The attack vector used by the threat actor is the Supply Chain. The correct option is C.
What is an attack vector?An attack vector is a strategy for breaking into a computer system or network without authorization. The entire number of attack vectors that an can use to influence a network or computer system or extract data is known as the attack surface.
Hacker can take advantage of system weak-nesses, including the human factor, using attack vectors. Viruses, mal-ware, email attachments, webpages, pop-up windows, instant messaging (IMs), rooms, and de-ceit are all common cyber-attack vectors.
Therefore, the correct option is C. Supply Chain.
To learn more about attack vectors, refer to the link:
https://brainly.com/question/27962411
#SPJ4
THIS IS PYTHON QUESTION
d = math.sqrt(math.pow(player.xcor() - goal.xcor(), 2) + math.pow(player.ycor()-goal.ycor(), 2))
here is the error message that I am getting when I run this using the math module in python: TypeError: type object argument after * must be an iterable, not int
Answer:
ok
Explanation:yes
How will Excel summarize the data to create PivotTables? summarize by row but not by column summarize by column but not by row summarize by individual cells summarize by row and by column
Answer:
D. summarize by row and by column
Answer:
D.
Explanation:
3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification
Here's the correct match for the purpose and content of the documents:
The Correct Matching of the documentsProject proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.
Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.
Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.
Read more about Project proposal here:
https://brainly.com/question/29307495
#SPJ1
Is there anything you should be doing and / or do better at home to make sure your computer is always clean and running efficiently?
Answer:
Using the proper computer equipment and regularly performing a few small maintenance activities will help to keep your computer running smoothly and efficiently.
Organize your installation disks
Protect Your Computer Equipment from Power Surges. ...
Defragment Your Hard Drive. ...
Check Your Hard Disk for Errors. ...
Backup Your Data.
Update everything
Clean up your software.
Run antivirus and spyware scans regularly.
Explanation:
proprofs: Universal Containers has setup a picklist dependency between Region and Zone on the Account object. The sales manager has requested that when a user selects a region a zone must also be selected.How can this be achieved
Answer:
To comply with the Sales Manager's request that a user who selects a region must also select a zone,
set up the picklist dependency between the region and the zone.
Explanation:
Setting up the picklist dependency depends on the creation of a module that has a source field and a target field. The target field (region) becomes the controlling field, while the source field (zone) becomes the checkbox field. This will ensure that the values picked for the target field (region) has valid values that depend on the value of the controlling field (zone).
What is something you can setup within your email account to prevent potentially harmful emails making their way to your inbox?.
The thing that one need to setup within their email account to prevent potentially harmful emails making their way to your inbox are:
Set Up Filters.Block unwanted Email Addresses.Report Spam Directly.Do Unsubscribe from Email Lists, etc.Which feature helps to prevent spam messages from being sent to your inbox?To avoid spam in one's email, one of the best thing to do is to Run your inbox through spam filter and virus filter.
Hence, The thing that one need to setup within their email account to prevent potentially harmful emails making their way to your inbox are:
Set Up Filters.Block unwanted Email Addresses.Report Spam Directly.Do Unsubscribe from Email Lists, etc.Learn more about Email from
https://brainly.com/question/24688558
#SPJ1
Increase the value of cell c30 by 15%
To increase the value of cell C30 by 15%, you can multiply the current value of C30 by 1.15.
To increase the value of cell C30 by 15%, you can follow these steps. First, multiply the current value of C30 by 0.15 to calculate 15% of the value. Then, add this calculated amount to the current value of C30. This can be expressed as C30 + (C30 * 0.15). For example, if the current value of C30 is 100, you would perform the calculation 100 + (100 * 0.15) to get the increased value. In this case, the result would be 115. This method ensures that the value in cell C30 is increased by 15% while retaining the existing value. Adjusting calculations accordingly based on the desired value and spreadsheet software used will allow you to increase the value of cell C30 by 15%.For more such questions on Cell C30:
https://brainly.com/question/31706410
#SPJ8
In a block of addresses we know the IP address of one host is Roll no. Roll no. Roll no. Roll no./20.What is the first address and the last address of this block? Find the number of addresses in the block?
Hint: if your roll no is 33 then your ip address will look like this: 33.33.33.33/20
Answer:
If there’s one topic that trips people up (both new and experienced) in the networking industry, it is that of Subnetting.
One of the reasons this happens is that one has to perform (mental) calculations in decimal and also binary. Another reason is that many people have not had enough practice with subnetting.
In this article, we will discuss what Subnetting is, why it came about, its usefulness, and how to do subnetting the proper way. To make this article as practical as possible, we will go through many examples.
Note: While subnetting applies to both IPv4 and IPv6, this article will only focus on IPv4. The same concepts explained here can be applied to IPv6. Moreover, subnetting in IPv6 is more of a want rather than a necessity because of the large address space.
IP address network
For example, any traffic with a destination IP address of 192.168.1.101 will be delivered to PC1, while traffic addressed to 192.168.1.250 will be delivered to SERVER.
Note: This is an oversimplification of things just for understanding sake and refers to Unicast (one-to-one) IPv4 addresses. Traffic sent to Multicast (one-to-many) and Broadcast (one-to-all) IP addresses can be delivered to multiple devices. Also, features like Network Address Translation (NAT) allow one IP address to be shared by multiple devices.
To help your understanding of IP addresses and subnetting, you need to resolve the following fact in your head: Computers think in binary, that is, 0s and 1s. Therefore, even though we see an IP address represented like 192.168.1.250, it is actually just a string of bits – 32 bits in total for IPv4 addresses.
To make them more readable for humans, IPv4 addresses are represented in dotted decimal notation where the 32 bits are divided into 4 blocks of 8 bits (also known as an octet), and each block is converted to a decimal number.
For example, 01110100 in binary is 116 in decimal:
A unicast IPv4 address such as 192.168.1.250 can be divided into two parts: Network portion and Host ID. So what does this mean? Well, IPv4 addresses were originally designed based on classes: Class A to Class E. Multicast addresses are assigned from the Class D range while Class E is reserved for experimental use, leaving us with Class A to C:
Class A: Uses the first 8 bits for the Network portion leaving 24 bits for host IDs. The leftmost bit is set to “0”.
Class B: Uses the first 16 bits for the Network portion leaving 16 bits for host IDs. The two leftmost bits are set to “10”.
Class C: Uses the first 24 bits for the Network portion leaving 8 bits for host IDs. The three leftmost bits are set to “110”.
Note: The range of Class A is actually 1-126 because 0.x.x.x and 127.x.x.x are reserved.
With these classes, a computer/device can look at the first three bits of any IP address and determine what class it belongs to. For example, the 192.168.1.250 IP address clearly falls into the Class C range.
Looking at the Host ID portion of the classes, we can determine how many hosts (or number of individual IP addresses) a network in each class will support. For example, a Class C network will ideally support up to 256 host IDs i.e. from 00000000 (decimal 0) to 11111111 (decimal 255). However, two of these addresses cannot be assigned to hosts because the first (all 0s) represents the network address while the last (all 1s) represents the broadcast address. This leaves us with 254 host IDs. A simple formula to calculate the number of hosts supported
Explanation: Final answer is Start address: 192.168.58.0 + 1 = 192.168.58.1
End address: 192.168.58.16 – 2 = 192.168.58.14
Broadcast address: 192.168.58.16 – 1 = 192.168.58.15
What is one outcome of an integration point?
Answer:
What is one outcome of an integration point? It provides information to a system builder to potentially pivot the course of action. It bring several Kanban processes to conclusion. It supports SAFe budgeting milestones.
flujograma de nómina
Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics and federal problem-solvers. How might that explain some of the security vulnerabilities present in the “cloud” today?
It should be noted that the intention for the creation of the internet was simply for resources sharing.
The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.
It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.
Learn more about the internet on:
https://brainly.com/question/2780939
These statements describe saving presentations.
Name your file in a way enables you to find it later.
Click on an icon to save.
It is a good idea to save often.
Select the Save option in the File menu to save.
Save by selecting the Save option in the Tools menu.
Saving once is enough.
[ DO NOT REPLY FOR POINTS YOU WILL BE REPORTED ]
(multiple choice) (edgenuitу)
Answer: answer 4 and 5
Explanation:
to save something on a device option 4 and 5 is the best fit for this
Which is the correct option?
Answer:
C
Explanation:
Key logging is when a hacker can track every key u have clicked.
Java Eclipse Homework Calories
Package : chall12A
Class : Calories
Use a “while loop” in the code to solve the following problem:
Over a 14-day period, calculate the total number of calories that the user consumed.
Use the following information to create the necessary code. You will use a while loop in this code.
1. The following variables will need to be of type “int”:
• day
• calories
• totalCalories
1. Show a title on the screen for the program.
2. Ask the user if they want to run the program.
3. Initialize (give values) to those variables that need starting values.
4. If their answer is a capital or lowercase ‘Y’, do the following:
• Use a while loop to loop through the days.
• Ask the user for the number of calories he/she consumed on each day. Please • include the day number in your question. Example: “How many calories did you consume on day 1?”
Include the calculation to keep a running total of the calories consumed.
1. After 14 days, the code should fall out of the loop. Include a print statement that looks like this: “After 14 days, you consumed ____ calories.” (Of course, the computer will need to fill in the total number.)
2. Include an “else” so that there is an appropriate response if the user decides not to run the program.
import java.util.Scanner;
public class Calories {
public static void main(String[] args) {
int day = 0, calories = 0, totalCalories = 0;
System.out.println("Title");
Scanner myObj = new Scanner(System.in);
System.out.println("Do you want to continue?");
String start = myObj.nextLine();
if (start.toLowerCase().equals("y")){
while (day < 14){
day += 1;
System.out.println("How many calories did you consume on day " +day + ":");
calories = myObj.nextInt();
totalCalories += calories;
}
System.out.println("After 14 days, you consumed " + totalCalories + " calories");
}
else{
System.out.println("Goodbye!");
}
}
I hope this helps!
Computers are because they can perform many operations on their own with the few commands given to them
Computers are programmable because they can perform a wide range of operations on their own with just a few commands given to them. They are designed to carry out different functions through the execution of programs or software, which comprises a sequence of instructions that a computer can perform.
The instructions are expressed in programming languages, and they control the computer's behavior by manipulating its various components like the processor, memory, and input/output devices. Through these instructions, the computer can perform basic operations like arithmetic and logic calculations, data storage and retrieval, and data transfer between different devices.
Additionally, computers can also run complex applications that require multiple operations to be performed simultaneously, such as video editing, gaming, and data analysis. Computers can carry out their functions without any human intervention once the instructions are entered into the system.
This makes them highly efficient and reliable tools that can perform a wide range of tasks quickly and accurately. They have become an essential part of modern life, and their use has revolutionized various industries like healthcare, education, finance, and entertainment.
For more questions on Computers, click on:
https://brainly.com/question/24540334
#SPJ8
Why is it important in manufacturing to determine allowances? How do allowances relate to tolerance dimensioning?
Answer:
Sry I can’t really help you with this one
Explanation:
wite a short essay recalling two instance, personal and academic, of when you used a word processing software specifically MS Word for personal use and academic work
I often use MS Word for personal and academic work. Its features improved productivity. One use of MS Word was to create a professional resume. MS Word offered formatting choices for my resume, like font styles, sizes, and colors, that I could personalize.
What is MS WordThe software's tools ensured error-free and polished work. Using MS Word, I made a standout resume. In school, I often used MS Word for assignments and research papers.
Software formatting aided adherence to academic guidelines. Inserting tables, images, and citations improved my academic work's presentation and clarity. MS Word's track changes feature was invaluable for collaborative work and feedback from professors.
Learn more about MS Word from
https://brainly.com/question/20659068
#SPJ1
Given an integer n and an array a of length n, your task is to apply the following mutation to an: Array a mutates into a new array b of length n.
For each i from 0 to n - 1, b[i] = a[i - 1] + a[i] + a[i + 1].
If some element in the sum a[i - 1] + a[i] + a[i + 1] does not exist, it should be set to 0. For example, b[0] should be equal to 0 + a[0] + a[1].
Answer: provided in the explanation section
Explanation:
import java.util.*;
class Mutation {
public static int[] mutateTheArray(int n , int[] a)
{
int []b = new int[n];
for(int i=0;i<n;i++)
{
b[i]=0;
if(((i-1)>=0)&&((i-1)<n))
b[i]+=a[i-1];
if(((i)>=0)&&((i)<n))
b[i]+=a[i];
if(((i+1)>=0)&&((i+1)<n))
b[i]+=a[i+1];
}
return b;
}
public static void main (String[] args) {
Scanner sc = new Scanner(System.in);
int n= sc.nextInt();
int []a = new int [n];
for(int i=0;i<n;i++)
a[i]=sc.nextInt();
int []b = mutateTheArray(n,a);
for(int i=0;i<n;i++)
System.out.print(b[i]+" ");
}
}
cheers i hope this helped !!
The program is an illustration of loops and conditional statements.
Loops are used to perform repetitive operations, while conditional statements are statements whose execution depends on the truth value.
The program in Java, where comments are used to explain each line is as follows:
import java.util.*;
class Main {
public static void main (String[] args) {
//This creates a scanner object
Scanner input = new Scanner(System.in);
//This gets input for n
int n= input.nextInt();
//This declares array a
int []a = new int [n];
//The following loop gets input for array a
for(int i=0;i<n;i++){
a[i]=sc.nextInt();
}
//This declares array b
int []b = new int [n];
//The following loop mutates array a to b
for(int i=0;i<n;i++){
b[i]=0;
if(((i-1)>=0)&&((i-1)<n)){
b[i]+=a[i-1];
}
if(((i)>=0)&&((i)<n)){
b[i]+=a[i];
}
if(((i+1)>=0)&&((i+1)<n)){
b[i]+=a[i+1];
}
}
//The following loop prints the mutated array b
for(int i=0;i<n;i++){
System.out.print(b[i]+" ");
}
}
}
At the end of the program, the elements of the mutated array b, are printed on the same line (separated by space).
Read more about similar programs at:
https://brainly.com/question/17478617
Python please!
On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance (number of keys) from that key, and r is 2(1/12). Given an initial key frequency, output that frequency and the next 4 higher key frequencies.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f} {:.2f} {:.2f} {:.2f} {:.2f}'.format(your_value1, your_value2, your_value3, your_value4, your_value5))
Ex: If the input is: 440
(which is the A key near the middle of a piano keyboard), the output is: 440.00 466.16 493.88 523.25 554.37
Note: Use one statement to compute r = 2(1/12) using the pow function (remember to import the math module). Then use that r in subsequent statements that use the formula fn = f0 * rn with n being 1, 2, 3, and finally 4.
I inserted what I've already done and what error message I'm getting.
We have that the output that frequency with the next 4 higher key frequencies is mathematically given as
Output
120,127,13,134.8,142,1,151.19From the question we are told
On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance (number of keys) from that key, and r is 2(1/12). Given an initial key frequency, output that frequency and the next 4 higher key frequencies.Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
Output and frequencyGenerally the code will go as follows
# The key frequency
f0 = float(input())
r = math.pow(2, (1 / 12))
# The frequency, the next 4 higher key f's.
frequency1 = f0 * math.pow(r, 0)
frequency2 = f0 * math.pow(r, 1)
frequency3 = f0 * math.pow(r, 2)
frequency4 = f0 * math.pow(r, 3)
frequency5 = f0 * math.pow(r, 4)
# printing output
print('{:.2f} {:.2f} {:.2f} {:.2f} {:.2f}'.format(frequency1, frequency2, frequency3, frequency4, frequency5))
Therefore
Output
120,127,13,134.8,142,1,151.19
For more information on frequency visit
https://brainly.com/question/22568180
what is the meaning of Ram?
Answer:
Random-Access Memory
Explanation:
used as a short-term memory for computers to place its data for easy access
class Main {
static int[] createRandomArray(int nrElements) {
Random rd = new Random();
int[] arr = new int[nrElements];
for (int i = 0; i < arr.length; i++) {
arr[i] = rd.nextInt(1000);
}
return arr;
}
static void printArray(int[] arr) {
for (int i = 0; i < arr.length; i++) {
System.out.println(arr[i]);
}
}
public static void main(String[] args) {
int[] arr = createRandomArray(5);
printArray(arr);
}
}
Modify your code to use an enhanced for loop.
ty in advance
See below for the modified program in Java
How to modify the program?The for loop statements in the program are:
for (int i = 0; i < arr.length; i++) { arr[i] = rd.nextInt(1000); }for (int i = 0; i < arr.length; i++) { System.out.println(arr[i]); }To use the enhanced for loop, we make use of the for each statement.
This syntax of the enhanced for loop is:
for(int elem : elems)
Where elem is an integer variable and elems is an array or arrayList
So, we have the following modifications:
i = 0; for (int num : arr){ arr[i] = rd.nextInt(1000); i++;}for (int num : arr) { System.out.println(num); }Hence, the modified program in Java is:
class Main {
static int[] createRandomArray(int nrElements) {
Random rd = new Random();
int[] arr = new int[nrElements];
int i = 0;
for (int num : arr){
arr[i] = rd.nextInt(1000);
i++;
}
return arr;
}
static void printArray(int[] arr) {
for (int num : arr) {
System.out.println(num);
}
}
}
public static void main(String[] args) {
int[] arr = createRandomArray(5);
printArray(arr);
}
}
Read more about enhanced for loop at:
https://brainly.com/question/14555679
#SPJ1
With clear examples, describe how artificial intelligence is applied in fraud detection
Answer:
AI can be used to reject credit transactions or flag them for review. Like at Walmart
Explanation:
I work with AI, i know what i'm talking about.
you have a 10vdg source available design a voltage divider ciruit that has 2 vdc , 5vdc , and 8 vdc available the total circuit current is to be 2mA
If you try to divide 10V in three voltages, the sum of the three voltages must be equal to the total voltage source, in this case 10V. Having said this, 2 + 5 + 8 = 15V, and your source is only 10V. So you can see is not feasible. You can, for example, have 2V, 5V and 3V, and the sum is equal to 10V. Before designing the circuit, i.e, choosing the resistors, you need to understand this. Otherwise, I suggest you to review the voltage divider theory.
For instance, see IMG2 in my previous post. If we were to design a single voltage divider for the 5VDC, i.e, 50% of the 10V source, you generally choose R1 = R2., and that would be the design equation.
which of the following is not the correct definition of an operating system
A.
it controls all other execution in a computer
B.
interface between hardware and application programs
C.
its a platform for ensuring that other executions has taken place
D.
maintains consistency of data loss during execution
The correct answer is C. An operating system is not a platform for ensuring that other executions have taken place. An operating system is a software program that manages the hardware and software resources of a computer and provides common services for computer programs. It acts as an interface between the hardware and application programs and controls all other execution in a computer. It also maintains consistency of data during execution.
Anne needs to record the results of a business project that requires the analysis of varying or multiple changes. Which graph or chart can she use in a spreadsheet?
Anne can use
to record the results of a business project in a spreadsheet. It measures immediate or minute
of an event and plots the points using two axes.
Anne can use SCATTER PLOT GRAPH to record the results of a business project in a spreadsheet. It measures immediate or minute VALUES of an event and plots the points using two axes.
What is a scatter plot graph used for?A person can be able to determine the link or correlation between two variables using a scatter plot. If you attempting to determine whether the combination of your two variables might mean anything, you can be able to find out if there might be a relationship between your data points by plotting a scattergram with them.
The graphs that show the association between two variables in a data set are called scatter plots. It displays data points either on a Cartesian system or a two-dimensional plane.
Therefore, in the case of Anne, when two data sets need to be compared to one another to determine whether there is a relationship, a scatter analysis is used. She can plot the data points on a graph, you get a scattering of points that represent the relationship.
Learn more about scatter plot graph from
https://brainly.com/question/27874837
#SPJ1
See full question below
Anne needs to record the results of a science project that requires the analysis of varying or multiple changes. What graph or chart can she use in a spreadsheet?
Anne can use _______ (line graph , column chart , scatter plot graph) to record the results of a science project in a spreadsheet. It measures immediate or minute ______ (values , changes , sequences) of an event and plots the points using two axes.
What advantages would there be to using both subsystems and logical partitions on the
same machine?
Answer:
Explanation:
Advantages of using subsystem and logical partitions on same machine
Subsystems and logical partitions on the same machine reduces the data backup function.Hence there is no need to take the backup regularly.It increases the hardware utilization.Resource availability is high and it provides security to the resources.meet a person who is living far away from the family for a long time.ask question about her/his feelings about homesickness.Then write a report ?
The report based on the interview asked in the question is given below:
The ReportInterviewer: How do you feel about being away from your family for so long?
Person: It's tough. I'm homesick all the time. I miss my family and hometown, longing to share in their daily lives. I acknowledge personal growth from a distance but maintain contact through calls and visits. Staying connected grounds me and reminds me of the love back home, despite challenges.
Report: Emotional complexities of long-distance living revealed. They acknowledged personal growth and stay connected through regular communication despite their separation.
Read more about reports here:
https://brainly.com/question/23228258
#SPJ1
Write a program HousingCost.java to calculate the amount of money a person would pay in renting an apartment over a period of time. Assume the current rent cost is $2,000 a month, it would increase 4% per year. There is also utility fee between $600 and $1500 per year. For the purpose of the calculation, the utility will be a random number between $600 and $1500.
1. Print out projected the yearly cost for the next 5 years and the grand total cost over the 5 years.
2. Determine the number of years in the future where the total cost per year is over $40,000 (Use the appropriate loop structure to solve this. Do not use break.)
Answer:
import java.util.Random;
public class HousingCost {
public static void main(String[] args) {
int currentRent = 2000;
double rentIncreaseRate = 1.04;
int utilityFeeLowerBound = 600;
int utilityFeeUpperBound = 1500;
int years = 5;
int totalCost = 0;
System.out.println("Year\tRent\tUtility\tTotal");
for (int year = 1; year <= years; year++) {
int utilityFee = getRandomUtilityFee(utilityFeeLowerBound, utilityFeeUpperBound);
int rent = (int) (currentRent * Math.pow(rentIncreaseRate, year - 1));
int yearlyCost = rent * 12 + utilityFee;
totalCost += yearlyCost;
System.out.println(year + "\t$" + rent + "\t$" + utilityFee + "\t$" + yearlyCost);
}
System.out.println("\nTotal cost over " + years + " years: $" + totalCost);
int futureYears = 0;
int totalCostPerYear;
do {
futureYears++;
totalCostPerYear = (int) (currentRent * 12 * Math.pow(rentIncreaseRate, futureYears - 1)) + getRandomUtilityFee(utilityFeeLowerBound, utilityFeeUpperBound);
} while (totalCostPerYear <= 40000);
System.out.println("Number of years in the future where the total cost per year is over $40,000: " + futureYears);
}
private static int getRandomUtilityFee(int lowerBound, int upperBound) {
Random random = new Random();
return random.nextInt(upperBound - lowerBound + 1) + lowerBound;
}
}
The intent of a Do query is to accomplish a goal or engage in an activity on a phone.
False. The intent of a Do query is to accomplish a goal or engage in an activity on a phone.
The intent of a Do queryA computer query is a request for information or data made to a computer system or a database. It involves specifying specific criteria or conditions to retrieve relevant information from a database or perform a specific action.
Queries are commonly used in database management systems, where they allow users to search, filter, and sort data based on specific criteria. A query typically consists of a structured query language (SQL) statement that defines the desired data and any conditions or constraints to be applied.
Read mroe on query here query
#SPJ1
Write a new version of the Guess My Number program in which the
player and the computer switch roles. That is, the player picks a number
and the computer must guess what it is. In C++.
Code is provided below.
#include
#include
#include
using namespace std;
int main()
{
srand(static_cast (time(0))); //seed random number generator
int secretNumber = rand() % 100 + 1; // random number between 1 and 100
int tries = 0;int guess;
cout << "\tWelcome to Guess My Number\n\n";
do{
cout << "Enter a guess: ";
cin >> guess;
++tries;
if (guess > secretNumber){
cout << "Too high!\n\n";
}else if (guess < secretNumber){
cout << "Too low!\n\n";
}else{
cout << "\nThat’s it! You got it in " << tries << " guesses!\n";
}
} while (guess != secretNumber);
}
A new version of the Guess My Number program in which the player and the computer switch roles.
#include <iostream>
#include <cstdlib>
#include <ctime>
using namespace std;
int main()
{
int secretNumber; // the number the computer must guess
int guess; // the number the computer guesses
int tries = 0; // the number of tries the computer takes
// Get the secret number from the user
cout << "\tWelcome to Guess My Number\n\n";
cout << "Enter the number for the computer to guess: ";
cin >> secretNumber;
// Generate random numbers for the computer to guess
srand(static_cast (time(0))); //seed random number generator
do {
guess = rand() % 100 + 1; //generate random number between 1 and 100
++tries;
if (guess > secretNumber){
cout << "Computer guessed too high!\n\n";
}
else if (guess < secretNumber){
cout << "Computer guessed too low!\n\n";
}
else{
cout << "\nThe computer got it in " << tries << " guesses!\n";
}
} while (guess != secretNumber);
return 0;
}
Program is a set of instructions or commands that a computer follows in order to execute a task or achieve a desired output. It can also be defined as a collection of data or instructions that instruct a computer to perform certain tasks. A program is typically written in a high-level programming language that is understandable by humans, such as C++, Java, or Python. It is then compiled into an executable form that the computer can understand and execute.
To learn more about program
https://brainly.com/question/27359435
#SPJ1