Answer:
In Python:
def fib(nterms):
n1, n2 = 1, 1
count = 0
while count < nterms:
term = n1
nth = n1 + n2
n1 = n2
n2 = nth
count += 1
return term
Explanation:
This line defines the function
def fib(nterms):
This line initializes the first and second terms to 1
n1, n2 = 1, 1
This line initializes the Fibonacci count to 0
count = 0
The following while loops gets the number at the position of nterms
<em> while count < nterms:
</em>
<em> term = n1
</em>
<em> nth = n1 + n2
</em>
<em> n1 = n2
</em>
<em> n2 = nth
</em>
<em> count += 1
</em>
This returns the Fibonnaci term
return term
import random
rock,paper,scissors = 1,2,3
choice = int(input("Please choose 1 2 or 3: "))
computer = random.randint(1,3)
player_won = False
draw = False
if choice == computer:
draw = True
elif choice == 1 and computer == 3:
player_won = True
elif choice == 2 and computer == 1:
player_won = True
elif choice == 3 and computer == 2:
player_won = True
if player_won:
print("You won!")
elif not player_won and not draw:
print("The computer won!")
else:
print("It's a draw!")
First, I recommend importing at the beginning of your program. Also, you can combine all your same datatype variables in one line. You also need to cast your user choice to an integer so you can compare it with the computer's choice. I wrote the if, elif, and else statements using a boolean variable. I simply wrote all the possibilities that would result in the player winning and this would result in the player_won variable being true. If this is the case, we print to the console, "You won!"
Answer:
The period of fifth generation is 1980-till date. In the fifth generation, VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components
Fifth-generation languages are used mainly in artificial intelligence research. OPS5 and Mercury are examples of fifth-generation languages. as is ICAD, which was built upon Lisp. KL-ONE is an example of a related idea, a frame language
Explanation:
The containment strategy prevents intruders from removing
information assets from the network, and
prevents attackers from using the organization's network as a launch point
for subsequent attacks.
In
a "block" containment strategy, in which the attacker's path into the
environment is disrupted, you should use the most precise strategy
possible, starting with <span>blocking a specific IP address. Correct answer: C
</span>
Answer:
DiffServ (Differentiated Service)
Explanation:
DiffServ (Differentiated Service) field is used to prioritize traffic in IPv4 packet.
DiffServ is used as QoS (quality of service) on networks at Layer 3, replacing former IPv4 TOS field to effectively deal with the web traffic and prioritization issues starting from 1998.