1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
12

using a timer to generate a random number, develop a program that displays random numbers between 1 and 47 (or whatever) for you

r state's lottery
Computers and Technology
1 answer:
mestny [16]3 years ago
3 0

Answer:

Explanation:

The following code is written in Python. It creates a variable that detects the current time. Then it loops through a range of numbers and chooses the last random number after 2 seconds. Finally, it prints that number to the screen. This function can be called countless times depending on the number of state lottery numbers needed.

import random

import time

start_time = time.time()

while time.time() - start_time < 2:

   lottery_number = random.randint(0, 48)

print(lottery_number)

You might be interested in
What your roblox user &gt;:)​
sweet-ann [11.9K]

Answer:

whats yours?

Explanation:

5 0
3 years ago
Read 2 more answers
What should you install in a server room that will save space by allowing you to control multiple servers with a single mouse, k
Nata [24]

Answer:

a KVM switch

Explanation:

KVM switch is devise used for handling or connecting different server at any time by using single mouse, monitor and keyboard. it is like an interface used to connect different server at any given time.

different type of KVM switch are

1) USB based KVm

2) Emulated USB type KVM

3) DDM USB type KVM

4) semi -DDM KVM

7 0
3 years ago
What is one way to establish a team's velocity?
S_A_V [24]

Look at the average Story points completed from the last Iterations.

How To Improve Team Velocity?

Velocity cannot be used to compare teams, as all the teams are different. It also says nothing about how hard the team is working. Velocity is more about efficiency. Velocity should be treated as a team thing, not as an individual one. Some steps to improve team velocity are:

  • Care about team spirit
  • Set clear goals
  • Team members to work on one work at a time
  • Avoid unnecessary steps in the process
  • No micromanagement
  • Define The Process That Is Clear For Everyone
  • Keep Track Of Tech Debt. The team should regularly work on it, to avoid risks and quality problems in the future.
  • Focus On Quality, Not Speed. This will help to reduce the fixes, refactoring time, and increase productivity.
  • Do Not Load The Team Too Much.

To know more about Team Velocity, click on:

brainly.com/question/28174889

#SPJ1

8 0
1 year ago
List the final state of the cache, with each valid entry represented as a record of &lt; index, tag, data &gt;.
yanalaym [24]
There is not enough information to give correct answer. Anyway, I guess, I've seen this question before and I know the answer. I wrote it in binary. So if your task's details look like this: tag bits 31-10 2; index bits 9-4; offset bits 3:0; your answer is:

<000000, 0001, mem[1024]>
<000001, 0011, mem[3088]>
<001011, 0000, mem[176]>
<001000, 0010, mem[2176]>
<001110, 0000, mem[224]>
<001010, 0000, mem[160]> 
8 0
3 years ago
TRUE/FALSE
algol [13]
<h2>Answer:</h2>

Following are given answers to each part with explanation:

<h2>Explanation:</h2>

1. lt takes multiple clock cycles to access data from memory.

The statement is TRUE.

Accessing data from memory acquires two steps. In first step the address is read and in second step we go to the address in order to access the data.

2.Each byte of memory has a unique address.

The statement is TRUE.

Each byte in the memory attains a unique address therefore we can access the data residing at each byte specifically by giving address.

3.The total memory used by all running programs can never be larger than the computer's physical memory.

The statement is TRUE.

The running parts are always a sub part o a system so combining them all cannot exceed the total size of computer's physical memory.

4.The lower half (or least significant half) of the EBX register is called BX.

The statement is TRUE.

BX is he least significant or lower half of the register EBX (extended BX).

5.The following data locations are in order of fastest access time to slowest access time: cache, registers, main memory.

The statement is TRUE.

Yes the order of data locations from faster to lower is given correctly:

Cache is accessed faster than registers and in the end comes main memory.

6.The ALU performs only addition, subtraction, multiplication, and division operation:s

The statement is FALSE.

ALU is an abbreviation of Arithmetic Logic unit. So it performs arithmetical operations such as addition, subtraction, multiplication, and division as well as the Logical operations that are AND OR NOT XOR.

7. The control unit (CU) coordinates the sequencing of execution steps in an instruction cycle.

The statement is TRUE.

As obvious from the name Control unit (CU) has assigned the coordination of execution of steps in sequence.

8.The EIP register is updated when an instruction is fetched.

The statement is TRUE.

Whenever the user retrieve any instruction from EIP or fetch the instruction from it. EIP gets updated.

9.The step to fetch an operand is always necessary in the instruction cycle.

The statement is TRUE.

Most of the Instructions demand an operand in the instruction cycle so that they could be operated on. While some instruction not demand the operand such as Exit. But majority demands the operand so it is true.

10.In an instruction cycle, the operands are fetched before the instruction is fetched.

The statement is FALSE.

The first part of instruction cycle is to fetch the instruction, whereas the operands are fetched after it. So the statement get FALSE.

<h3>I hope it will help you!</h3>
5 0
3 years ago
Other questions:
  • Explain how to use fortran programming in details
    14·1 answer
  • SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es
    11·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • Why are application programs stored in main memory​
    11·1 answer
  • Which of the following scenarios is an example of irrelevant media?
    11·1 answer
  • Cloud computing is an old phenomenon in computing infrastructure dating back to the early days of the Internet that involves mov
    10·1 answer
  • What is the biggest challenge for most business when going online?
    12·1 answer
  • You receive an email that appears to legitimately be from your Bank. The email indicates the need for verification of your infor
    15·2 answers
  • What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
    7·1 answer
  • PLS REPLY ASAP WILL MARK BRAINLIEST
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!