Answer:
Explanation:
int rounds = 0;
int wins = 0;
int losses = 0;
int draws = 0;
while (true) {
// Get the user's selection
System.out.println("Let's play RPSLR!");
System.out.println("1. Rock");
System.out.println("2. Paper");
System.out.println("3. Scissors");
System.out.println("4. Lizard");
System.out.println("5. Spock");
System.out.print("What is your selection? ");
int userSelection = keyboard.nextInt();
// Get the computer's selection
int computerSelection = random.nextInt(5) + 1;
// Compare the user's selection to the computer's selection
if (userSelection == 1 && computerSelection == 3 ||
userSelection == 1 && computerSelection == 4 ||
userSelection == 2 && computerSelection == 1 ||
userSelection == 2 && computerSelection == 5 ||
userSelection == 3 && computerSelection == 2 ||
userSelection == 3 && computerSelection == 4 ||
userSelection == 4 && computerSelection == 2 ||
userSelection == 4 && computerSelection == 5 ||
userSelection == 5 && computerSelection == 1 ||
userSelection == 5 && computerSelection == 3) {
// User wins
System.out.println("The User has won.");
wins++;
} else if (userSelection == computerSelection) {
// Draw
System.out.println("It's a draw.");
draws++;
} else {
// Computer wins
System.out.println("The Computer has won.");
losses++;
}
// Ask if the player wants
When you install powerpoint, the default setting allows you to reverse up to the last ____ changes by tapping or clicking the undo button on the quick access toolbar.
When you install PowerPoint the default setting allows you to reverse up to the last 20 changes by tapping or clicking the Undo button on the Quick Access Toolbar.
What is Quick Access Toolbar?
The Quick Access Toolbar is a handy spot to add your favorite commands because they will always be visible regardless of where you are on the Ribbon. However, not everyone is aware of another justification for using it: There is a keyboard shortcut for each command in the Quick Access Toolbar, putting them all at your fingertips.
The QAT is completely adaptable, and users can add or remove a command right from the toolbar. A predefined list of instructions, including "New," "Open," "Save," "Print," "Print Preview," "Send In Email," "Undo," and "Redo," is displayed when the QAT drop-down arrow is clicked. A check mark appears next to the name of each active command on a user's QAT.
Learn more about Powerpoint here:
https://brainly.com/question/10444759
#SPJ4
1) The four main ways marketers divide potential customers is by:
A) occupation, income, age, and interests.
B) demographics, psychographics, behavior, and geography.
C) location, race, educational background, and wealth.
D) political affiliation, musical interests, wealth, and location.
The four main ways marketers divide potential customers is by occupation, income, age, and interests.
What are potential customers?
A company’s potential customer is usually referred to as a prospect. It is a person who has the potential to be interested in the services and products that are offered by the company but has not yet purchased.
In that sense, he’s not a customer. The term potential customer is extremely vague, it can very well define a person who knows the company and who wants to buy one of their products.
For example, it could refer to a person who could potentially be interested, as they have a common characteristic with the majority of the company’s clients, for example, the practice of the same profession.
Therefore, The four main ways marketers divide potential customers is by occupation, income, age, and interests.
To learn more about potential customers, refer to the link:
https://brainly.com/question/988073
#SPJ6
Computational artifacts can include various forms of bias that result in the _____
of certain groups of people.
Answer:
Exclusion
Explanation:
Right on Egenuity
Answer:Below
Explanation:
Imagine that a company is having trouble assuring its bills are paid on time. An effective solution will
calculate all money owed to vendors, track the due date for payments, and issue payments to the five largest vendors to be received on time.
calculate the money due to the first half of the alphabet and immediately pay all money due to them in full.
calculate all money owed to vendors, track the due date for payments, and issue payments to all vendors to be received on time.
calculate the total amount due and immediately pay the largest amounts.
calculate all money owed to vendors, track the due date for payments, and issue payments to all vendors to be received on time.
Answer: C
Explanation: calculate all money owed to vendors, track the due date for payments, and issue payments to all vendors to be received on time.
When creating envelopes, how will you adjust the layout?
A.
clicking the Insert menu
B.
clicking the Edit button
C.
clicking the Format tab
D.
clicking the Setup button
E.
clicking the Print button
Answer:
D
Explanation:
All markup languages follow web programming standards. These standards are defined by the
The World Wide Web Consortium is the primary entity in charge of developing and upholding web standards (W3C). Numerous standards, including the common markup languages we use to create webpages, have been established by the W3C.
Who sets the standards for web programming?The W3C is the most well-known organization for setting web standards, but there are others as well, including the WHATWG (which oversees the HTML language's living standards), ECMA (which publishes the standard for ECMAScript, on which JavaScript is based), Khronos (which publishes 3D graphics technologies like WebGL), and others. The preferred markup language for building Web pages is HTML. A Web page's structure is described in HTML. A number of elements make up HTML. The content's presentation in the browser is controlled by HTML elements. The labels "this is a heading," "this is a paragraph," "this is a link," etc., are provided by HTML elements.
To learn more about web programming refer to
https://brainly.com/question/27518456
#SPJ1
Computer programmers must be fluent in every programming language. (5 points)
O True
O False
Answer:
False, its true that they need to know some programming languages but they do not need to be fluent in all of them.
How is a procedure different than a function?
Answer: A procedure is used to perform certain task in order.
what is an indication that malicious code is running?
Answer:
If you are running Windows check task manager and see if any background process if running if there is a background process of command prompt or powershell, there is a chance that there is a backdoor running in your system, you can just right click and end the task it should just kick the hacker off the server.
please give brainliest
how do you code to find the surface area 6 s2, volume s3 in python
Answer: you code to find the surface area 6 s2, volume s3 in python
Explanation:if you dont code the surface area 6 s2, volume s3 in python then you cant code
o put a web page on the internet and make it accessible through the world wide web, we need to contact a(n
Answer:
The webpages on the Internet was for example gaming websites because it is accesible through the world wide web, we need to contact an computer administrator :))
Write a program code in the python programming language to find simple interest given the
formula SI = (P*R*T)/100.
Read P(Principal), R (Rate), T (Time) from the keyboard and Calculate Simple Interest (SI).
Answer:
p = float(input('Principal: '))
r = float(input('Rate: '))
t = float(input('Time: '))
si = (p * r * t) / 100
print(si)
The "float" before the input in the first 3 lines is so you're able to input decimals. If you're not using decimals, you can switch the "float" to "int". However, if you input a decimal number after you switched to int, you will receive an error
why do you think websites commonly require you to have at least 8 characters, and a mix of uppercase characters, lowercase characters, numbers, and symbols?
The reason why i think that websites commonly require you to have at least 8 characters, and a mix of uppercase characters, lowercase characters, numbers, and symbols is because the combination is one that is often difficult to guess if an attacker want to access your account.
Why do passwords need to be 8 characters?Setting a minimum password length of eight characters is one that tends to remove all three- to seven form of letter words and it is one that cannot be easily cracked passwords.
Therefore, The reason why i think that websites commonly require you to have at least 8 characters, and a mix of uppercase characters, lowercase characters, numbers, and symbols is because the combination is one that is often difficult to guess if an attacker want to access your account.
Learn more about websites from
https://brainly.com/question/17174600
#SPJ1
You are creating a story map about Mexico. After configuring the web app template, you launch the app to test it. When the app opens, the map is zoomed to the whole world, instead of to Mexico. What actions will fix the problem
what is full form COMPUTER????
Explanation:
The full form of the Computer is Common Operating Machine Purposely Used for Technological and Educational Research.
Explanation:
The computer full form of common opreating machine purposely used for technical educational research
I hope you helps:)
Angelina wants her text to look less crowded on the page, so she decides to decrease the length of the space the text occupies. How can she change her page presentation to create this effect?
Answer:
She can go to the Layout tab and then to the Page Setup command group to increase the margins of the page.
Explanation:
I just got it right.
Answer:
its B
Explanation:
i just did it
A(n) ____ lock will prevent any DDL operations from being performed on the locked table.
a shared
b exclusive
c partial
d partitioned
An exclusive lock will prevent any DDL operations from being performed on the locked table. When a table is locked with an exclusive lock, no other users can perform any operations on that table, including DDL operations such as altering the table's structure or dropping the table altogether.
This type of lock is useful in situations where a user needs to make significant changes to a table and wants to ensure that no other users are able to interfere with those changes. It is important to note that exclusive locks should be used sparingly and for short periods of time to avoid locking out other users for too long. In general, it is best practice to always release locks as soon as they are no longer needed.
To know more about DDL visit -
brainly.com/question/8442370
#SPJ11
2) To move the camera toward or away from an object is called:
A) Arc
B) Dolly
C) Pan
D) Tilt
Use logic gates to make the output
To get output B, either connect input B directly to output B, or use an OR gate where you connect one input to GND, because B OR 0 = B. To get C|D, connect C and D to inputs of an OR gate, and connect the output to C|D.
What is Gate?Gate in engineering is a device used to control and regulate the flow of electricity, liquids, gases, or particles. It is used to ensure that the desired flow of current, liquid, gas or particles is maintained safely and efficiently.
It's not possible to do it with the given gates only. If all four inputs were 0, you wouldn't be able to get a 1 from any combination of AND gates. You have to incorporate NOR gates.
Therefore, To get C|D, connect C and D to inputs of an OR gate, and connect the output to C|D.
Learn more about Gate on:
https://brainly.com/question/30192757
#SPJ1
please I want help on this question
I want the answer quickly because I have test
Answer:
RIGHT 90
PENDOWN
REPEAT 6
FORWARD 100
LEFT 60
END REPEAT
Explanation:
I hope this helps a little bit.
The protocol used to communicate network errors is known as __________.
Answer:
It is know as the ICMP, which means Internet Control Message Protocol, and is used to communicate errors back to the client
Explanation:
a laptop that you previously purchased was shipped with so-dimm memory to accommodate the laptop's form factor. you would now like to upgrade the memory.
The option to upgrade a laptop's memory is dependent on one major factor: The Purpose for which the laptop will be used.
What is the explanation for the above?Just like you'd need an SUV or tow truck to tow equipment or mobile home, and a tractor for agricultural purposes, laptops come with standard specs but with the flexibility to upgrade to accommodate the work requirements or tasks of its use.
Hence a gamer would require more RAM and processing power compared to someone whose job is writing and working with desktop publishing tools.
Hence, it is correct to state that the workload expected to be put on the laptop will determine if an upgrade to the Random Access Memory will be required.
Learn more about laptop memory:
https://brainly.com/question/28501534
#SPJ1
What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )
Answer:
c
Explanation:
send a copy of the messege
In both direct flooding attacks and ______ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable.
- ICMP attacks
- indirect flooding attacks
- SYN spoofing attacks
- system address spoofing
SYN spoofing attacks
Through line biomechanics concentration and observation magic if International Society of Biomechanics in sports.
What is "International Society of Biomechanics in sports"?The recently developed professional association in biomechanics is the "International Society of Biomechanics in sports".It is the professional association in bio-mechanics.
It is an international society which is dedicated to bio-mechanics to sports. The main purpose of the society is to understand and study the human movement and its relation to sport bio-mechanics. They provide information regarding bio-mechanics in sports.
Therefore, Through line biomechanics concentration and observation magic if International Society of Biomechanics in sports.
Learn more about biomechanics on:
https://brainly.com/question/13898117
#SPJ1
Tanya wants to include an instructional video with all its controls on her office website. The dimensions of the video are as follows: width=260, height=200. What code should tanya use to insert the video?
Answer:
Explanation:
In this scenario the two pieces of code that Tanya is missing would be controls and type. Controls adds the necessary video player controls while type signals what type of content will be playing. Therefore, the entire code snippet should be the following
<video width="320" height="240" controls>
<video src="file name.mp4" type="video/mp4">
</video>
Which statements serve as evidence that supports the theme of "The Story of the Fisherman
The statements that serve as evidence that supports the theme of "The Story of the Fisherman" are:
A. “I conjure you on your honour to tell me if you really were in that vase?”
B. “How could your whole body go in? I cannot believe it unless I see you do the thing.”
E. “‘No,’ answered the fisherman, ‘if I trust myself to you I am afraid you will treat me as a certain Greek king treated the physician Douban.’”
What is the story of the fisherman?The fisherman's tale is that there once was a fisherman who was so old and so indigent that he could hardly provide for his wife and three children. He set a rule not to throw his nets more than four times each day and left very early for fishing each day. He set out one morning during the full moon and arrived at the seashore.
The lesson does the tale of the fisherman and the fish teach us is that you are still better than nothing at all, no matter how small you are. A modest victory is more valuable than a huge promise.
Learn more about Story of the Fisherman from
https://brainly.com/question/28178281
#SPJ1
See full question below
Which statements serve as evidence that supports the theme of "The Story of the Fisherman"? Check all that apply. "I conjure you on your honour to tell me if you really were in that vase?" "How could your whole body go in? I cannot believe it unless I see you do the thing." "I rebelled against the king of the genii. To punish me, he shut me up in this vase of copper." "The fisherman was very unhappy. ‘What an unlucky man I am to have freed you! I implore you to spare my life.'" "‘No,' answered the fisherman, ‘if I trust myself to you I am afraid you will treat me as a certain Greek king treated the physician Douban.'"
What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?
The computer cannot ping 127. 0. 0. 1.
Windows displays a DHCP timeout message.
The computer receives an IP address that starts with 169. 254
The computer cannot ping other devices on the same network with IP addresses in the 169. 254. 0. 0/16 range
One indication that a Windows computer did not receive an IPv4 address from a DHCP server is when the computer receives an IP address that starts with 169.254.
In a DHCP environment, when a Windows computer successfully obtains an IP address from a DHCP server, it typically receives an IP address within a specific range defined by the DHCP server. However, if the computer fails to receive a valid IP address from the DHCP server, it falls back to Automatic Private IP Addressing (APIPA). The APIPA feature assigns an IP address in the 169.254.0.0/16 range to the computer.
Receiving an IP address in the 169.254 range is an indication that the computer was unable to obtain a proper IP address from the DHCP server. This can occur if there is an issue with the DHCP server, network connectivity, or configuration settings. It implies that the computer will not be able to communicate with other devices on the same network since it is assigned an IP address that is incompatible with the network's addressing scheme.
Learn more about IP addresses here:
brainly.com/question/16011753
#SPJ11
How to execute python code in command prompt *window*?
Iam using sublime text 3 and want to execute my python code in command prompt.
This is my current build system:
{
"cmd": ["python", "$file"],
"selector": "source.python",
"file_regex": "^\\s*File \"(...*?)\", line ([0-9]*)"
}
But I want my program to open in command prompt window and show the result there. I dont want to see the result in sublime text. Please help.
Answer:
Open Command Prompt and type “python” and hit enter. You will see a python version and now you can run your program there
Question #1
Describe the issues regarding controlled airspace and minimum safe altitudes that affects an airborne pilot's decision-making.
Question #2
Describe how basic weather conditions such as wind, temperature, and precipitation will
affect a drone’s flight.
Question #3
Explain the role of the “Pilot-in-Command” and the “Remote-Pilot-in-Command.”
Question #4
Explain how a quadcopter maintains balanced flight while hovering.
Question #4
Explain how a quadcopter differs from an airplane to accomplish the maneuvers of pitch, roll, and yaw.
Answer:
1) Separation
2) Weather impacts on the ability to fly a drone
3) The Pilot-in-Command is in charge of a manned aircraft
The Remote-Pilot-in-Command is in charge of an unmanned aircraft
4) With the aid of a flight controller
5) A quadcopter is controlled by adjusting the rotor speeds
An airplane is controlled by adjusting the ailerons, elevator and rudder
Explanation:
1) Separation
Issues regarding controlled airspace and minimum safe altitudes that affects an airborne pilot's decision-making is called separation related issues
The concept of separation pertains to ensuring that an aircraft stays outside the minimum distance from other aircraft, obstacles or controlled airspace
Vertical Separation
The allowable vertical separation distance between two aircraft from the ground surface up to 29000 feet is 300 meters
The allowable vertical separation distance between two aircraft above 29000 feet is 600 meters
Horizontal separation
Horizontal separation are required for two aircraft that are closer to each other than the allowable minimum vertical separation. Horizontal separation includes, procedural separation, longitudinal separation, radar separation and reduced separation
2)
Wind
When the wind speed is high, it limits the drone's ability to maintain its position drifting the aircraft to undesired direction of flight
Temperature
High temperatures causes the the drone's motor to work harder generating more lift force which lead to shorter flight times
Cold temperatures reduces the battery efficiency and can also lower the battery voltage below the critical voltage.
Precipitation
A drone's is not waterproof and flying a drone i the rain can damage the equipment
Flying a drone in the rain increases the difficulty in its operation especially in drones that makes use of cameras for their flight stability
Rainy conditions reduces the strength and control of remote controllers
There is reduced visibility of flight during rainfall
3) In an aircraft, the Pilot-in-Command (PIC) is the pilot primarily responsible for the safety and operation of the aircraft during flight
The Remote-Pilot-in-Command has the primary responsibility and authority for the operation of a remotely operated (small) aircraft system
4) A quadcopter maintains balanced flight by the information sent to control the direction of the propeller and the orientation as well as the speed of the rotor controlled by flight controller through the electronic speed control circuit (ESC) to control the thrust, revolutions per minute (RPM) and the direction of the quadcopter
5) Pitch in a quadcopter is achieved by tilting to move forward
In an airoplane the pitch is controlled by the elevators
Roll in a quadcopter is achieved by increasing the rotation of the rotors on the one side and decreasing the rotor speed on the other side
Roll in an airplane is achieved by adjusting ailerons
Yaw in a quadcopter is the spin achieved by reducing the speed of the front rotor on the side opposite to the direction of the intended spin motion
Yaw in an airplane is achieved by adjusting the ruder and ailerons to turn the plane
What are the most common malware types? How do you safeguard computer systems against malware? Why do you need to train users of computer systems to be vigilant about malware? What are some of the most recent malware attacks that you read or herd about in the news media?
Common Malware Types:
· Viruses
· Worms
· Trojans
· Ransomware
· Spyware
· Adware
Protections From Malware:
· Firewall Software
· Anti-Virus Software