a game developer is working on a basketball playing game. this incomplete code segment simulates a player taking a shot:

Answers

Answer 1

The option that can replace   <MISSING CONDITION> so that the code works as  intended is -

RANDOM (1, 100) ← 40

RANDOM(1, 5) → 2

What is a condition in programming ?

In programming,a condition   refers to a logical statement that evaluates to either true or false.It is used to make   decisions and control the flow of aprogram.

Conditions are   often created using comparison operators (e.g., equal to, greater than, less than) and logical operators (e.g., AND, OR, NOT).

Conditional statements, such as if-else and switch statements,allow the program to execute   different blocks of code based on the evaluation of conditions.

Learn more about code at:

https://brainly.com/question/28338824

#SPJ4

Full Question:

Although part of your question is missing, you might be referring to this full question:

A game developer is working on a basketball playing game.

This incomplete code segment simulates a player attempting a 3-pointer shot:

shotMade ← false

IF (<MISSING CONDITION>)

{

shotMade ← true

score ← score + 3

DISPLAY("Score!")

}

ELSE

{

DISPLAY("Miss!")

}

The code should give the player a 40% chance of making the shot.

Which of these can replace <MISSING CONDITION> so that the code works as intended?


Related Questions

State whether the given statement is True/False. Arguments are the input values to functions upon which calculations are performed.

Answers

false i think just saying

Argue whether we can infer anything about a candidate's ability to work in a professional environment based on his or her resume's formatting. Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.

Answers

Answer:

Candidates resume shows his way of presenting and organizing.

Explanation:

Resume formatting is an important part of a candidate's ability to work. In any professional environment, it's necessary to have a properly formatted resume.  The resume formatting should be up to date with the latest information and data. The formatting involves the borders, headings, grammar, and spelling or typo errors, etc.  But these mistakes can be easily avoided such as proofreading and removing unnecessary details and sloppy fronts.

What type security attack attempts to trick you into disclosing your passwords uses social engineering methods and demands you take immediate action or you will have a major penalty.

Answers

This method of getting you to share personal information is known as “vishing,” or voice phishing.

The most familiar form of social engineering attack is phishing. Phishing attacks manipulate human error to harvest credentials or spread malware,

Which type of attack is a form of social engineering?The attack may try to trick an worker into revealing data, such as their user name and password, or supplying the attacker with additional entry. Common examples of social engineering attacks include the following: Impersonating an employee to the IT Help Desk to change his or her password.Phishing. The most familiar form of social engineering attack is phishing. Phishing attacks manipulate human error to harvest credentials or spread malware, usually through contaminated email attachments or links to malicious websites.A social engineering attack is when a web user is fooled into doing something unsafe online. There are different kinds of social engineering attacks: Phishing: The site tricks users into revealing their personal information (for example, passwords, phone numbers, or social security numbers).

To learn more about : Social engineering attacks

Ref : https://brainly.com/question/10816181

#SPJ4

the drive: FIGURE 7-28 Synchrono belt drive for Example Problem 7-3 20pts) Looking at figure 7-28 the following is known about this new system. The driver sprocket is a P24-8MGT-30 and is attached to a Synchronous AC Motor with a nominal RPM of 1750rpm. The driven sprocket should turn about 850RPM and is attached to a Boring Mill that will run about 12 hours per day. The sprocket should have a center distance as close to 20" without going over. a. What sprocket should be used for the driver sprocket 2 b. What is a the number of teeth and pitch diameter of both sprockets What is the RPM of the driven sprocket

Answers

The RPM of the driven sprocket is calculated as 10.4kp. RPM stands for reels per nanosecond and is also shortened rpm. The cycle of the RPM is calculated as 174.9.

The calculations are attached in the image below:

This is a unit which describes how numerous times an object completes a cycle in a nanosecond. This cycle can be anything, the pistons in a internal combustion machine repeating their stir or a wind turbine spinning formerly all the way around.

Utmost wind turbines try to spin at about 15 RPM, and gearing is used to keep it at that speed. Gearing is also used with the crankshaft of a vehicle in order to keep the RPM reading in a range( generally 2000- 3000 RPM). Some racing motorcycles will reach further than 20,000 RPM.

Learn more about RPM cycle here:

https://brainly.com/question/32815240

#SPJ4

the drive: FIGURE 7-28 Synchrono belt drive for Example Problem 7-3 20pts) Looking at figure 7-28 the

how can you turn on a light switch and it not work, without turning off the power to the whole house?

Answers

Answer:

Go to the beaker box and turn off the power to that one room. Duh

Explanation:

A10:A20 Refer to values in


Cell A10 and cell A20


The cell in column A and row 10


The range of cells in column A and rows 10 through 20


The range of cells in row 15 and columns B through #

Answers

Im trying to solve this problem

A10:A20 Refer to values in The range of cells in column A and rows 10 through 20. Thus the correct option is C.


What is a cell in excel?

The rectangles that make up an Excel worksheet's grid are called cells. A worksheet's references, the column letter, and the row number that intersect at the cell's location serve as a means of identifying each cell.

A, B, and C serve as column numbers, whereas digits serve as row identifiers (1, 2, 3). Depending on the column and row, each cell has a unique name or cell address.

In the given case, the values of A10:A20  is being asked which indicates that In column A the range of cell 10 to 20 is written as A10: A20.In other words, the cell is written as intersection Column  D to Row 5 the cells will be D5.

Therefore, option C is appropriate.

Learn more about Excel, here:

https://brainly.com/question/1380185

#SPJ6

In keyboarding there are 2 sides to a keyboard
True or false

Answers

Answer:

true

Explanation:

True, also know this because the your four fingers are supposed to line up one ASDF and JKL; and your thumbs on the Spacebar

. suppose that the roundtrip delay between sender and receiver is constant and known to the sender. would a timer still be necessary in protocol rdt 3.0, assuming that packets can be lost? explain.

Answers

Yes, a timer would still be necessary in protocol rdt 3.0 even if the roundtrip delay between sender and receiver is constant and known to the sender.

This is because packets can still be lost in transit due to various reasons such as network congestion, hardware failures, or interference. The purpose of the timer in rdt 3.0 is to ensure that the sender retransmits the packet if it does not receive an acknowledgment (ACK) from the receiver within a certain time period. This helps to ensure that the packet is successfully delivered to the receiver even if it was lost in transit. Even though the roundtrip delay is constant and known, the packet may still be lost in transit due to network congestion or other factors.

In summary, the timer is necessary to ensure that the packet is retransmitted in case of such an event. This helps to improve the reliability of the communication between the sender and receiver, which is a key objective of rdt 3.0.

To learn more about Roundtrip Delay :

https://brainly.com/question/27217941

#SPJ11

Using a single 8-bit adder, add extra logic to create a circuit that outputs the absolute value of an 8-bit 2 's complement input X. For example, if X =−112
10

, the output should show 112
10

. The 8 -bit adder has the following ports: A
7

,A
0

,B
7

..B
0

,C
in

to the LSB stage, S7.. S
0

,C
0ut

from the MSB stage. Show the block diagram with the 8-bit adder as a black-box.

Answers

If the MSB of X is 0 (indicating a positive number), the outputs S0 to S7 also represent the absolute value of X.

To create a circuit that outputs the absolute value of an 8-bit 2's complement input using a single 8-bit adder, you can follow these steps:

1. Take the 8-bit 2's complement input, X, and pass it through the 8-bit adder as A0 to A7 inputs.
2. Set the B inputs of the adder to a constant value of 0.
3. Connect the C_in input of the adder to a constant value of 1, which represents a carry-in of 1 to the least significant bit (LSB) stage.
4. The S0 to S7 outputs of the adder will give you the sum of X and 0.
5. The C_out output of the adder will indicate whether there is a carry-out from the most significant bit (MSB) stage.
6. Take the outputs S0 to S7 and pass them through some additional logic to generate the absolute value of X.
7. If the MSB of X is 1 (indicating a negative number), and there is a carry-out from the MSB stage (C_out = 1), invert the outputs S0 to S7 using a bitwise NOT operation. This will give you the two's complement of X.
8. If the MSB of X is 1 (indicating a negative number) and there is no carry-out from the MSB stage (C_out = 0), then the outputs S0 to S7 already represent the absolute value of X.
9. If the MSB of X is 0 (indicating a positive number), the outputs S0 to S7 also represent the absolute value of X.

Here is a simplified block diagram of the circuit:

```
           +-------+
X --------> |       |
         A | 8-bit |
0 --------> | Adder | ------------> Absolute Value
         B |       |
7 --------> |       |
           +-------+
```

To know more about complement input, visit:

https://brainly.com/question/33340174

#SPJ11

If bPtr is assigned b (the name of an array), then array element b[5] can alternatively be referenced with the pointer expression a) bPtr + 5 b) *b [bPtr + 5] c) b[bPtr + 5] d) *( bPtr + 5)

Answers

Answer: d) *(bPtr + 3)

question: If bPtr is assigned b (the name of an array), then array element b[5] can alternatively be referenced with the pointer expression a) bPtr + 5 b) *b [bPtr + 5] c) b[bPtr + 5] d) *( bPtr + 5)

The correct pointer expression to reference array element b[5] if bPtr is assigned b is d) *(bPtr + 5).

This is because the expression *(bPtr + 5) dereferences the memory address that is 5 positions after the memory address pointed to by bPtr, which corresponds to the sixth element in the array. Option a) adds 5 to the memory address of the array and does not dereference it, so it does not correctly reference the element. Option b) attempts to dereference the value of the sixth element in the array, which is not a memory address and will result in an error. Option c) adds 5 to the memory address of the array and correctly references the sixth element, but it does not use the pointer expression syntax requested in the question.

Therefore, the correct option is D.

To know more about Memory address, click here:

https://brainly.com/question/17596768

#SPPJ11

Match the pictures with the type of camera angle the photographer used in each of them.​

Match the pictures with the type of camera angle the photographer used in each of them.

Answers

Answer:

Check pdf

Explanation:

Which of the following is a country that cruise ships commonly sail under the flag of?
O United States
O Canada
O Panama
O South Africa
< Previous

Answers

Answer:

Panama

hope this helps!

A significant part of your marketing plan should allocate resources to online advertising.

True


False

Answers

The statement "a significant part of your marketing plan should allocate resources to online advertising" is definitely true.

What is Online advertising?

Online advertising may be defined as a type of marketing strategy that significantly involves the utilization of the Internet as a medium in order to obtain website traffic and target.

The process of online advertising may typically include banner ads, search engine results pages, social networking ads, email spam, online classified ads, pop-ups, contextual ads, and spyware.

The purpose of a marketing strategy is to maximize the influence of advertising either via online medium or offline versions. The basic intention of this is to promote the marketing of the product to their customers.

Therefore, the statement "a significant part of your marketing plan should allocate resources to online advertising" is definitely true.

To learn more about the Purpose of advertising, refer to the link:

https://brainly.com/question/1658517

#SPJ1

_3__ Include a knowledge based with accumulated experience and a set of rules for aplying the knowledge base to each particular situation. __4__ A subset of Artificial Intelligence that users algorithms to learn iteratively from data and can find insigths without explicit programming. __2__ analyze large quantitied of information to establish patterns and charceristicwd when the logic or rules are unknown. __1__ Mimic evolutionary precesses to generate increasingly better solutions to a problem. Mutation within a genetic algorithm involve randomly trying combinations and evaluating success (or failure) in order to learn to optimize outcomes. __5__ A subset of Machine Learnign that referst to artificial neural networks that are composed of many layers.

Answers

Answer:

d:

Explanation

how can you detect if your gradient descent algorithm is in a local minimum and not the global minimum?

Answers

One way to detect if your gradient descent algorithm is in a local minimum and not the global minimum is to run the algorithm multiple times with different initializations and check if it converges to the same minimum every time.

If the algorithm consistently converges to the same minimum, it is likely a global minimum. However, if it converges to different minima, it may be stuck in a local minimum.To ensure that the algorithm has indeed found the global minimum, a good approach is to use a grid search or random search for hyperparameters or to use a different optimization algorithm such as simulated annealing or genetic algorithms that are less prone to getting stuck in local minima. Another approach is to use a more sophisticated variant of gradient descent such as stochastic gradient descent, which uses random sampling to escape from local minima.

Learn more about  gradient descent algorithm:https://brainly.com/question/29244713

#SPJ11

what tv show inspired the term spam for junk email?

Answers

Answer:

a 1970s monty python's flying circus TV sketch

you are one developer on a team of several developers. the team is responsible for a large web application that uses spring framework. your task is to

Answers

If I'm a developer on a team of several developers and the team is responsible for a large web application that uses spring framework. Then my task will be - Input Validation: secure input and representations, Code Error : Secure error handling, Code Quality : Secure coding practices, Encapsulation: secure data structure.

What is Web Application?

Any web browser can be used to access a web application, which is software or a program. Typically, its frontend is developed using one of the major browsers' supported languages, such as HTML, CSS, or Javascript. While any programming stack, including LAMP, MEAN, etc., could be used in the backend. There is no specific SDK for creating web applications, unlike mobile apps.

With the emergence of the Software as a Service (SaaS) movement, web applications gained popularity.

To know more about Web Application, visit: https://brainly.com/question/13057128

#SPJ4

internet explorer is not the only browser available, and many users prefer others such as mozilla firefox (mozilla.org) or chrome (). go to the website and download and install chrome. use it to browse the web. how does it compare with internet explorer? what do you like better about it? what do you not like as well? when might you recommend that someone use chrome rather than internet explorer? what security features does chrome offer? what are the steps to import your favorites list from internet explorer into chrome?

Answers

Chrome is a popular browser with many users preferring it over Internet Explorer. It offers a different user interface and faster browsing speed.

Chrome has a sleek, minimalist design, making it easy to navigate. Its speed is significantly faster than Internet Explorer, making browsing the web a smoother experience. Chrome also offers built-in security features such as sandboxing and automatic updates, which makes it a safer option. However, some users may not like the way it handles tabs and find it less customizable than Internet Explorer. It is recommended to use Chrome for faster browsing and better security. To import favorites from Internet Explorer into Chrome, first, open Chrome and click on the three dots in the upper-right corner. Then, click on "Bookmarks" followed by "Import bookmarks and settings." From the drop-down menu, select "Microsoft Internet Explorer" and click "Import." Finally, click "Done" to complete the process.

Learn more about browser here;

https://brainly.com/question/28504444

#SPJ11

What steps are needed for word to create an index

Answers

Answer:

Do this:

Position the insertion pointer where you want the index to appear. If you want the index to start on a new page, create a new page in Word. ...

Click the References tab.

In the Index group, click the Insert Index button. The Index dialog box appears. ...

Click the OK button to insert the index into your document.

Answer:

Position the insertion pointer where you want the index to appear.

(the insertion point is the point where the next characters typed from the keyboard will appear)

If you want the index to start on a new page, create a new page in the program you're using

Then you click the References tab.

In the Index group, click the Insert Index button.

When the Index dialog box appears, click the OK button to insert the index into your document.

Open the gallery10-1.js file and below the code that creates and populates the captions array, declare the htmlCode variable, setting its initial value to an empty text string.

Create a for loop with a counter variable i that goes from 0 to 13 in increments of 1. Each time through the for loop, add the following code to the value of the htmlCode variable:



caption_i

where i is the value of the counter variable and caption_i is the value from the captions array with index number i.

After the for loop, change the inner HTML of the document element by the ID gallery to the value of the htmlCode variable.

Answers

The code has been written in CSS as is done in the space below

How to write the code

// Code that creates and populates the captions array

var captions = ["Caption 1", "Caption 2", "Caption 3", "Caption 4", "Caption 5", "Caption 6", "Caption 7", "Caption 8", "Caption 9", "Caption 10", "Caption 11", "Caption 12", "Caption 13", "Caption 14"];

// Declare htmlCode variable and initialize it to an empty string

var htmlCode = "";

// Create a for loop to generate HTML code for each caption

for (var i = 0; i < 14; i++) {

 htmlCode += "<div class='captionStyle'>" + captions[i] + "</div>";

}

// Set the innerHTML of the gallery element to the generated HTML code

document.getElementById("gallery").innerHTML = htmlCode;

In this code, we create a for loop that iterates over the captions array and generates HTML code for each caption using the current index of the array. The generated code is appended to the htmlCode variable at each iteration of the loop. Finally, the innerHTML of the gallery element is set to the generated HTML code.

Read more on CSS code here:https://brainly.com/question/30166021

#SPJ1

Justify the following statement: " Diversity should exist in the workplace."

Answers

Answer:

Explanation:

Diversity should exist in the workplace because if everyone working together had the exact same views, there wouldn't be any growth and learning of new ways to expand ideas.

Answer:

Diversity should exist in the workplace because if everyone working together had the exact same views, there wouldn't be any growth and learning of new ways to expand ideas.

Explanation:

e d g e

The great Debators movie

The great Debators movie

Answers

Answer:

Mr. Tolson was a teacher at Wiley College and the head debate coach. He was very passionate about his students and debate. In the movie, The Great Debaters, Mr. Tolson was portrayed as a tough but loving teacher. He pushed his students to be the best they could be and believed in them even when they didn't believe in themselves.

Consider the following code:
x=9 y = -2 z=2
print (x + y * z)
What is output?

Answers

Answer:

14

Explanation: The reason why is because adding a negative is pretty much subtracting by 2. 9-2=7. Then multiply 7 by 2 like add 7 to 7 and you get 14.

How are computers classified into different types? Explain ​

Answers

Computers differ based on their data processing abilities. They are classified according to purpose, data handling, and functionality. ... According to data handling, computers are analog, digital, or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

A _____ printer heats specially coated paper to produce an image. A. Thermal, B. Charging Mat, C. Blu-Ray, D. Assistive

Answers

Answer:

Explanation:

A thermal printer is a type of printer that uses heat to produce an image on specially coated paper.

A thermal printer, as the name suggests, utilizes heat to create an image on paper. It consists of a printhead that contains tiny heating elements. When the printhead comes into contact with the specially coated thermal paper, the heated elements activate and produce a reaction in the coating. This reaction causes the coating to darken, forming the desired image or text.

Thermal printers are commonly used in applications where a fast and reliable printing method is required, such as in receipt printing for retail transactions or ticket printing in transportation systems. The heat-based process eliminates the need for ink or toner, making thermal printers low-maintenance and cost-effective for certain applications.

Learn more about applications click here:

https://brainly.in/question/12898994

#SPJ11

Consider the following code: x = 9 y = -2 z = 2 print (x + y * z) What is output? 9 13 14 5

Answers

Answer:

5

Explanation:

x = 9

y -2

x = 2

expression = (x + y * z)

Apply BODMAS rule.

= 9 + (-2 * 2)

= 9 + (-4)

= 9 - 4

= 5

Explain the terms Tags and Attributes.

Answers

Answer:

a tag is a way of representing an HTML element in the program, while an attribute is a way of describing the characteristics of an HTML element.

Explanation:

Answer:

A tag is a way of representing an HTML element in the program, while an attribute is a way of describing the characteristics of an HTML element.

According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that Group of answer choices can be maintained as required without affecting system availability, security, and integrity. is protected against unauthorized physical and logical access. is complete, accurate, and valid. is available for operation and use at times set forth by agreement.

Answers

According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that is complete, accurate, and valid, while also being protected against unauthorized physical and logical access.

The reliability principle of integrity, as defined by the Trust Services Framework, ensures that the data produced by a system is trustworthy and dependable. To achieve this, the data must possess certain qualities. Firstly, it should be complete, meaning that it includes all necessary information and is not missing any relevant components. Additionally, the data must be accurate, reflecting the true and correct values without any errors or inconsistencies. Lastly, the data must be valid, conforming to the defined rules and constraints, ensuring its reliability for decision-making and other purposes.

However, achieving integrity is not solely limited to the accuracy and completeness of the data. It also involves safeguarding the data against unauthorized access, both physically and logically. Physical access refers to the protection of the system and its data from physical breaches, such as unauthorized entry into a data center or theft of storage devices. Logical access, on the other hand, involves securing the data against unauthorized manipulation or retrieval through appropriate access controls, encryption, and other security measures.

By maintaining data integrity and protecting it against unauthorized access, organizations can ensure the reliability of their systems and the trustworthiness of the data they produce. This, in turn, contributes to the overall availability, security, and integrity of the system as a whole, meeting the requirements set forth by the Trust Services Framework.

Learn more about Trust Services Framework here:

https://brainly.com/question/32319417

#SPJ11

Tin học đã làm thay đổi công tác văn phòng ngày nay như thế nào?

Answers

Công nghệ đã thay đổi cách mọi người sử dụng để giao tiếp ở nơi làm việc hiện đại

You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discrepancies. This month, your email system error reports a large number of unsuccessful attempts to log on. Its apparent that the mail server is being targeted. Which type of attack is most likely occurring

Answers

Answer:

It seems as though it would be a DDoS attack.

Explanation:

The characteristics are as follows:

A slow down of operations and attempting to get access into said service.

Other Questions
tRNA MoleculesCodonsmRNAAsnIntroGlu(Asp)AnticodonsCytoplasmH.O Counter 13'RibosomeContinue to build the protein by joining amino acids to the chain in the correct order. Every amino acidjoined to the protein results in the production of one more water molecule. Click "Dehydrate" to form thepeptide bonds and watch the water molecule counter and be sure to record all data in your data table. which of the material labels gives an explicit clue that the material experienced cold-working prior to the stress-strain measurement? Which angles are corresponding angles The Hendricksons are in charge of bringing treats for 505050 football players. They brought 333 coolers of popsicles and 222 coolers of ice cream sandwiches. Each player is going to randomly select a cooler from which to get their treat What text structure is being used: (description, cause, and effect, problem and solution, sequence/chronological) "First, Goldilocks sat in the great big, Papa Bear chair, but it was too hard. Then, she sat in the medium-sized, Mama Bear chair, but it was too soft. Finally, she sat in the little, bitty, Baby Chair, and it was just right." Rob creates a Course_Details table that has four columns: Course _ID, Course_Name, Semester and Credits. A course may have 0. 5 credit if it is for 1 semester and 1 credit if it is for 2 semesters. Which field should Rob assign as a primary key in the table? Which of the following is the best description of when to use standard addition? A. Standard addition should be used when sample matrix in the measurement solution alters the analyte response when compared to analyte dissolved in pure solvent. B. Standard addition should be used when metal concentration in a sample is being determined. C. Standard addition should be used when a blank control cannot be produced as part of the calibration curve. D. Standard addition should be used when soil samples are being determined. E. Standard addition should be used when interferences in metal analyses alters the value of the response. What is the rda for iron in women under the age of 50? PLZ HELPWhat is the x-intercept of the graph y = 2x - 14?-14-707 Which Gilgamesh new English version is best? Why did Pullman's workers strike? What landforms are shared by the United States and Canada? a red ball has a mass of 290 g. a constant force pushes the red ball horizontally and launches it at a speed of 20 m/s. the same force pushes a green ball through the same distance, launching it at 25 m/s. what is the mass of the green ball? Quais so as praias da Costa Norte de So Sebastio Which of the following are considered injections to the expenditure stream in the circular flow model? a goverment spending b investment c exports d all of the above A trapezoid has of parallel sides Quand j'irai les parents de ma fiance a Paques, je .... parlerai de mon intention d'espouser Martine. which of the following branched chain amino acids form succinyl coa when catabolized? (more than one aswer)valine, leucine, and isoleucine What diagnostic workup of old woman with headache,jaw pain and occasional visual problem? According to Kant, how are the first version of the categorical imperative and the means-ends principle related to one another? Click or tap a choice to answer the question. a) The means-ends principle is different from categorical imperative. b) the categorical imperative is the same as the Golden Rule. c) The means-ends principle is a distinct idea from the categorical imperative. d) The means-ends principle is what justifies the categorical imperative. e) The means-ends principle is one version of the categorical imperative.