1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
3 years ago
14

Can I major in gaming like not game design but like gaming where I can earn money

Computers and Technology
2 answers:
lozanna [386]3 years ago
7 0

Answer:

yes some companies offer jobs in testing games for them to help find glitches and such before they go onto the market

Marianna [84]3 years ago
3 0
Yes you can major in gaming
You might be interested in
In Java, write a AllDigitsOdd program that has a method called allDigitsOdd that takes an integer and returns whether every digi
yan [13]

Answer:

Hi there! The solution for this problem can be implemented a number of ways. Please find my solution below along with the explanation.

Explanation:

The prompts are fairly easily implemented using the Scanner class in Java for user input. In the allDigitsOdd function, we can perform a Math operation on the number being passed into the function to determine the number of digits in the number. We use the log10 function to do this and convert the double value returned to int. This is calculated in the code below as:  "(int)(Math.log10(number) + 1); ". Once we have the number of digits, we write a simple loop to iterate over each digit and perform a modulus function on it to determine if the digit is odd or even. I have declared 2 variables call odd and even that get incremented if the mod function (%) returns a 1 or a 0 respectively. Finally, the result is displayed on the screen.

AllDigitsOdd.java

import java.util.Scanner;

import java.lang.Math;

public class AllDigitsOdd {

 public static void main(String args[]) {

   // print main menu for user selection

   System.out.println("Please enter a number");

   Scanner scan = new Scanner(System.in);

   int selection = scan.nextInt();

   if (allDigitsOdd(selection)) {

     System.out.println("All numbers are odd");

   } else {

     System.out.println("All numbers are not odd");

   }

 }

 public static boolean allDigitsOdd(int number) {

   int digits = (int)(Math.log10(number) + 1);

   int even = 0;

   int odd = 0;

   for (int index = 1; index <= digits; index++) {

       if ((int)(number / Math.pow(10, index - 1)) % 10 % 2 == 0) {

         even += 1;

       } else {

         odd += 1;

       }

   }

   if (even == 0 && odd > 0) {

     return true;

   } else {

     return false;

     //if (odd > 0 && even == 0) {

     //  return true;

     //}

   }

 }

}

8 0
3 years ago
What are the two types of cache memory?
alexandr402 [8]

Answer:

DRAM and SRAM

Explanation:

Cache memory is used to reduce the average time to access data from the Main memory.

SRAM is an on-chip memory whose access time is small (fast).

DRAM is an off-chip memory which has a large access time (slow).

4 0
3 years ago
The macro command is available on the ___ tab<br> Home<br> Insert<br> View<br> Design
nataly862011 [7]

      Answer                     : Insert tab                                              

5 0
3 years ago
Read 2 more answers
In order to take excellent photographs, you must start by understanding the basic anatomy of your camera. Grab your camera and l
bagirrra123 [75]

Answer:

its in the back  in the middle helping it make the photo come out clear

Explanation:

3 0
2 years ago
Read 2 more answers
A ___ used encapulation to protect data sent over a public network. encryption makes that data more secure
Ilia_Sergeevich [38]

Answer: VPN

Explanation:

6 0
1 year ago
Other questions:
  • _____ is a markup language designed to transport and store data on the Web. Group of answer choices Standard Generalized Markup
    13·1 answer
  • Under the guise of justice, some less scrupulous administrators may be tempted to ____________________, or hack into a hacker’s
    12·2 answers
  • Which of the following criteria would not make a person eligible to receive medicare benefits?Which of the following criteria wo
    12·2 answers
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • "Create a Matlab Scrapt that will take the a Matrix A and Matrix B (of AX=B), then calculate the Determinant of Matrix A, Invers
    5·1 answer
  • ​Lara is the chief editor of "Laughter and Life," an online magazine. Lara has assigned Jenny the task of redesigning the magazi
    5·1 answer
  • Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the a
    6·1 answer
  • Describe how data is transmitted using half-duplex serial data transmission.
    9·1 answer
  • What are 3 customizations that can be done using the header/footer section in the customize reports tray?.
    11·1 answer
  • Attackers will sometimes put malware on USB drives and leave them in parking lots
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!