1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
2 years ago
11

13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails".

The program below simulates randomly
flipping that coin many times,
var heads -
var tails - ;
var rolls - 100;
for(var i=0; i
if(randonlumber(0,1) - )
heads
} else
tails
Which of the following is NOT a possible combination of values of the variables in this program when it finishes running?
O A. tails has a value of O and heads has a value of 100
B. tails has a value of 100 and heads has a value of O
0 C.tails has a value of 20 and heads has a value of 20
O D. tails has a value of 50 and heads has a value of 50
Computers and Technology
1 answer:
serious [3.7K]2 years ago
7 0

Answer: c

Explanation:

only reasonable answer

You might be interested in
3.12 LAB: Output range with increment of 5 Write a program whose input is two integers, and whose output is the first integer an
Zinaida [17]

The INPUT code of the given programme in Java would be as given below:

In this first we are taking input of two integers j and k from the user and then performing the required operations over it

import java.util.

Scanner;  public class LabProgram {    

public static void main(String[ ] args) {  

Scanner scnr = new Scanner(System.in);        

 int i,j;        

 i  = scnr.nextInt();        

 j = scnr.nextInt();        

if(i<=j) {            

int k = i;            

while (k <= j) {                

System.out.print(k + " ");                

 k = k + 5;            

 }            

 System.out.println();        

 }        

 else{            

 System.out.println("Second integer can't be less than first.");                  

}    

}

}  

Learn more about Java Programming here:

brainly.com/question/18554491

#SPJ10

8 0
2 years ago
A​ ________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owners' p
Mamont248 [21]

Answer: Threat

Explanation:

 Threat is one of the type of possible danger occur in the computer system security and also also exploit the security system that cause various types of possible harms.

Threat is alter any type of data in an organization without the permission of the owner.  

The threat can be classified into the different types are as follows:

  • Computer worm
  • DOS attack
  • Rootkit
  • Computer viruses

3 0
3 years ago
How to delete a bucket in microsoft planner
katrin2010 [14]
You can just click file and delete
7 0
3 years ago
3. Problem 5. A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operatio
igomit [66]

Answer:

a) 8 bits b) 16 bits. c) 2¹⁶ * 24 bits d) 2²⁴ -1

Explanation:

a) In order to be able to accommodate 150 different instructions, the number of bits needed must be equal to the minimum power of 2 that satisfies this equation:

2n > 150, i.e. n=8.  

b) If the total number of bits for a word is 24, and 8 are used for the op code, there are 16 bits left for the address part.

c) If the address part has 16 bits, this means that the total addressable space is just 2¹⁶, so the maximum allowable size is 2¹⁶ * 24 bits.

d) As we have 24 bits to be filled, the largest unsigned binary number is just 2²⁴ – 1 .

(As we need to leave a position for all zeros).

5 0
2 years ago
____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or c
FinnZ [79.3K]

Answer:

Network forensics

Explanation:

hide the most valuable data at the innermost part of the network.

5 0
1 year ago
Other questions:
  • Mr. Cooper would like to customize his Excel software so his students can create an electronic graph in Excel for their lab repo
    6·1 answer
  • Which cable consists of two conductors, a central wire, and a surrounding wire mesh separated by an insulator?
    5·2 answers
  • Is pycharm neccessary in python
    6·2 answers
  • Suppose you want to use an Internet cafe to login to your personal account on a bank web site, but you suspect that the computer
    15·1 answer
  • Identify five financial risks that can be covered by insurance.
    12·1 answer
  • Your company has a wireless network for its small office network. The wireless network does not broadcast its service set identi
    11·1 answer
  • Which fact does lean green eco machines present to show that electric cars are not perfect
    13·2 answers
  • Which of the following can computer maintenance software determine?
    6·1 answer
  • Compile and Execute a Program
    13·1 answer
  • Problem Statement − Suppose the problem statement at hand is to contain the attrition that happens in companies worldwide. High
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!