Write a program that teaches arithmetic to a young child. The program tests addition and subtraction. In level 1, it tests only addition of numbers less than 10 whose sum is less than 10. In level 2, it tests addition of arbitrary one digit numbers (which means that the sum could be more than 10). In level 3, it tests subtractions of one digit numbers with a non-negative difference. Generate random numbers for each of the levels based on its requirements, and get players answers as their response. Verify if the user entered the correct answer. The player will start at level 1, and gets up to two tries per problem. Advance from one level to the next when the player has achieved a score of five points (one point per successful answering the question).
Answer:
Explanation:
The following program is written in Java and creates three levels with the different set of randomly generated arithmetic problems. As the player goes getting more points they advance every 5 points to the next level.
import java.util.Random;
import java.util.Scanner;
class Main {
private static Random random = new Random();
private static Scanner in = new Scanner(System.in);
static int points = 0;
public static void main(String[] args) {
while (true) {
System.out.println(points);
if (points < 5) {
System.out.println("Starting Level 1");
levelOne();
} else if (points < 10) {
System.out.println("Starting Level 2");
levelTwo();
} else if (points < 15) {
System.out.println("Starting Level 3");
levelThree();
}
}
}
public static boolean levelOne() {
int numberOne = random.nextInt(10);
int numberTwo = random.nextInt((10 - numberOne));
int answer = numberOne + numberTwo;
int count = 0;
while (points < 5 && count < 2) {
System.out.println("What is " + numberOne + " + " + numberTwo + "?: ");
int userChoice = in.nextInt();
if (userChoice == answer) {
points += 1;
levelOne();
} else {
count += 1;
}
}
return false;
}
public static boolean levelTwo() {
int numberOne = random.nextInt(10);
int numberTwo = random.nextInt(10);
int answer = numberOne + numberTwo;
int count = 0;
while (points < 10 && count < 2) {
System.out.println("What is " + numberOne + " + " + numberTwo + "?: ");
int userChoice = in.nextInt();
if (userChoice == answer) {
points += 1;
levelTwo();
} else {
count += 1;
}
}
return false;
}
public static boolean levelThree() {
int numberOne = random.nextInt(10);
int numberTwo = random.nextInt(10);
int answer = numberOne - numberTwo;
int count = 0;
if (answer <= 0) {
levelThree();
}
while (points < 15 && count < 2) {
System.out.println("What is " + numberOne + " - " + numberTwo + "?: ");
int userChoice = in.nextInt();
if (userChoice == answer) {
points += 1;
levelThree();
} else {
count += 1;
}
}
return false;
}
}
define a computer, state its 3 main activities with examples of the functions of each of those activities
Answer:
The four main functions of a computer are to:
- take data and instructions from a user
-process the data according to the instructions
- and display or store the processed data.
These functions are also referred as the input function, the procedure function, the output function, and the storage function.
Explanation:
Use the drop-down menu to complete each statement. First, calculate the time spent doing each activity _____ . Next, multiply each category by ____ . Then, ___ the totals. Last, subtract the total from ____ .
Answer:1. Every day 2. 7 3. add 4. 168
Explanation:
I got it right on Edge
First, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.
What is the significance of the activity?The significance of activity may be determined by the fact that it usually enhances your health and lowers the threat of developing several diseases and other abnormal conditions like type 2 diabetes, cancer, and cardiovascular disease.
According to the context of this question, if you are required to calculate the time spent doing each activity in each day. You are required to make a chart that represents all such activities followed by multiplication. Then, you are considerably required to add the totals followed by subtracting the total from the total number of days in a year.
Therefore, first, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.
To learn more about Activities, refer to the link:
https://brainly.com/question/26654050
#SPJ3
help me pleaseeee
also what’s the center
Answer:
a property
Explanation:
h1 is the selector here, and 'center' is the value.
Can i get any information on this website i'd like to know what its for ?
https://www.torsearch.org/
Explanation: torsearch.org is a safe search engine mainly used for dark wed purposes. It does not track your location nor give any personal information.
6) Read the article posted on The Verge entitled How to fight lies, tricks, and chaos online and summarize the four steps. Then answer the following: Are these four steps enough guidance to help us discover truth in this day and age? Justify your answer with supporting arguments.
Answer:
A. Summarily, the four steps to accurately sharing information include;
1. consciously employing our senses to examine news deeply so as to accurately determine their source and purpose.
2. determining the origin of the story so as to know when and where it stems from.
3. examining the context of the material so as to find inconsistencies.
4. analyzing the evidence, arguments and information being presented in the story.
B. The four steps presented in the story are enough guidance to help us differentiate between accurate and false information on the net.
I agree with all of the points presented by the author of this article on analyzing information found online. Recently, I viewed a video on the net which was presented as a fact but a little digging revealed that the original video was a prank that had been edited, so as to remove important details. The first point raised by the speaker which is honing my senses to know that something is wrong with the information (it was too bad to be true), helped me to dig deeper. I found a link to the original video that revealed a completely different detail from what I had just seen.
Explanation:
For people who care that the information they share online are true, the points raised by the author of the article, "How to fight lies, tricks, and chaos online", can prove beneficial. The first step is applying one's senses to know when an information is too bad or good to be true. The next step is determining the origin of the story. When and where a story comes from is crucial to knowing if it is truly relevant.
Thirdly, reading in between lines might reveal that the story is deceitful and lacks truth or originality. Lastly weighing the evidence of the story will help the reader in knowing the usefulness of the story to him.
The child’s game, War, consists of two players each having a deck of cards. For each play, each person turns over the top card in his or her deck. The higher card wins that round of play and the winner takes both cards. The game continues until one person has all the cards and the other has none. Create a program that simulates a modified game of War.
The computer will play both hands, as PlayerOne and PlayerTwo, and, for each round will generate two random numbers and compare them.
If the first number is higher, PlayerOne’s score is increased by 1 and if the second number is higher, PlayerTwo’s score is increased by 1.
If there is a tie, no score is incremented.
When one "player" reaches a score of 10, that player should be deemed the winner and the game ends.
The range of numbers should be 1-13 to simulate the values of cards in the deck.
Answer:
In Python
import random
p1 = 0; p2 =0
while(p1 <10 and p2<10):
p1play = random.randint(1,14)
p2play = random.randint(1,14)
print("Player 1 roll: "+str(p1play))
print("Player 2 roll: "+str(p2play))
if p1play > p2play:
p1+=1
print("Player 1 wins this round")
elif p1play < p2play:
p2+=1
print("Player 2 wins this round")
print()
print("Player 1: "+str(p1))
print("Player 2: "+str(p2))
if p1 > p2: print("Player 1 wins")
else: print("Player 2 wins")
Explanation:
See attachment for complete program where comments were used to explain some lines
In matlab how would this specific code be written and how could I ask the user to enter a vector of coefficients for the polynomial model. Verify that the entry has an even number of elements (an odd number of elements would mean an even order polynomial). If an invalid vector is entered, prompt the user to re-enter the vector until an acceptable vector is entered. If the user does not enter an acceptable vector after 5 attempts (including the first prompt), display a warning and remove the last element of the last vector entered. (For example, if the last user input is [1 2 3 4 5], the vector becomes [1 2 3 4]).
my code
[1,2,3,4];
Answer:
Explanation:
that is correct 1234
See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.
For instance, for input file:
ABCDEFGHIJKLM
It will output:
ADGJM
Iseek_example.c file contant:
// C program to read nth byte of a file and
// copy it to another file using lseek
#include
#include
#include
#include
void func(char arr[], int n)
{
// Open the file for READ only.
int f_read = open("start.txt", O_RDONLY);
// Open the file for WRITE and READ only.
int f_write = open("end.txt", O_WRONLY);
int count = 0;
while (read(f_read, arr, 1))
{
// to write the 1st byte of the input file in
// the output file
if (count < n)
{
// SEEK_CUR specifies that
// the offset provided is relative to the
// current file position
lseek (f_read, n, SEEK_CUR);
write (f_write, arr, 1);
count = n;
}
// After the nth byte (now taking the alternate
// nth byte)
else
{
count = (2*n);
lseek(f_read, count, SEEK_CUR);
write(f_write, arr, 1);
}
}
close(f_write);
close(f_read);
}
// Driver code
int main()
{
char arr[100];
int n;
n = 5;
// Calling for the function
func(arr, n);
return 0;
}
Answer:
See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.
For instance, for input file:
ABCDEFGHIJKLM
It will output:
ADGJM
Iseek_example.c file contant:
// C program to read nth byte of a file and
// copy it to another file using lseek
#include
#include
#include
#include
void func(char arr[], int n)
{
// Open the file for READ only.
int f_read = open("start.txt", O_RDONLY);
// Open the file for WRITE and READ only.
int f_write = open("end.txt", O_WRONLY);
int count = 0;
while (read(f_read, arr, 1))
{
// to write the 1st byte of the input file in
// the output file
if (count < n)
{
// SEEK_CUR specifies that
// the offset provided is relative to the
// current file position
lseek (f_read, n, SEEK_CUR);
write (f_write, arr, 1);
count = n;
}
// After the nth byte (now taking the alternate
// nth byte)
else
{
count = (2*n);
lseek(f_read, count, SEEK_CUR);
write(f_write, arr, 1);
}
}
close(f_write);
close(f_read);
}
// Driver code
int main()
{
char arr[100];
int n;
n = 5;
// Calling for the function
func(arr, n);
return 0;
}
Explanation:
Arnie is planning an action shot and wants the camera to move smoothly alongside his running characters. He is working on a tight budget and can’t afford expensive equipment. What alternatives could you suggest?
Mount the camera on a wagon, wheelchair, or vehicle and move it next to the characters.
Rearrange your script so you don’t need to capture the motion in that way.
Try running next to the characters while keeping the camera balanced.
See if you can simulate the running with virtual reality.
how to check if serial interface is dte ot DCE?
If you can see the DTE/DCE cable, you can tell by looking which router has the DCE interface connected to it - the letters "DTE" or "DCE" will either be molded into the connector itself, or if it's an older cable there should be a little piece of tape on the cable that tells you what the interface type is.
Take the program written last weekend that creates a deck of cards, shuffles them, and then lists them out. Modify the program to 'deal' two hands of cards (two players). Each player will be dealt 5 cards. Deal one to the first player, then one to second player. Repeat until both players have 5 cards in their hand. Then compute the total points in each player's hand and determine the winner with the most points. If a player has an ace, then count that as 11 points. Print out the winning player total points and then his cards. Then print out the losing player total points and his cards. Turn in both your code and a copy of the screen output.
Answer: Here, you might need to make some changes to format it how you'd like, but it gives you the desired output :)
Explanation:
import random as chunky
def play():
hand1, hand2 = [], []
for n in range(5):
hand1.append(chunky.choice(cardList))
hand2.append(chunky.choice(cardList))
print("Hand 1: ", end= "")
for n in hand1:
print(n, end= " ")
print()
print("\nHand 2: ", end= "")
for n in hand2:
print(n, end= " ")
print()
while "A" in hand1:
hand1[hand1.index("A")] = 11
while "A" in hand2:
hand2[hand2.index("A")] = 11
print(f"\nHand 1 Total: {sum(hand1)} Hand 2 Total: {sum(hand2)}")
print("\nHand 1 WINS!") if sum(hand1) > sum(hand2) else print("\nHand 2 WINS!")
cardList = [1,2,3,4,5,6,7,8,9,10,"A"] #Skipped King, Queen, and Jack. Did not know how to incorperate them
chunky.shuffle(cardList)
looper = True
while looper == True:
play()
x = input("\n\nWould you like to go again?(y/n): ")
if x.lower() == "n":
quit()
How can you access your router if your provider is spectrum I've tried calling spectrum, they tried helping me but somehow it hasn't really helped me, is there any other way that I can access my router?
Answer:
what do you mean by access?
Explanation:
if anything you can try to make an account with spectrum in order to connect your router and see if its connect with your current internet provider. Another thing is most router have an app, check with you comes with one. If it does then this will allow you to change default name and password that your router came with.
Question 2 (10 points)
enables you to view data from a table based on a specific
A-
criterion
Query
Report
Form
All of the above
Answer: Query
Explanation:
A query simply enables one to view data from a table based on a specific criterion.
We should note that a query is simply referred to as a precise request that is used when retrieving information with the information systems.
When requesting for the data results, and also for the request of some certain action on data, the query is used. If the user wants to perform calculations, answer a particular, make adjustments to w table etc, the query is used.
What two windows security updates do most organizations always patch?
Answer:
Explanation:
Patch Tuesday is the name given to the day each month that Microsoft releases security and other patches for their operating systems and other software. Patch Tuesday is always the second Tuesday of each month and more recently is being referred to as Update Tuesday.
Plz help, will guve brainliest to best answer (if i can)
Answer:
Online text:1,3,4
not online text:2,5
This image shows a web designer’s grids for different pages on a website. The uppermost box on each page is the website’s identity. Which important principle of a good website has the designer violated?
Answer:
consistency
Explanation:
plato
the uppermost box is different sizes and different positions everytime, that violatesone of the principles of design which is consistency.
What is a sorting algorithm
Explanation:
In computer science, a sorting. algorithm is an algorithm that puts elements of a list in a certain order. The most frequently used orders are numerical order and lexicographical order. Efficient sorting is important for optimizing the efficiency of other algorithms that require input data to be in sorted lists
((PLEASE HELP ME)) i need to get all my school work done before thursday
------------- are used to navigate between pages and Web sites.
Question 1 options:
Transitions
Animations
Hyperlinks
None of the above
Answer:
none of the above
Explanation:
Web navigation refers to the process of navigating a network of information resources in the World Wide Web, which is organized as hypertext or hypermedia. The user interface that is used to do so is called a web browser.
What is the fastest way to copy the format from one cell to multiple other cells?
Double-click on the Format Painter.
Single-click on the Format Painter.
Use Copy and Paste commands.
Use Cut and Paste commands.
Double clicking on the format pointer is the fastest way to copy the format from one cell to multiple other cells. Thus, the correct option is A.
What is Format pointer?The format pointer holds a value which represents the memory address of an available data item in the file. If the data item from the file becomes unavailable. For example, because it is in a program which has been canceled then the pointer format is considered to hold a value which is incompatible with the format options.
Use the Format Painter to quickly apply the same formatting, such as the color, font style and size, or border style, to multiple pieces of text or graphics in the data item. With the help of format painter, a person can copy all of the formatting from one object and apply it to another object think of it as copying and pasting for formatting.
Therefore, the correct option is A.
Learn more about Format painter here:
https://brainly.com/question/29563254
#SPJ2
Graphic software task
Answer:
Graphic Designers
ProofHub as Project Management Tool. ProofHub is a versatile project management software for designers. ...
Jira. ...
Kanbanize. ...
Trello as Project Management Software for Graphic Designers. ...
Basecamp as Tool for Project Management. ...
Podio. ...
Asana. ...
Dropbox.
More items...•
What year was "scripting" first invented
Answer:
Late 1950's
Explanation:
I hope this helps, have a great day :)
grade 11 essay about the year 2020
Answer:
This 2020 have a new normal class because of CO VID-19 Disease have more students and teachers patient the teachers is preparing a module to her/his student and the student is answering are not learning lesson because of the COV ID-19 the whole word enduring to that pandemic and all fronliners is the hero in this pandemic because all frontliners is helping the people to we heal and to healed that virus.
Explanation:
What is a key consideration when evaluating platforms?
Answer:
The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.
Pitch an idea for an app that would help with sustainability (examples could be recycling, food waste or energy). What features would it have, how would one of these features work and how would it positively impact the user of the app
you could do something like homeless help, it would be able to find homeless ppl if they signed up and get them a partner to help them with there life
Explanation:
On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance (number of keys) from that key, and r is 2(1/12). Given an initial key frequency, output that frequency and the next 4 higher key frequencies.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f} {:.2f} {:.2f} {:.2f} {:.2f}'.format(your_value1, your_value2, your_value3, your_value4, your_value5))
Ex: If the input is:
440
(which is the A key near the middle of a piano keyboard), the output is:
440.00 466.16 493.88 523.25 554.37
Answer:
In C:
#include <stdio.h>
#include <math.h>
int main(){
float f0,r,temp;
r = pow(2.0,1.0/12);
printf("f0: "); scanf("%f", &f0);
temp = f0;
for(int i = 0; i<=4;i++){
f0 = f0 * pow(r,i);
printf("%.2lf ", f0);
f0 = temp; }
return 0;
}
Explanation:
This declares f0, r and temp as float
float f0,r,temp;
This initializes r to 2^(1/12)
r = pow(2.0,1.0/12);
This prompts the user for f0
printf("f0: "); scanf("%f", &f0);
This saves f0 in temp
temp = f0;
This iterates the number of keys from 0 to 4
for(int i = 0; i<=4;i++){
This calculates each key
f0 = f0 * pow(r,i);
This prints the key
printf("%.2lf ", f0);
This gets the initial value of f0
f0 = temp; }
return 0;
The virus which activated on a specific data and time is called
What should Anthony use to determine his available study hours for an upcoming project? LOOK AT THE PICTURE
Answer:
The answer is B i got it right
Explanation:
Answer:
The correct answer is B
Explanation:
Assume that the client wants to retrieve the www.cnn home page but has no information about the www.cnn web server IP address. Describe the process of the client obtaining the IP address for the hostname www.cnn under the assumption that it is not cached at the local DNS server and that the local DNS server has not cached an entry for the DNS server. Describe this for the recursive case!.
Answer:
You could type ipconfig www.cnn in command promt.
Explanation:
Your co-worker who went to UCLA tells you that DHCP is not enabled at your new job, so you should just use the same IP address that you have at home to connect to the internet. He told you it should work because your computer is communicating with a unique public IP address at home, so no other computer in the world would have it. When you try this, your computer does not have internet access. Give two reasons why?
Answer:
1. internet connection is not enabled on the computer.
2. The DHCP server in the company is not enabled as well.
Explanation:
For a user to access the internet, the computer must have a public IP address that is either assigned to it by a service provider or dynamically from the DHCP server in the computer. In the case of the former, the user just needs to enable the internet connection to obtain the unique IP address.
If the DHCP server or the internet connection is not enabled, the user would not have access to the internet.