1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
2 years ago
8

DOES ANYONE KNOW COMPUTER SCIENCE?

Computers and Technology
1 answer:
Maru [420]2 years ago
6 0

Answer:

statClass.java

Explanation:

You use the classname of the public class.

One of those will contain main()

Note that this example has a typo. statClass vs startClass.

You might be interested in
Which of the following statements is not true about the TCP opening and closing of connections?
lubasha [3.4K]

Answer:  c.)

Explanation:

The bit SYN is used in order to synchronize segment numbers in the sender and receiving processes in hosts that are trying to start a data transmitting session between them.

It is initiated by the sending end, that set this bit to " 1", in the TCP header, starting which is known as a "3-way handshake process".

The bit SYN is not used in order to close a connection, the FIN bit is used for this purpose.

If one process set the FIN bit to "1", this means that it has no more data to send.

3 0
4 years ago
Which of the following information would best be displayed throughout the use of a time line
timama [110]

D. a list of all your birthdays including the years...

3 0
3 years ago
Read 2 more answers
True/False
Gnom [1K]

Answer:

True

Explanation:

Since most database applications are Server-Client  structured, the User interface sits on the clients and the database sits in the server... when I say database I'm referring to the DBMS (Database Management System). A server is needed to host the DBMS and in turn it stores data from the UI and feeds data back to the UI based on the instruction written by the developer.

8 0
3 years ago
Explain the working system of a computer with an example​
Gwar [14]

Answer:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

ExplanationExplanation:

5 0
2 years ago
Create a function that should simulate a game involving the rolling of a standard six-sided dice between two players. The functi
Law Incorporation [45]

Answer:

import random

def roll_dice(r):

   score1 = 0

   score2 = 0

   for i in range(r):

       for j in range(5):

           score1 += random.randint(1,6)

           score2 += random.randint(1,6)

           

       avg1 = score1/5

       avg2 = score2/5

       

       if avg1 > avg2:

           print("Player1 won the " + str(i+1) + ". round ")

       elif avg1 < avg2:

           print("Player2 won the " + str(i+1) + ". round ")

       else:

           print("Tie")

       

       score1 = 0

       score2 = 0

           

roll_dice(3)

Explanation:

Import the random module

Create a function called roll_dice that takes one parameter r

Initialize two scores as 0 for the players

Create a nested for loop. The outer loop will simulate the rounds and inner loop will simulate the each roll.

Inside the inner loop which iterates five times, generate random numbers for two players and add these numbers to their score.

When the inner loop is done, calculate the average score of the players. If the first average is greater, player1 wins the round. If the second average is greater, player2 wins the round. Otherwise, it is a tie. Also, set the scores to zero so that they start again.

Call the function with parameter 3, simulating 3 rounds

4 0
3 years ago
Other questions:
  • Ms. Rogers wants to see the names of all the students who scored below 25 on the test. Which of these custom options will help h
    5·1 answer
  • Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security
    10·1 answer
  • ____ uses markup to define the structure and layout of a web document.
    11·1 answer
  • How many inputs are included in the following requirement? REQUIREMENT: Write a program that asks the employee for their age. Th
    6·1 answer
  • True or false: when considering data backups, it is most important to verify that the integrity of the backup file or data is va
    9·1 answer
  • Explain where and why metallic material or non metallic material have been used in your home​
    8·1 answer
  • A key benefit of inheritance is Group of answer choices an object can have several types, it is type compatible with any of its
    11·1 answer
  • When sending emails and setting goals, you want to go beyond checkpoints of activities for your goals. What are examples of chec
    12·1 answer
  • Select the correct term to complete the sentence.
    7·1 answer
  • This study highlights that people access social networking sites to be
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!