1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
11

Pseudo code for rolling a dice

Computers and Technology
1 answer:
iogann1982 [59]3 years ago
3 0

Answer:

Explanation:

In this exercise, you will roll a pair of dice until the numbers add up to a given number. You can assume that the given number is 2, 3, 6, or 12. Using pseudocode, write an algorithm that returns the number of times the dice is rolled to achieve this number.

You might be interested in
When you select the data range for a pie chart, you should be sure to include the total cell on the worksheet?
Daniel [21]
This is not a question...
5 0
3 years ago
WNOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOW
beks73 [17]

Answer:

yes.

Explanation:

7 0
3 years ago
Jen's house contains the following devices:
poizon [28]

Answer:

Jen's laptop and her daughter's phone, because they are both connected to the router and turned on.

Explanation:

A network comprises of two or more interconnected devices such as computers, routers, switches, smartphones, tablets, etc. These interconnected devices avail users the ability to communicate and share documents with one another over the network.

Additionally, in order for a network to exist or be established, the devices must be turned (powered) on and interconnected either wirelessly or through a cable (wired) connection.

Hence, the computers which are currently networked are Jen's laptop and her daughter's phone, because they are both connected to the router and turned on. A smartphone is considered to be a computer because it receives data as an input and processes the input data into an output (information) that is useful to the end user.

6 0
3 years ago
Which of the following detects unauthorized user activities, attacks, and network compromises, alerts of the detected attacks, a
Anit [1.1K]

The answer is IPS (Intrusion Prevention Systems)

The Intrusion Prevention Systems and Intrusion Detection Systems (IDS) are two security technologies that secure networks and are very similar in how they work. The IDS detects unauthorized user activities, attacks, and network compromises, and also alerts. The IPS, on the other hand, as mentioned, is very similar to the IDS, except that in addition to detecting and alerting, it can also takes action to prevent breaches.


3 0
3 years ago
1. Why is it important to evaluate the website on which you plan to shop? (1 point)
UkoKoshka [18]
Hi there!

For #1 the answer is the site may not be trustworthy, and you risk identity theft. If you are not sure a site legit then don't trust it. Some sites can easy to tell if they can be trusted by the amount of detail put into the site itself, but others are not so easy to tell. In general, if a site does not have https:// in the web address, but instead has just http:// (no "s" in it) then don't trust it.

For #2 the answer is to use<span> a secure browser. If the browser you are using is insecure then the info you put into a site can be compromised and stolen by the browser itself because it reads all info put on it.

For #3 the answer is i</span><span>t has a secure payment page. Again going back to the https:// vs. the http:// if the page that you pay on is not secured then your credit card info can be stolen when put in because the site without a secured page will allow others with access to see your info.

-Your friend in tech, </span>ASIAX   Frequent Answerer
8 0
3 years ago
Read 2 more answers
Other questions:
  • We can see spreadsheet results graphically by creating:
    15·1 answer
  • Most students overestimate their skill level and abilities to take open book tests.
    11·2 answers
  • Which buttons should you use to publish and change a message on a message board
    6·2 answers
  • What does this result prove about the computer’s network connectivity?
    12·1 answer
  • The house belives that works should be compensated for the loss of jobs due to automation? Describe it in against motion of the
    15·1 answer
  • Which precaution should be taken when working inside computer systems??
    9·1 answer
  • What is "mob of the dead"?
    7·1 answer
  • I need help <br> with a question<br> what can i write for ex when he mad
    13·2 answers
  • Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these
    13·1 answer
  • List at least 5 disadvantages caused by computer viruses?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!