1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
baherus [9]
2 years ago
9

Write a program to play an automated game of Rock, Paper, Scissors. Two players make one of three hand signals at the same time.

Hand signals represent a rock, a piece of paper, or a pair of scissors. Each combination results in a win for one of the players. Rock crushes scissors, paper covers rock, and scissors cut paper. A tie occurs if both players make the same signal. Use a random number generator of 0, 1, or 2 to represent the three signals.
Computers and Technology
1 answer:
zhuklara [117]2 years ago
3 0

Answer:https://www.chegg.com/homework-help/questions-and-answers/program-specifications-write-program-play-automated-game-rock-paper-scissors-two-players-m-q84530098

You might be interested in
MULTIPLE CHOICE QUESTION
Anarel [89]

Answer:

Cheaper price.

Explanation:

It's not cheaper price. Most desktops are pretty expensive.

4 0
2 years ago
Read 2 more answers
Which of the following is important to do when downloading a game to your
Anestetic [448]

Answer: (A) Check the vendors website to see if your model of phone and OS are listed as  supporting this game

Explanation:

  When we downloading a game in our smartphones we should check the vendor website that whether the phone model and the operating system supported the game. The smartphone is the type of the cellular telephone that contain integrated computer.

So, different types of smartphones model contain different types of operating system support. For example, the apple is the only type of vendor which build its own type of operating system and iPhone.

Therefore, Option (A) is correct.

3 0
2 years ago
For question 1-3, consider the following program: def tryIt(a ,b = 7) return a + b
tino4ka555 [31]

Answer:

1)18

2)4

3)28

Explanation:

1) ans= tryIt(2) *2

        = (2+7)* 2 =18

2) ans= tryIt(-5) *2

        = (-5+7)* 2 =4

3) ans= tryIt(7) *2

        = (7+7)* 2 =28

3 0
3 years ago
The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext
Bad White [126]
The answer is decryption
8 0
2 years ago
Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
VARVARA [1.3K]

Answer:

The answer is Letter D. Dumpster diving.

Explanation:

This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.

It is important to inform that the dumpster diving it is not limited to searching through  the trash for obvious treasures like acess codes or passwords written down on sticky notes.

8 0
2 years ago
Other questions:
  • The function below takes two parameters: a string parameter: CSV_string and an integer index. This string parameter will hold a
    14·1 answer
  • List 3 items that were on kens resume that should have been excluded
    13·2 answers
  • Which cost of purchasing a franchise would you still have if you start your own business​
    12·1 answer
  • Can your digital footprint be destroyed or does it remain active on the internet forever
    5·1 answer
  • )In a graph represented by adjacency matrix u can find all the neighbours of a given vertices in ____Operations
    6·1 answer
  • ________models software in terms similar to those that people use to describe real- world objects.
    6·1 answer
  • What is the purpose of the "time-to-live" (TTL) field of the IPv4 packet? a. ensures that the packet remains in the network long
    6·1 answer
  • Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
    15·1 answer
  • What is pollution?
    14·2 answers
  • You have received an update package for a critical application you are running on a virtual machine. You have been told to insta
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!