1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
9

An online game is played with two dice, explain why decomposition will be used in creating the algorithm for the game?

Computers and Technology
2 answers:
8090 [49]3 years ago
8 0

I think he means why decomposition is used is used in the game


wolverine [178]3 years ago
5 0
Decomposition will be used so you can break down the game into smaller and more manageable parts.
You might be interested in
In animation what is exaggerated to make the characters more intensely what they are​
aleksklad [387]

Answer:

Exaggerated used of the technique can produce a comical effect, while more realistic animation must time the actions exactly to produce a convincing result. Slow in and slow out. Adds more frames near the beginning and near the end of a movement, and fewer in the middle, to make the animation appear more realistic.

5 0
3 years ago
An example of a current disruptive technology is a?
guapka [62]
Smart Watches are taking over normal watches. They are getting WAYYY cheaper. There is one for about $14
6 0
3 years ago
Read 2 more answers
Please create a brute force password cracker using python
serg [7]

Answer:

0

2

I need to make small programs for school to brute force crack different types of passwords; I'm looking to create a brute force python code that will run through every possible combination of alphabetical and alphanumerical passwords and give me the password and the amount of time it took to crack.

I did the same with purely numerical passwords and got this:

import datetime as dt

Password4 = 123456

def crack_password():

   start = dt.datetime.now()

   for n in range(1000000):

       password_guess = '{0:04d}'.format(n)

            if password_guess == str(Password4):

               end = dt.datetime.now()

               print("Password found: {} in {}".format(password_guess, end - start))

              break

   guesses = crack_password()

I then tried to do something somewhat similar for alphabet/alphanumerical passwords but did not work whatever I tried:

   import random

   letters = [str(i) for i in range('a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p')]

   s = [''.join([a,b,c,d,e,f,g,h]) for a in letters for b in letters for c   in letters for d in letters for e in letters for f in letters for g in letters  for h in letters]

   random.shuffle(s)

   real_password = 'aaaaaaaa'

   i = 0

Explanation:

8 0
3 years ago
Clearly explain with five differences between high level programming language, interpreted language and a machine language.
Anna11 [10]

Answer:

Execution Time, Memory storage,Readiability,

debugging,Platform independent

Explanation:

High level programming languages are the language which is user friendly languages. There is high level abstraction from internal machine code. Here we need compiler to translate that into machine code

Ex: C,c++,Java...

Interpreted languages are scripting languages where we need interpreter to interpret those scripts or commands

Ex:Python.Ruby

Machine languages are binary language which contains 0's and 1's can understandable by system only. Not human readable forma

Interpreted language scans each statement at a time and interprets that line by line. It takes less amount of time to analyze the source code but the overall execution time is slower.

High level language takes more memory than interpreted and machine as it generates some intermediate code

High level languages are more readable than remaining two

Intermediate languages are easy to debug as it executes line by line and when ever any error occurs in a particular line it stops and intimate there itself

High level and interpreted languages are platform dependent, it can work on some machine and OS specific configurations only

7 0
3 years ago
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
3 years ago
Other questions:
  • What is authentication?
    8·1 answer
  • Find the 65th percentile from the data. The data consist of class interval from 0-10, 10-20, 20-30, 30-40, 40-50, 50-60 and freq
    8·1 answer
  • An administrator needs to make sure that video conferencing is allocated a high portion of bandwidth within a company network. W
    11·1 answer
  • Low-end CRM systems are designed for companies like Boeing because they only have a few, large customers.
    11·1 answer
  • . What type of computer implementation does the following code represent? Load A,10 Load B,1:5 Add A,B STORE A, [20]
    5·1 answer
  • Using Microsoft Word, write a 250-word essay on the fading of home telephone use with the advent of recent technology, and share
    14·1 answer
  • select the correct answer from each drop-down menu. “To clean a computer screen, use ___. To clean a keyboard, use a ___.”
    7·1 answer
  • A tool that helps teachers conduct online classes​
    8·1 answer
  • PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?
    6·1 answer
  • True or False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!