Answer:
Explanation:
The following code is written in Java and loops through 10 times. Each time generating 2 random dice rolls. If the sum is 10 it breaks the loop and outputs a "You Win" statement. Otherwise, it outputs "You Lose"
import java.util.Random;
class Brainly {
public static void main(String[] args) {
UseRandom useRandom = new UseRandom();
boolean youWin = false;
for (int x = 0; x<10; x++) {
int num1 = useRandom.getRandom(6);
int num2 = useRandom.getRandom(6);
if ((num1 + num2) == 10) {
System.out.println("Number 1: " + num1);
System.out.println("Number 2: " + num2);
System.out.println("You Win");
youWin = true;
break;
}
}
if (youWin == false) {
System.out.println("You Lose");
}
}
}
class UseRandom{
public int getRandom(int n)
{
Random r=new Random();
int rand=r.nextInt(n);
return rand;
}}
<span>The RAID level 2 could give high
information exchange rates and would be straightforward contrasted with other
Raid levels. Be that as it may, it has a high cost and would need a high rate move
required with a specific end goal to legitimize this cost.</span>
Answer:
Explanation:
The following code was written in Java. The code contains the Employee class which contains the two variables (name, salary), the constructor, getter and setter methods for both variables, and an overwritten toString method. It also contains a tester class with the main method inside and creates a Employee object and initializes it. Then it calls the toString method. The output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.
Answer:
Threat disgruntled employees
Explanation:
This is a type's threat in a network, why disgruntled employees is a threat?
Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.
I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.
In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.
Answer: False
Explanation:
General purpose register cannot be read and written by the Ml program because when ever the instruction decode the input and output unit are invoke for data to read in the memory and it can written to the output device from the memory. General purpose register stored both the addresses and the data in the file. In some cases ML only reads with the hep of special algorithm function.