1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
3 years ago
12

A poker hand consists of 5 cards drawn at random without replacement from a 52 card deck. Using python and the cards data frame

you imported, draw a poker hand by sampling from the cards and displaying the resulting sample.
Computers and Technology
1 answer:
PSYCHO15rus [73]3 years ago
5 0

Answer:

# Python program to shuffle a deck of card

# importing modules

import itertools, random

# make a deck of cards

deck = list(itertools.product(range(1,14),['Spade','Heart','Diamond','Club']))

# shuffle the cards

random.shuffle(deck)

# draw five cards

print("You got:")

for i in range(5):

  print(deck[i][0], "of", deck[i][1])

Output

You got:

5 of Heart

1 of Heart

8 of Spade

12 of Spade

4 of Spade

Explanation:

You might be interested in
Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum
jekas [21]

Answer:

A. Recovery time objective (RTO)

Explanation:

The recovery time is defined as the maximum length of time require to recover a system or any network from the failure.

Hence, to determine the recovery time of the function, one can use the RTO.

7 0
3 years ago
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two syst
irga5000 [103]

Answer:

Proxy Server                        

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
This assignment involves writing a program that models a dog. A dog has a name, a breed (which may be unknown), a gender (male o
Vinil7 [7]

Answer:

This is very complex for our users please shorten this question. Thank You

Explanation:

3 0
4 years ago
The transport layer must break messages from the application layer into several _____ that can be sent to the network layer
Pie

The transport layer must break messages received from the application layer into several <u>packets</u> that can be sent to the network layer.

<h3>The layers of the OSI model.</h3>

In Computer networking, there are seven main layers in the open systems interconnection (OSI) model and these include the following in a sequential order;

  • Physical Layer
  • Data link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

As a standard, it is a must that the transport layer break messages that are received from the application layer into several <u>packets</u> that can be sent to the network layer.

Read more on transport layer here: brainly.com/question/26177113

#SPJ12

8 0
2 years ago
What in the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless tech
dem82 [27]

Answer:

The ethernet protocol IEEE 802.3 is only meant for cable networks.

Explanation:

In this scenario, there are two types of networks, namely;

LAN and WLAN.

A LAN (local area network) is a network within a small area like a  building, i which its workstation are connected using cables. The cabled network instantly use a protocol called Ethernet also known as IEEE 802.3.

WLAN (wireless local area network) is a small area network just like the LAN, but the difference is that its workstation are connected wireless (without cable). wireless networks uses wifi or 802.11a/n/g to connect to the network.

So, the ethernet protocol represents the cabled network, Wifi represents the wireless network.

8 0
3 years ago
Other questions:
  • What are some pros and cons of being a Computer Hardware Engineer?
    15·1 answer
  • How do unstar another user
    14·1 answer
  • Convert the decimal number -12 to hexadecimal (2's complement)
    5·1 answer
  • The appropriate software to use for creating research papers is ________ software. Select one: A. presentation B. word processin
    15·1 answer
  • ______________ in SONET are analogous to the ________________ of T-carriers.
    7·1 answer
  • What is the Slide Sorter View used for?
    12·2 answers
  • A person is trying to remember a list of 12 different items:
    6·2 answers
  • Discuss data and its types from computer programming and data analysis prospectively?​
    9·1 answer
  • What is a word processing program? Give examples of word processing programs.
    10·1 answer
  • Discuss how a lack of infrastructure in poor communities could contribute to ill-health such as the Unrest looting.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!