1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
7

Using C++Chapter 6 - Programming Challenge 24 - Rock Paper Scissors GameMake sure you use at least one function to make your cod

e modular.Rock, Paper, Scissors GameWrite a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follows.1. When the program begins, a random number in the range of 1 through 3 is generated. If the number is 1, then the computer has chosen rock. If the number is 2, then the computer has chosen paper. If the number is 3, then the computer has chosen scissors. (Donât display the computerâs choice yet.)2. The user enters his or her choice of "rock", "paper", or "scissors" at the keyboard. (You can use a menu if you prefer.)3. The computerâs choice is displayed.4. A winner is selected according to the following rules:⢠If one player chooses rock and the other player chooses scissors, then rock wins.(The rock smashes the scissors.)⢠If one player chooses scissors and the other player chooses paper, then scissorswins. (Scissors cuts paper.)⢠If one player chooses paper and the other player chooses rock, then paper wins.(Paper wraps rock.)⢠If both players make the same choice, the game must be played again to determinethe winner.Be sure to divide the program into functions that perform each major task.
Computers and Technology
1 answer:
olganol [36]3 years ago
8 0
You might send me the picture of it because I think it’s $45
You might be interested in
The last 64 bits of an ipv6 address are the interface identifier. what is frequently used to specify the interface identifier?
Sliva [168]
Answer: the MAC (Media Access Control) address
6 0
4 years ago
Ports that are generally used to establish outbound connections are known as ___ ports.
aivan3 [116]

Answer:

Ephemeral

Explanation:

3 0
4 years ago
Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
Alexeev081 [22]

cataloging is a term for that

5 0
3 years ago
What happens when you press the Enter key at the end of a line of bulleted text?
sladkih [1.3K]

i think the  answer is d

6 0
4 years ago
Read 2 more answers
When do you use a for loop instead of a while loop? (There may be more than one answer.)
statuscvo [17]

Answer:

- You know how many times you want the loop to run.

- When there is a defined start and end.

Explanation:

Required:

When to use for instead of while loop?

First, it should be noted that both for loop and while loop are used for iteration. However, depending on the scenario; there is preference on one to the other.

The basic syntax of for loop is:

for(start;end;condition)\{\}

<em>The condition could either be increment or decrement</em>

The basic syntax of while loop is:

while(condition)\{\}

<em>The condition could be any condition whatsoever</em>

Analyzing the options one after the other.

1. How many times the loop to run.

The for loop is preferred here because of the simplicity of the for loop.

2. & 3. Both the for and while loops are used for code repetition and to perform number calculations

4. Defined start and end.

From the syntax of the for loop

for(start;end;condition)\{\}

<em />

A for loop has a definite start and end in its basic syntax and is more preferable to use instead of a while loop.

<em />

<em />

Hence, 1 & 4 answer the question

8 0
3 years ago
Other questions:
  • Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key
    7·2 answers
  • The memory allocated for a float value is ____ bytes.
    9·1 answer
  • If your BAL is .10 you can expect a _______ drop in complex performance compared to the sober level
    6·1 answer
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • (1) In Tamara's science class, the students are learning Which sentence shows an action that is extrinsically
    7·1 answer
  • Give the Division Hashing function and the index it maps the key 2000 into, assuming a primary storage area array size of 61 ele
    6·1 answer
  • You’re driving down the highway when one of your tires suddenly blows out.<br> you should
    10·2 answers
  • Historically, storytelling passed down the most important ideas about life, family, and society from generation to generation; t
    10·2 answers
  • Select one of the wrong answer from question 1 and explain why it is ironic.
    7·1 answer
  • Question # 1
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!