1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
4 years ago
9

This project involves writing a java program to simulate a blackjack card game. You will use a simple console-based user interfa

ce to implement this game.
A simple blackjack card game consists of a player and a dealer. A player is provided with a sum of money with which to play. A player can place a bet between $0 and the amount of money the player has. A player is dealt cards, called a hand. Each card in the hand has a point value. The objective of the game is to get as close to 21 points as possible without exceeding 21 points. A player that goes over is out of the game. The dealer deals cards to itself and a player. The dealer must play by slightly different rules than a player, and the dealer does not place bets. A game proceeds as follows:
A player is dealt two cards face up. If the point total is exactly 21 the player wins immediately. If the total is not 21, the dealer is dealt two cards, one face up and one face down. A player then determines whether to ask the dealer for another card (called a "hit") or to "stay" with his/her current hand. A player may ask for several "hits." When a player decides to "stay" the dealer begins to play. If the dealer has 21 it immediately wins the game. Otherwise, the dealer must take "hits" until the total points in its hand is 17 or over, at which point the dealer must "stay." If the dealer goes over 21 while taking "hits" the game is over and the player wins. If the dealer’s points total exactly 21, the dealer wins immediately. When the dealer and player have finished playing their hands, the one with the highest point total is the winner. Play is repeated until the player decides to quit or runs out of money to bet.
You must use an object-oriented solution for implementing this game.
Computers and Technology
1 answer:
coldgirl [10]4 years ago
8 0

Answer:i dont know sorry

Explanation:

You might be interested in
If a given router can connect to at most k networks, how many routers, r, are required to connect n networks? write an equation
Soloha48 [4]
Routers<span> select a path for traffic in a network, or between or across multiple networks.</span><span>
If a given router can connect to at most k networks </span>R=N/(K-1) +1 routers are required to connect N networks.

8 0
4 years ago
In the Dread Pirate Roberts case, U.S. Ulbricht, 31 F. Supp. 3D 54D (S.D.N.Y. 2014), one of the issues that the court addressed
LUCKY_DIMON [66]

Answer:

True.

Explanation:

One of the problems described by that of the court through the Dread Pirate Roberts case was about whether Bitcoin was currency of cash-laundering laws reasons. The following court decided in the following scenario that somebody might breach the money-laundering law through using bitcoin.

So, the following scenario is true about the case of Dread Pirate Roberts.

6 0
3 years ago
Attackers craft malicious probe packets and scan for services such as HTTP over SSL (HTTPS), SMTP over SSL (SMPTS) and IMAP over
pentagon [3]

Answer:(d)Scan shows that no scanned port is live on the network

Explanation:

Honeypot shows any attempt of unauthorized access to information in the system. Scan showing not scanned port is live on the network shows the presence of honeypot so that hackers could be trapped to be believed that there are no scanned port.

4 0
3 years ago
Which of these file types does not share info in a spreadsheet?
charle [14.2K]

Answer:

A file with extension ".exe".

or A system file

3 0
3 years ago
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
2 years ago
Other questions:
  • What is it called when you give credit in your writing to someone else's quote?
    10·1 answer
  • Write a program that uses these bounds and bisection search (for more info check out the Wikipedia page on bisection search) to
    8·1 answer
  • Two processes are running the same program on a computer. The operating system can set up an access restriction on the control
    7·1 answer
  • Which picture should i put as my profile picture.
    15·2 answers
  • How can having more than one goal cause truble in the work place
    6·1 answer
  • Which of the following BEST describes Computer Science (CS)?
    8·1 answer
  • What is the best resource to learn python?
    14·2 answers
  • Which of the following should you press to insert a non-
    8·2 answers
  • Discuss the information justify with two examples<br>​
    11·1 answer
  • When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!