A statement (for the QBASIC) is a set of instructions written by using keywords or commands of QBASIC. Every programming language uses keywords as a statement with certain syntax. The statements are the first stored in the memory and executed only when the RUN command is given
(01.02
High-level programming languages are used to write a wide variety of programs, like
operating systems, scientific modeling, and general applications.
True
False
Answer:
ture
Explanation:
hope it help u
# I need help with my python code, it won't work, and no matter what I try, I can't get it to run properly. Every time I try top run it, it gives me an error saying:
# syntaxError, bad input on line 43, I am not very good at programming, and I just started. I wanted to ask if you guys could help me.
# Here's my code, the purpose of it is to be a rock paper scissors game:
```
import random
def welcome_prompt():
print ("Rock paper Scissors game")
print ("Rules: Rocks beats Scissors, Scissors beats Paper, Paper beats Rock")
def get_player_move():
print ('Round ' + str(round))
print ("Please play one of the following")
move = raw_input(" 1) [R]ock, 2) [P]aper, 3) [S]cissors:")
if get_player_move == ("R"):
print ("You used Rock!")
return 1
elif get_player_move == ("P"):
print ("You used Paper!")
return 2
elif get_player_move == ("S"):
print ("You used Scissors!")
return 3
else:
print "Invalid input, please use capitalized initial (R,P,S)"
return get_player_move()
def get_computer_move():
get_computer_move = random.randint(1,3)
if get_computer_move == 1:
print ("Computer used Rock!")
return 1
elif get_computer_move == 2:
print ("Computer used Paper!")
return 2
elif get_computer_move == 3:
print ("Computer used Scissors!")
return 3
def compare_moves(get_player_move, get_computer_move):
if (get_player_move == 1 and get_computer_move == 1) or (get_player_move
== 2 and get_computer_move == 2) or (get_player_move == 3 and
get_computer_move == 3):
print ("It's a tie!")
return 0
elif (get_player_move == 1 and get_computer_move == 3) or
(get_player_move == 2 and get_computer_move == 1) or (get_player_move ==
3 and get_computer_move == 2):
print ("You win the round!")
return 1
elif (get_player_move == 1 and get_computer_move == 2) or
(get_player_move == 2 and get_computer_move == 3) or (get_player_move ==
3 and get_computer_move == 1):
print ("You lose the round!")
return -1
elif (get_player_move == 4):
print ("You didn't put in correct input, computer gets a free win")
return -1
player_score = 0
comp_score = 0
round = 0
welcome_prompt()
('Round ' + str(round))
while round< 10:
round = round + 1
get_player_move()
get_computer_move()
compare_moves(get_player_move, get_computer_move)
if compare_moves == 1:
player_score = player_score + 1
print 'Player Score'+ str(player_score)
print 'Computer Score'+ str(player_score)
elif compare_moves == -1:
comp_score = comp_score + 1
print 'Player Score'+ str(player_score)
print 'Computer Score'+ str(player_score)
print ("Game Over")
Answer:
hmm i would assume your syntax code has a hidden error that's messing up your code that you are trying to input inside your computers field matrix to do the game. question is where is that error?
Explanation:
the windows logon process has unexpectedly terminated
Answer
Windows corrupted
Explanation:
Try buying a new windows or resetting your laptop/pc
or your service failed to register/start
Windows login allows user accounts to log on to the system by opening the subscriber notification database and initiating user-level operations. The system may start with reduced functionality if the system resources required for Windows logon are insufficient.
What windows logon process has unexpectedly terminated?In order to read the list of user accounts that are set up for the machine, the Windows operating system reads the registry at logon.
The Windows logon page won't appear if the data can't be read, making it impossible for users to sign in to Windows. The level of registry damage determines whether Windows can finish the startup procedure or not.
You will need to boot the computer into the Recovery Console rather than Windows in this circumstance. Use the Startup Repair tool after entering the Recovery Console. For Windows installations that won't boot, Startup Repair automates frequent diagnostic and repair activities.
Therefore, All logon attempts, however, will be blocked if the Windows registry is seriously damaged. Windows crashes when you try to log on, and it restarts after that.
Learn more about Windows here:
https://brainly.com/question/6969788
#SPJ5
Discussion Topic:
Web maintenance plays a vital role in a website's development. It helps ensure
the online presence of any website by performing regular updates. Discuss the
benefits of web maintenance.
Need help can someone answer plz
Answer:
Prevents lagging
Explanation:
This prevents the website from being slow and upto shape so those who access it dont have difficulties
Time management is the ability to use time effectively.
Question 23 options:
True
False
Answer:
True
Explanation:
if you are able to manage time well, then that means you have good time management skills
I know this isn't the right platform for this question, but where should I go to get a good PC and a good monitor? I'm thinking about becoming a streamer.
Answer: Alienware is really good if you are into fps games such as call of duty but it depends on your price I know alien ware can be pretty expensive so it's up to you.
Match each type of option on the left with a corresponding function on the right.
Answer:
yes. the above is correct
Explanation: q posted
Answer: Anwer is correctly shown!!!!!!!!
Explanation:
HOPE IT HELPS Y'ALL!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
in addition to good design sense, what else do web designers need to be proficient in?
Web designers need to be proficient in Front-end coding languages in addition to good design sense.
Web designers build or redesign websites. They understand what it takes to make a website functional and easy to use, but also understand what is needed to make it aesthetically appealing to the user.
Web designers need to be proficient in Front-end coding languages in addition to good design sense.
Find out more on web design at: https://brainly.com/question/8391970
given that play_list has been defined to be a list, write an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list. do not modify play_list.
Answer:
new_list = play_list[0:4]
Explanation:
new_list = play_list[0:4] is an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list.
What do you mean by an expression?A syntactic item in a programming language that may be evaluated to discover its value is known as an expression in computer science. Statement, a grammatical construct that has no meaning, is frequently contrasted with expression.
It is a grouping of one or more constants, variables, functions, and operators that the programming language interprets and calculates (in accordance with its own principles of precedence and association). For mathematical expressions, this procedure is known as evaluation.
In straightforward contexts, the outcome is typically one of several primitive kinds, such as a complex data type, a complex data string, a complex data Boolean type, or another type.
A function, and hence an expression that contains a function, may have side effects in many programming languages. Normally, a side effect-containing phrase lacks referential transparency. Expressions can be converted into expression statements in various languages by adding a semicolon (;) at the end.
Learn more about expression, here
https://brainly.com/question/16804733
#SPJ5
A state in which two things are able to exist or occur together without problems or conflict...
Question 18 options:
Compatibility
Prototype
Packet
Static
Answer:
Compatibility
Explanation:
that's the definition of compatibility.
Axel is conducting some online research, and he wants to narrow down his search to a specific date
range, and he only wants to find images. What should he use?
O quotations
O a Boolean search
O truncation of terms
O filters
Answer:
filters
Explanation:
you use filters to specify what you want to find
PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS
↓ Scroll Down to See Answer ↓
∧-∧ But Read the Explanation to Make Sure ∧-∧
Answer/Explanation:
These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.
Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.
The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.
There seems to be an emerging requirement to specify cryptographic strength objectively rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected that U.S. Government (USG) and industry will soon require specific quantitative data to define the point at which a cryptographic technology or product will satisfy user requirements.
Knowing that these 2 Choices Don't really look Right...
Because it our job = Wrong
Because encryption algorithm are always weak = Wrong
So It leads us to these...
To Prevent all Decryption = ?
To protect online Information = ?
But Base on the Information below:
Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.
Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.
Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.
I would say the Answer is To Protect Online Information.
You could Read the Explanation Above If you want to Check.
[RevyBreeze]
algorithm to find the difference between two numbers second number is greater than first
Plzzz solve this problem
Answer:
You should concentrate yourself
Explanation:
1=x
2=y
x<y
hence proved solved thank me later
differentiate between program virus and boot sector virus
Answer:
The virus replaces the default program with its own corrupted version. A boot sector virus is able to infect a computer only if the virus is used to boot up the computer. The computer will not be infected if the virus is introduced after the boot-up process or when the computer is running the OS
Explanation:
please mark me brainlisted answer please
Explanation:
i don't know this but i just need the points
Which UPPER function is written so that all text in cell B4 will be capitalized? O=UPPER(B4) O=UPPER[B4] O UPPER B4 O=UPPER
What does an arrow after a command indicate
Answer:
the command still has to be carried out.
I
What is a Watermark?
How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?
Answer:
you can take guide from
hope this will help you....!
Complete a flowchart and a Python program to calculate grade of a student based on marks using the following criteria:
Ask a student for their marks and if their marks are:
More than 90 – print “A*”
Between 80 and 90 – print “A”
Between 70 and 80 – print “B”
Between 60 and 70 – print “C”
Between 50 and 60 – print “D”
Between 40 and 50 – print “E”
Under 40 – print “Fail”
Answer:
grade = int(input("Enter grade: ")
if grade > 90:
print("A*")
elif grade > 80 and grade < 90:
print("A")
elif grade > 70 and grade < 80:
print("B")
elif grade > 60 and grade < 70:
print("C")
elif grade > 40 and grade < 50:
print("E")
else:
print("Fail")
Explanation:
12. Your project specifications call for a business rule that the database design can't
enforce. What tool should you use to enforce this business rule?
A. Trigger
B. Weak entity
C. Exception
D. Lookup entity
A lot of business rules needs to be triggered so as to run.
In making of business rule, one can select triggers to run some specific events or run using some particular specified frequency.
The trigger options differs based on the type of rule you are interested in. One can also use multiple triggers when using a single rule.
Learn more about rules from.
https://brainly.com/question/5707732
HELP PLZ 50 POINTS
What code would add a new array item named "home" to the array below?
var titles = ["score", "points"];
titles.put("home");
titles.push("home");
titles.set("home");
array.push("home");
Answer:
titles.push("home");
Explanation:
It depends on if you want to change the original array or not, but since you are just adding on I think this is the correct option.
"... 5 ways to add an item to the end of an array. Push, splice, and length will mutate the original array. Whereas concat and spread will not and will instead return a new array. Which is the best depends on your use case" (www.samanthaming.com)
[] Attached is from the same source
-> I think this is correct
Have a nice day!
I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)
- Heather
akira has a mobility impairment that makes it difficult to type on a keyboard. what technology can she use to create written documents without using a keyboard?
The screen reader technology she can use to create written documents without using a keyboard if Akira has a mobility impairment that makes it difficult to type on a keyboard.
What is Screen reader technology?An assistive technology known as a screen reader reads text, such as the document you see on your screen.
The audio output of screen reader technology is used to describe the information on the screen. A screen reader may narrate the operations of the computer or device as well as read aloud webpages and documents.
When reading text on a screen, a screen reader employs a Text-To-Speech engine to convert it to speech.
Thus, the screen reader technology she can use to create written documents without using a keyboard if Akira has a mobility impairment that makes it difficult to type on a keyboard.
Learn more about the Screen reader technology here:
https://brainly.com/question/7600315
#SPJ2
how many 2/8 pound patties can she make from 7/8 of a pound of hamburger
Answer:
3/8
Explanation:
Because 2 can't go into 7, the next best thing is 6, so 2x3 is 6 with 1/8 left over~~~~~hope this helps :) pls brainlist
You have created a slide that is functional, but a bit on the boring side. In five to ten sentences, describe changes you would make to the slide to make it more effective.
Answer:
I would add colors to the backround of the slide to decorate it and make sure it is not distracting, Use different fonts but dont make it too fancy.
Explanation:
Your Welcome
Which of the following rules need to be followed when using variables?
Choose all that apply.
Answer:
- All variable names must begin with a letter of the alphabet or an. underscore( _ ).
-After the first initial letter, variable names can also contain letters and numbers.
-Uppercase characters are distinct from lowercase characters.
-You cannot use a C++ keyword as a variable name.
Answer:
Variable names must begin with a letter or an underscore( _ )
After the first initial letter, variable names can also contain letters and numbers. ...
Uppercase characters are distinct from lowercase characters. ...
You cannot use a keyword as a variable name.
Explanation:
- What is the use of border? Differentiate between changing color of cells and color of data class 6
Conditional formatting makes it easy to highlight interesting cells or ranges of cells, emphasize unusual values, and visualize data by using data bars, color scales, and icon sets that correspond to specific variations in the data.
A conditional format changes the appearance of cells on the basis of conditions that you specify. If the conditions are true, the cell range is formatted; if the conditions are false, the cell range is not formatted. There are many built-in conditions, and you can also create your own (including by using a formula that evaluates.
what hash format are modern windows login passwords stored in?
User passwords are hashed and stored in a registry hive as either an LM hash or an NTLM hash. This file requires System privileges to view.
What are the windows?Microsoft created Windows as an operating system. The operating system is responsible for allowing to use a computer. Windows comes preloaded on the majority of new personal computers (PCs), which contributes to its status as the world's most popular operating system.
A window is a distinct viewing area on a computer display screen that is part of a system that allows multiple viewing areas as part of a graphical user interface (GUI). As part of a windowing system, windows are managed by a windows' manager.
Therefore, user passwords are hashed and stored as either an LM hash or an NTLM hash in a registry hive.
Learn more about the windows, refer to:
https://brainly.com/question/13502522
#SPJ5
....................................................................................................
Answer:
......................
..............
......
....
...
..
.
what is the full form of BASIC
Answer:
BASIC, in fullBeginner's All-purpose Symbolic Instruction Code, computer programming language developed by John G.
A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer�
Question 14 options:
Malicious
Algorithm
Static
Web Browser
Answer:
Algorithm
Explanation: