1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga nikolaevna [1]
3 years ago
9

Why wouldn't a game using just run-length encodings be challenging?

Computers and Technology
1 answer:
serious [3.7K]3 years ago
6 0

Answer:

well i am not sure

Explanation:

sorry

You might be interested in
(Financial application: compound value) Suppose you save $100 each month into savings account with an annual interest rate of 5%
Nostrana [21]

Solution:

initial = float(eval(input('Enter the monthly saving amount: ')))

x = (1 + 0.00417)

month_one = initial * x

month_two = (initial + month_one) * x  

month_three = (initial + month_two) * x  

month_four = (initial + month_three) * x

month_five = (initial + month_four) * x  

month_six = (initial + month_five) * x  

print('The sixth month value is: '+str(month_six))  

Don't forget the saving amount, and initialize the balance with that amount. Inside the loop, work out and add the interest and then add the saving amount for the next month.

balance = 801

for month in range(6):

  balance = balance * (1.00417)

print(balance)

7 0
4 years ago
Question #2
Bezzdna [24]
Computational thinking inclines invokes the techniques of decomposition, latter reconstruction, abstraction & algorithms development
3 0
3 years ago
Read 2 more answers
What sort of technique would you use to sort 10,000 items using just 1000 available slot in your RAM?
beks73 [17]

Answer:

d. Merge sort

Explanation:

Merge sort is example of an efficient sorting alogrithm. The Divide and conquer rule is used in this technique. This method breakdown the list into multiple sublists and each sublist contains a single element. This technique merged in the form of sorted lists. This technique uses external memory of the system while sorting.

Merge sort is used to sort the 10,000 items using only 1,000 slots available in the RAM.

5 0
3 years ago
Transistor was the major technology used during the ____ generation of hardware.
gulaghasi [49]

 

<span>Second generation of computer apparatus. Second Generation: Transistors (1956-1963)</span>

The world would see transistors substitute vacuum tubes in the second generation of computers. The transistor was created at Bell Labs in 1947 but did not see omnipresent use in computers until the late 1950s. 

The transistor enormously higher positioning to the vacuum tube, allowing PCs to transform into littler, speedier, less expensive, more vitality effective and more dependable than their first-generation predecessors. Though the transistor still generated a great deal of heat that subjected the computer to destruction, it was a vast development over the vacuum tube. Second-generation computers still confidence on punched cards for input and printouts for production.

<span> </span>

6 0
3 years ago
Write the one Sale method of the GroceryStore class. Method oneSale has one parameter: the name of one product (that a customer
DIA [1.3K]

Answer:

Check the explanation

Explanation:

bool oneSale(string item){

for(int i=0;i<capacity;i++){ // iterate till the capcity of array

if(item==grocerryList[i].name()){ // if name matches

 if(grocerryList[i].getStock()>0){ // and stock is greater than 0

  grocerryList[i].setStock(grocerryList[i].getStock()-1); // subtract 1 from the stock

// or alternate is grocerryList[i].stock= grocerryList[i].stock-1;

 return true; // return true

}

}

else if(item==grocerryList[i].name()){ // if name matches

 if(grocerryList.getStock()==0){ // but stock is empty

 return false; // return falsse

}

}

else{ // means item is not available so there is no need to check stock

return false; // return false

}

}

}

8 0
3 years ago
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • Select the term used to describe the process, within the context of Active Directory, that allows a person with higher security
    5·1 answer
  • Dividing a hard drive into multiple sections is known as partitioning
    5·1 answer
  • A __________ search engine focuses on a specific subject.<br><br>answer : Specialized
    8·1 answer
  • Mha rp anyone? ima be baby shoto
    14·2 answers
  • What are the fundamental activities that are common to all software processes?
    9·1 answer
  • A machine that converts energy to useful work.
    9·2 answers
  • Who is primarily responsible for ensuring cybersecurity in society? Select 3 options.
    15·1 answer
  • A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwor
    13·1 answer
  • To reposition the legend to the left-hand side of a chart, click the _________ button, point to legend, click the right arrow ic
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!