1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
3 years ago
6

An online game is played with two dice. In this context, explain what is meant by decomposition.

Computers and Technology
1 answer:
Vlad [161]3 years ago
4 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about desinging a game that is played with two dice and gets or shows their value to the player.

The dice value is random, and it can be between one and six. So, you need to generate two numbers between 1 and 6. You may also need to display the numbers

The main part of this program is that you need to know the numbers to limit or restrict what the user may do next while playing.

That's most of the first level of decomposition for solving a problem. In decomposition, you need to keep decomposing (breaking) the problem into smaller pieces, thinking outline of the program and deciding what objects, functions, variables, and logic you're going to implement in the coding.

You might be interested in
What network device manages its resources??
Lyrx [107]
A 'server' is the network device that manages its resources.

8 0
4 years ago
To apply the rule of thirds you first? PLZ HURRY AND ANSWER THIS
Deffense [45]
B/ Divide the viewpoint into three equal vertical divisions
5 0
4 years ago
Read 2 more answers
At Greenwood ATCT, arrival information need NOT be forwarded while FDIO is operational unless the sequence of aircraft changes a
GuDViN [60]

The available options are:

A. Arrival time differs by more than 3 minutes

B. Aircraft is issued an approach other than the tower specified

C. Verbal coordination has not been yet accomplished

Answer:

Aircraft is issued an approach other than the tower specified

Explanation:

Considering the situation described in the question, and according to Instrument Flight Rules (IFR), Approach Clearance Procedures, when at Greenwood Air Traffic Control Tower (ACTC), arrival information need not be forwarded while Flight Data Input-Output (FDIO) operational unless the sequence of aircraft changes and the "Aircraft is issued an approach other than the tower specified."

3 0
3 years ago
Write a function that returns the largest value stored in anarray-of-int. Test the function in a simpleprogram.
Minchanka [31]

<u>C program for finding the largest Value in array of integers</u>

#include <stdio.h>  

/*Function that returns the largest value stored in an array-of-int*/

int max(int array[], int m)  

{  

   int i;  

     /* Initializing variable maximum with array[0]*/

   int maximum = array[0];  

    /* Traversing array elements from 2 to last and comparing it with variable maximum*/

   for (i = 1; i < m; i++)  

       if (array[i] > maximum)  

           maximum = array[i];  

 

   return maximum; //returning maximum element of array

}  

//driver function  

int main()  

{  

   int array[] = {5, 78, 23, 65, 9}; //Input array

   int m = sizeof(array)/sizeof(array[0]); //finding the length of array

   printf("Largest in given array is %d", max(array, m));/*function calling and printing maximum element of array */

   return 0;  

}

<u>Output: </u>

Largest in given array is 78

3 0
3 years ago
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow the
Anika [276]

Answer:

Possessed objects

Explanation:

Objects that are carried around by users to identify themselves with and to allow them access into computer systems are called possessed objects. Examples of such objects are;

i. smart cards

ii. driver's license

iii. id cards

iv. smart keys

v. smart watches.

Possessed objects are not the only way to allow authentication. Other methods are through memorized information (such as passwords, PINs) and through biometric devices (such as face recognition and voice recognition devices).

5 0
3 years ago
Other questions:
  • Chris has received an email that was entirely written using capitalization. He needs to paste this text into another document bu
    13·2 answers
  • Consider the situation you addressed in the previous question. Create numeric cost estimates for each of the costs you listed. C
    10·1 answer
  • A(n)…………is the interface used toconnect external devices to the computer.
    5·1 answer
  • Business customers pay $0.006 per gallon for the first 8000 gallons. If the usage is more than 8000 gallons, the rate will be $0
    11·1 answer
  • In what way can parents use technology in their children’s development?
    11·2 answers
  • The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities an
    12·1 answer
  • In this problem, you will fill in the code for a function count_digits(val) that takes a positive integer, val, and returns a li
    12·1 answer
  • Do you have to include anything in a body of an email in order for it to send
    5·1 answer
  • How many likes to send messages on here?
    10·1 answer
  • You bought a laptop assuming it had application software loaded so you could use it right away, but it did not. What quality con
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!