1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
7

Using C++Chapter 6 - Programming Challenge 24 - Rock Paper Scissors GameMake sure you use at least one function to make your cod

e modular.Rock, Paper, Scissors GameWrite a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follows.1. When the program begins, a random number in the range of 1 through 3 is generated. If the number is 1, then the computer has chosen rock. If the number is 2, then the computer has chosen paper. If the number is 3, then the computer has chosen scissors. (Donât display the computerâs choice yet.)2. The user enters his or her choice of "rock", "paper", or "scissors" at the keyboard. (You can use a menu if you prefer.)3. The computerâs choice is displayed.4. A winner is selected according to the following rules:⢠If one player chooses rock and the other player chooses scissors, then rock wins.(The rock smashes the scissors.)⢠If one player chooses scissors and the other player chooses paper, then scissorswins. (Scissors cuts paper.)⢠If one player chooses paper and the other player chooses rock, then paper wins.(Paper wraps rock.)⢠If both players make the same choice, the game must be played again to determinethe winner.Be sure to divide the program into functions that perform each major task.
Computers and Technology
1 answer:
olganol [36]3 years ago
8 0
You might send me the picture of it because I think it’s $45
You might be interested in
The process of acquiring data for a program to use is called:
marusya05 [52]

Answer:

a. Data Entry

Explanation:

Great Question, it is always good to ask away and get rid of any doubts you may be having.

The process described in the question is called Data Entry and/or Data Acquisition. Data is gathered and stored in the computers memory to then be used by a specific program or function. Without this data being gathered the program or function cannot complete its task. Therefore Data Entry is extremely needed for the correct and healthy function of a program.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Two of the people most often credited with the invention of the Internet and WWW respectively are _____.
krek1111 [17]
Bob Kahn and Vint Cerf were both pioneers of the Internet, and Tim Berners-Lee was known for inventing the WWW.
7 0
4 years ago
Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet.
alexandr402 [8]
The answer to this is B=MODE(A1:A65)
8 0
3 years ago
Using the PDF handout provide you will identify the seven functions of marketing and provide
Jet001 [13]

The Explanation of  how each core function works together to help us carry out the marketing concept is given below.

<h3>How do marketing functions work together?</h3>

The marketing function is known to be used in regards to selling and it is one that helps businesses to achieve a lot.

The six marketing functions are:

  • Product/service management,
  • Marketing-information management,
  • Pricing,
  • Distribution,
  • Promotion,
  • selling.

The functions are known to often work together to be able to obtain products from producers down to the consumers.

Hence, each of the marketing functions is known to be one that need to  be done on its own, but they are said to be very effective, if the said functions work together as a team.

Learn more about marketing functions from

brainly.com/question/26803047

#SPJ1

4 0
2 years ago
In a(n) ____________________ attack, the attacker monitors (or sniffs) packets from the network, modifies them using Internet Pr
Tasya [4]

Answer:

cyber attack

Explanation:

7 0
3 years ago
Other questions:
  • Allows a service provider organization to own and manage the infrastructure (including computing, networking, and storage device
    13·1 answer
  • What are the correct steps to find the system specifications such as the amount of RAM or system type?
    13·1 answer
  • The World Wide Web is a program that allows you to search for information on the Internet.
    9·1 answer
  • L00000000000000000000000000000000000000000000000000000000l they b00ty tickled
    6·2 answers
  • Required skills,training,education for dentist
    7·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n) ___1___ can be created that rep
    12·2 answers
  • Write a RainFall class that stores the total rainfall for each of 12 months into an array of doubles. The program should have me
    10·1 answer
  • Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?
    9·1 answer
  • Grades are numbers or ________ that show how a student performed in a course.
    7·2 answers
  • How have newspapers and magazines adapted to digital technology?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!