to build their own Cloud solution


by automating the entire scope of the client's business

Answers

A cloud-first strategy helps this client by providing a data-centric approach that offers more speed, agility, and security. Thus, the correct option is B.

What is a Cloud-first strategy?

A cloud-first strategy may be defined as an operational strategy that allows the users to reposition all or most of their infrastructure to cloud-computing platforms.

A cloud-first strategy helps this client in numerous ways. It provides a data-centric approach that offers more speed, agility, and security to its customers or clients in a facilitated manner.

Therefore, the correct option for this question is B.

To learn more about the Cloud-first strategy, refer to the link:

https://brainly.com/question/24719487

#SPJ1

A Chain of dry-cleaning outlets wants to improve its operations by using data from devices at individual locations to make real-time adjustments to service delivery. Which technology would the business combine with its current cloud operations to make this possible

Answers

The technology would the business combination with its current cloud operations to make this possible are ERP and loT.

What is the ERP?

Enterprise resource planning (ERP) refers to a shape of a software program application that companies use to manipulate each day industrial organization sports activities in conjunction with accounting, procurement, task management, chance manage and compliance, and supply chain operations.

Given the organization has a cloud setup, we need a company solution (ERP system) which needs to be to be had to all stores and loT to build up facts from devices and deliver it over to the ERP system. This will help to connect records at some crucial databases in cloud from all the stores. There need to be record protection features as well to maintain the records intact, all profits features need to be incorporated and tested.

Read more about the ERP :

https://brainly.com/question/14635097

#SPJ1

If I bought a PC, what is the official way to get all of the drivers and runtimes?​

Answers

Answer: To get drivers to go to the website of the computer

Explanation:

Like if it is Dell or HP or ASUS  the drivers will be on the site if you have the serial number and make of your pc. The site will have phone numbers if you have problems and email help ...

Plus the site will have all the specs of your PC depending how new it is for the runtimes

Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses, and infected nodes in the computer network. A new methodology for finding patterns in data that signify infections was investigated in IEEE Transactions on Information Forensics and Security (May 2013). The method uses multiple filters to check strings of information. For this exercise, consider a data string of length 4 bytes (positions), where each byte is either a 0 or a 1 (e.g., 0010 ). Also, consider two possible strings, named and In a simple single filter system, the probability that and differ in any one of the bytes is .5. Derive a formula for the probability that the two strings differ on exactly of the 4 bytes. Do you recognize this probability distribution?

Answers

What is Network forensics ?

Network forensics is the procedure of tracking packets and reading community site visitors hobby for intrusion or malware detection. It entails figuring out an issue, amassing and reading data, choosing the great troubleshooting response, and imposing it.

The probability distribution is 1.25.

Read more about the probability distribution:

https://brainly.com/question/24756209

#SPJ1

what is the broad overview of a class scheduling software​

Answers

Answer: basically you run the time management of a company

Explanation:

You can perform the collaborative scheduling

You can minimize the scheduling conflicts

Easy to track management insight

Increase efficiency

Keep your staff updated

Track of time and attendance

3) Managers use information systems to help them make decisions that will improve their businesses. What three levels of information do managers need to make these decisions? Provide one example of how information systems can provide this data. (2 points)

Answers

The three levels of information do managers need to make these decisions are Strategic information, Tactical information,  Operational information. An example of an information system to provide data is a transaction processing system.

What is an information system?

An information system is a socio-technology and an organizational system that collect, organize, and provide and distribute data.

Thus, the three levels of information do managers need to make these decisions are Strategic information, Tactical information,  Operational information. An example of an information system to provide data is a transaction processing system.

Learn more about information system

https://brainly.com/question/13299592

#SPJ1

Distinguish clearly between displayed and printed output and support your answer with two (2) limitation each

Answers

Answer:

refer to the above attachment!

What type of scripts can tap in to your mobile device’s GPS location, which can then be used in a game?
geo-location scripts
geo-level scripts
heightmap scripts
evasion vector scripts

Answers

Answer:

geo-location scripts

Explanation:

see above

fast i need now ill give anything
Why is compressed air energy storage considered to be very useful?
A. because it allows people to use the resource at the exact time they need it
B. because it uses outside electricity to change the speed of the flywheel
C. because it stores electricity as rotational energy
D. because the vacuum chamber reduces friction and minimizes energy loss

Answers

Answer:A

Explanation:

Because compressed air energy storage (CAES) is known to have strong potential to deliver high performance energy storage at large scales for relatively low costs compared with any other solution.

Answer: A. because it allows people to use the resource at the exact time they need it

Explanation:

organizational behavioural aspects

Answers

Answer:

Organizational behavior aspects are the points of view represented by external environments, including people and technology. We can make improvements to our physical aspects by using this particular aspect to understand how everyday elements interact with one another.

Name the folder inside which the folder "first term' and second term' are located.​

Answers

Answer:

............................................

a) In order to execute a program, instructions must be transferred from memory along a bus to the CPU. If the bus has 8 data lines, at most one 8 bit byte can be transferred at a time. How many memory accesses would be needed in this case to transfer a 32 bit instruction from memory to the CPU? ​

Answers

Answer: 4 memory accesses

.........We should now focus on the 8 bit byte and how many can it transfer at a time. Notice how I bolded that word so we no know that we should fivide the 32 bit instruction divided by the 8 bit byte which would be 4 memory acesses

which are characteristics of digital video?

Answers

Answer:

Digital Camera-based System.

External ADC System.

Video Frame Grabber Card-based System.

Explanation:

why we use cluster computing and hadoop framework for big data sysetm​

Answers

Answer:

Explanation:

Hadoop clusters can boost the processing speed of many big data analytics jobs, given their ability to break down large computational tasks into smaller tasks that can be run in a parallel, distributed fashion.

PLEASE HELP!!
Read the following characteristic:
Programmers will write code and have objects interact and perform actions.
How would you classify it?

A disadvantage of object-oriented programming
A purpose of object-oriented programming
A result of procedural programming
An aspect of procedural programming

Answers

Based on the above, I will classify it as purpose of object-oriented programming.

What is this programming about?

The  object-oriented programming (OOP) is known to be where the programmer thinks in regards to the objects instead of the functions.

Note that Objects are said to be defined here via the use of a class and are known to be parts of the program that can does certain actions and interact with one another.

Therefore, Based on the above, I will classify it as purpose of object-oriented programming.

Learn more about Programmers from

https://brainly.com/question/23275071

#SPJ1

Java calculate average three numbers two decimal points

Answers

Answer:

Write a Java program to calculate the average of 3 numbers. Sum = num1 + num2 + num3. Then we calculated the average value as avg = sum / 3.

Explanation:

Other Questions
The midpoint of AB = ([?], [])M = (x+x, 2)PLS HELP I WILL MARK BRAINLIEST Nine-year-old Desi is in the _____ stage of cognitive development whereas her 15-year-old brother is likely in the _____ stage. Group of answer choices preoperational; concrete operations concrete operations; formal operations sensorimotor; preoperational formal operations; sensorimotor a boat leaves at 4:25 a.m. and returns to port at 10:55a.m. How long was the boat out? Indicate in standard form the equation of the line passing through the given points, writing the answer in the equation box below. M(0,6), N(6,0) To see why no one noticed time dilation until the twentieth century, consider the time dilation of a clock in an automobile moving past you at 30m / s (about 67mph for reference). What happens when you try to compute gamma for this problem? Write out the steps you take.(PLLS)!!! Below are works-cited entries for an Internet source. Select the one that is completely correct.Entry A:Creed, Abby. "Elementary Art Projects." Education Source, 23 Feb. 2011, www.educationsource.org/elementary-art-projects.html.Entry B:Creed, Abby. Elementary Art Projects. Education Source. Feb. 23, 2011. www.educationsource.org/elementary-art-projects.htmlEntry C:"Elementary Art Projects," by Abby Creed. www.educationsource.org/elementary-art-projects.html. 23 Feb. 2011.Entry D:Creed, Abby. Education Source. "Elementary Art Projects." 23 Feb. 2011. Web page: www.educationsource.org/elementary-art-projects.html What impact do you hope to have on the world and how will STEM play a role in making that impact, Essay pls help need ASAPPPP WILL MARK BRAINLIEST Why did the U.S enter the world war 2 Species evolve useing what process A evolutionB natural selection C acquired characteristics D surprise Benjamin finds some nickels and quarters under the couch cushions. How manycoins does he have if he has 8 nickels and 12 quarters? How many coins does he haveif he has a nickels and y quarters? Type the missing numbers.+-100 -80Submit-40 -20206080 which of the following is an important part of a reflective essay? Cameron purchased an electric guitar for 1,875. The value of the guitar depreciates by 20% each year. In how many years Will the guitar be valued at $768? Abrianna sold 20, 23, 18, 4, 17, 21, 15, and 56 boxes of cookies after different football games. Which data value(s) are outliers? Select all that apply. The interval or amount of space youleave between your car and the carahead is known asO GapNormalO Interval DistanceFollowing Distance A chandelier is suspended from the ceiling by two chains. one chain is 46cm long and forms an angle of 60o with the ceiling. the other chain 64cm long. what angle does the longer chain make with the ceiling? Which phrase best completes the graphic organizer? A. World War I ended because: B. The United States entered World War I because: C. Russia withdrew from World War I because: D. World War I began because: At a certain college, 49% of the students are female, and 21% of the students major in civil engineering. Furthermore, 8% of the students both are female and major in civil engineering. how did life begin?are we alone in the universe? why are cigarettes and alcoholic beverages considered gateway drugs