1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
3 years ago
6

An online game is played with two dice. In this context, explain what is meant by decomposition.

Computers and Technology
1 answer:
Vlad [161]3 years ago
4 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about desinging a game that is played with two dice and gets or shows their value to the player.

The dice value is random, and it can be between one and six. So, you need to generate two numbers between 1 and 6. You may also need to display the numbers

The main part of this program is that you need to know the numbers to limit or restrict what the user may do next while playing.

That's most of the first level of decomposition for solving a problem. In decomposition, you need to keep decomposing (breaking) the problem into smaller pieces, thinking outline of the program and deciding what objects, functions, variables, and logic you're going to implement in the coding.

You might be interested in
6.7 — Trickier Trap 4
Bogdan [553]

Answer:

I do not know the answer sorry

5 0
3 years ago
Read 2 more answers
Which is the correct description of the first act in a classical game story structure?
Reil [10]
The 3-act structure<span> is an old principle widely adhered to in storytelling today. It can be found in plays, poetry, novels, comic books, short stories, video games, and the movies. It was present in the novels of Conan Doyle, the plays of Shakespeare, the fables of Aesop, the poetry of Aristotle, and the films of Hitchcock. It’s older than Greek dramaturgy. Hollywood and Broadway use it well. It’s irrefutable and bullet-proof, so to speak.

so this means its more basic antagonist protagonist set-up even if the protagonist and antagonist are "CUBES"</span>
5 0
4 years ago
Which invention spurred the development of the digital camera?
Igoryamba

Answer:

B) The charge-coupled device

Explanation:

Around 1964 the first CMOS (Complementary Metal Oxide Semiconductor) circuits were developed. This would be the "embryo" of the Charge-coupled Device (CCD), which equips current digital cameras and who is responsible for capturing images.

CMOS is a small circuit that uses very little energy and stores information such as date, time and system configuration parameters.  

The first CCD was developed in 1969 and it is still used today in many portable devices and computers.

4 0
4 years ago
What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology
AURORKA [14]

Answer:

Hybrid cloud.

Explanation:

Hybrid cloud includes an IT architecture of two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability.

Organizations that use hybrid cloud are usually more flexibile to choose the best cloud for each application and at such meeting their objectives effectively and efficiently at little cost.

3 0
3 years ago
To narrow the search for consumers, search engines used to measure the relevance of a website or an information page by counting
noname [10]
The answer is : it was easily manipulated.   To narrow the search for consumers, search engines used to measure the relevance of a website or an information page by counting the number of times the searched words appeared on that web page or document.  They don't use this criterion anymore because it was easily manipulated.
5 0
3 years ago
Other questions:
  • Wired Equivalent Privacy (WEP) is an IEEE 802.11 wireless protocol which provides security algorithms for data confidentiality d
    14·1 answer
  • In your own words, describe the advantages and disadvantages of the auto-negotiation protocol used in Ethernet communications.
    6·1 answer
  • One example of how psychological research can be used to control harmful behavior would be __________. A. fooling individuals th
    13·2 answers
  • Who killed mrs.huffington
    14·1 answer
  • Which testing is an example of non-functional testing? A. testing a module B. testing integration of three modules C. testing a
    13·1 answer
  • What when can you expect technology to be effective?
    12·1 answer
  • Which is an advantage of using a flat file instead of a relational database?
    5·1 answer
  • OSI layer for HDLC??​
    13·1 answer
  • n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each
    11·1 answer
  • Write a for loop that displays the following numbers exactly like this (you must use a loop):
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!