1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
11

Pseudo code for rolling a dice

Computers and Technology
1 answer:
iogann1982 [59]3 years ago
3 0

Answer:

Explanation:

In this exercise, you will roll a pair of dice until the numbers add up to a given number. You can assume that the given number is 2, 3, 6, or 12. Using pseudocode, write an algorithm that returns the number of times the dice is rolled to achieve this number.

You might be interested in
Audience centered public speakers are inherently sensitive to the
DanielleElmas [232]
Diversity of their audiences
7 0
2 years ago
Read 2 more answers
Are sql injections legal?
natima [27]

Essentially, if you are seen to be someone who knows what you are doing, then even typing in a single-quote to a web form has been enough to be arrested and charged over in the past.

But lets say i'm writing a pen test tool that will be doing sqli testing and let it loose on sites that are 'out in the wild'. I'm not going to be doing dumps of any information. But is just the vulnerability scan itself illegal?



8 0
3 years ago
Is apple better than android
KatRina [158]

In a sense yes as it has a more user friendly interface but in terms of usability android is a far better os

3 0
3 years ago
Read 2 more answers
In an attempt to reach an all-time record for its premier, ads for the highly anticipated Avengers: Endgame are run on all the m
cricket20 [7]

Based on the contextual situation, the cable stations across the country from 8:00 p.m. to 10:00 p.m., or during <u>Late-fringe time</u>.

<h3>What is Late-Fringe Time?</h3>

Late Fringe time is a term used in television that describes the television hours that follow the prime time.

Generally, the prime period is usually between 8:00 p.m. to 10:00 p.m., while the Late Fringe time is around 11 p.m. to 1 a.m.

Hence, in this case, it is concluded that the correct answer is "<u>Late-Fringe period."</u>

Learn more about Television hours here: brainly.com/question/1006994

8 0
2 years ago
The type of connection that is kept open after an HTTP request to the server.
Igoryamba

Answer: Persistent

Explanation:

 Persistent is the type of connection in the hyper text transfer protocol (HTTP) that act as communication channel in the network. It basically remain open after HTTP request or response to the server.

Persistent also maintain the HTTP connection and prevent it from the timing out with the help of transmission control protocol packets.

In the persistent connection, after request has been send TCP connection is leave by the server. Therefore, the request can be easily send between the similar server and client.

6 0
3 years ago
Other questions:
  • What year did bill gates form traf-o-data?
    8·1 answer
  • In microsoft windows when a window is minimized what happens to that window
    9·1 answer
  • A Python function cannot under normal circumstances reference a module variable for its value.
    12·2 answers
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    13·1 answer
  • A cracked tone ring will often cause what type of problem?
    14·1 answer
  • Write a function nexthour that receives one integer argument, which is an hour of the day, and returns the next hour. This assum
    6·1 answer
  • In order to be an effective employee who knows recent information on loans and laws, in what topic should your information be cu
    5·1 answer
  • The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and eac
    12·1 answer
  • Davids family took him to a hospital as he was suffering from a sericous ailment
    8·1 answer
  • Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!