We want to simulate constantly flipping a coin until we get 3 heads in a row. What kind of loop should we use

Answers

Answer 1

There are different types of loops that are used in computer programming. The kind of of loop that is suitable is the

while loop.

In computer programming languages, a while loop is simply known to be a control flow statement that gives code to be executed everytime based on a given Boolean condition.

The while loop can simply be said to be a repeating if statement.

It used to repeat a particular block of code in any number of times, until a said point or condition is met.

When used in C programming, it often in repeated manner executes a target statement.

Learn more from

https://brainly.com/question/21298406


Related Questions

A presenter selects multimedia materials primarily based on their ability to organize data. Distract the audience. Introduce information. Emphasize a point.

Answers

Multimedia materials encompass video, audio and pictorial elements of a presentation. These materials are useful extremely useful when emphasizing a point.

In other to establish importance, emphasis has to be laid on the key points of a lesson, teaching or information.

With multimedia tools, the important points could be aired verbally, diagrammatically with annotations or using live visuals to establish the proposed points.

Learn more : https://brainly.com/question/25682762

What will print to the console after running this code segment?


A. 15.

B. 16.

C. 18.

D. 21.

Answers

Answer:

16

Explanation:

answer =3+2

answer =5+3

return 8 × 2

16 will print to the console after running this code segment. Therefore, option B is correct.

What do you mean by code segment ?

A code segment, also known as a text segment or simply text, is a section of an object file or the program's virtual address space that contains executable instructions.

A character array segment that represents a text fragment. Even though the array is directly accessible, it should be treated as immutable. This allows for quick access to text fragments without the overhead of copying around characters.

In memory, the code segment functions normally as read-only memory and has a fixed size; thus, without the need for loading, it can generally be found in read-only memory (ROM) on embedded systems.

answer = 3+2, answer = 5+3

return 8 × 2

= 16

Thus, option B is correct.

To learn more about the code segment, follow the link;

https://brainly.com/question/20063766

#SPJ2

Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should avoid using a web app for the project

Answers

Rajesh might want to avoid the use of a web app for the project due to connectivity issues. Hence, one reason he might want to avoid using the Webb app is slow or poor internet connection.

Collaborating on a web application relies very heavily on network connectivity which is the what establishes the link ms allows the apllications to achieve optimum performance.

Therefore, slow internet connection is a major reason whuhe might want to avoid using a web app.

Learn more : https://brainly.com/question/25531734

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in _____ for file servers.

Answers

Answer:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in high-volume data storage for file servers.

the envelope method, notebook and pencil, and online software are all methods of ______.

Answers

Answer:

tracking your spending.

The envelope method, notebook and pencil, and online software are all methods of tracking your spending as per the given situation. The correct option is C.

What is software?

A set of instructions, data, or programs used to operate computers and carry out specific tasks is referred to as software. It is the inverse of hardware, which describes the physical characteristics of a computer.

Inner needs to track spending in personal and business activities in order to know financial status and budget effectively with available funds.

Without tracking spending, there is a risk of waste and overspending on unimportant items.

The envelop method entails putting money in different envelops for each category of spending. At the end of the period, you can check the envelops to see how much money was spent in each category.

Keeping track of expenses requires a notebook and a pencil.

QuickBooks online software can be used to track how much an individual or business has spent.

Thus, the correct option is C.

For more details regarding tracking the spend, visit:

https://brainly.com/question/14511380

#SPJ5

Your question seems incomplete, the missing options are:

estimating your unexpected expensesplanning for your futuretracking your spendingunderstanding your current expenses

How to fix common problem of a computer system?​

Answers

Some ways you could fix a common problem in a computer system are

Run a thorough virus scan.
Update your software.
Cut down on the bloat.
Test your Wi-Fi connection.
Reinstall the operating system.

Which command should you enter at the command prompt to display the current user's quota limits and disk usage?

Answers

wmic diskdrive get size

"Depression is being colorblind and constantly told how colorful the world is.”

Answers

Depression is when they tell you how good it is to walk but you can’t walk

On average, people spend about _____ minutes per day on apps that do not make them feel good such as apps for dating, social networking, gaming, entertainment, news, and web browsing .

Answers

Averagely, people (end users) spend about 27 minutes per day on software applications (programs) that do not make them feel good.

A software can be defined as a collection of data or set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.

Basically, software applications (programs) are broadly categorized into three (3) main groups and these are;

System softwareUtility softwareApplication software

An application software is typically designed and developed for the performance of a specific task rather than the operation of a computer system.

According to an American survey, people (end users) averagely spend about 27 minutes per day on software applications (programs) that do not make them feel good such as those focused on:

Social networkingDatingEntertainmentGamingNewsWeb browsing

On the other hand, people (end users) averagely spend about 9 minutes per day on software applications (programs) that make them feel good such as those focused on:

HealthExerciseReadingRelaxationEducation

Find more information: https://brainly.com/question/14379808

a virtual network of websites connected by hyperlinks is called

Answers

Answer:

it is called the World wide Web

Suppression of politically or socially unacceptable co
O backlinks
O compress
O forum
O censorship

Answers

Answer:

censorship

Explanation:

censorship means to block out something that is against the rules, to silence some sort of message/comments. so the answer is censorship

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

Answers

Computer data storage

An electronic element that stores data by changing its resistance based on the current that has passed through it, similar to RRAM (Resistive Random Access Memory), is called a Memristor.

What is memristor

The term "memristor" is a combination of "memory" and "resistor," indicating its ability to retain information based on its resistance state.

Memristors are considered a fourth fundamental passive circuit element, alongside resistors, capacitors, and inductors.

Learn more about electronic element at

https://brainly.com/question/24977425

#SPJ2

List down 5 elements of Multimedia

Answers

Answer:

text, image, audio, video, animation

Answer : The five elements of Multimedia are text, images, audio, video and animation.

Hope This Helps You.

why are extensions necessary in scratch programming as a whole?​

Answers

Extensions make it possible to connect scratch projects with eternal hardware

Difference between web browser and search engine.​

Answers

Answer:

A search engine is like Bing, but a web browser is a browser you can search from anywhere in the world and end up with the same search results.

Explanation:

uploaded ads give advertisers access to more inventory than responsive display ads. true or false?

Answers

Answer:

True

Explanation:

This is because of the fact that  it allows the marketing industry rise to higher rates.

Ture but you can do that for now and then when we can get it done today and then we

Present your opinions about using robots to help with household routines.​

Answers

Answer:

I believe robots helping with household routines is great!  Robots hold have great  capability to assist senior 's. Robots can hand appropriate medicines to older adults on time. They can mop the floor super fat and super good. Additionally, there are robots that can lift people up and move them to a certain place!

Explanation:

Cloud providers often charge their customers based on the amount of processing resources used, such as CPU usage. This practice is known as ________.

Answers

Platform as a Service (PaaS)

who is the father of computer?
a.jeff bezos
b.cgarles babagge
c.micky pointe
d.marlos carten​

Answers

Answer:

Explanation:

B.

A company gives out bonuses based on the amount of income generated by their sales representatives per month. Once the income is greater than $5000 a bonus of 10% of the generated income is given to the employees. Read the income generated and print the bonus

Answers

The code block which calculates the bonus amount earned based on sales is written thus in python 3 ;

income = eval(input("Enter generated income : "))

#takes input for the amount of income made

bonus = 0

#initialize the bonus amount

if income > 5000 :

#if the income earned is greater than 5000

bonus = (0.1 * income)

#bonus earned is 10%

print("Your bonus is :", bonus)

#display bonus

A sample run of the program is attached.

Learn more : https://brainly.com/question/15437930

1.* Parents can now buy GPS tracking devices for their children. This allows them to monitor
their child's location at any time.
Discuss the impact of tracking children with GPS devices.
In your answer, you might consider the impact on:
Cultural issues
Ethical issues

Answers

Answer:

well...

Explanation:

it will help with any issues really, the parents just want to be able to find their children if they get hurt, lost, or kidnapped, so I don't see how it can be a cultural or an ethical issue

A file contains 5000 bytes. Calculate the size of the file in kilobytes.
Your answer must be to one decimal place

You should show your working.

Answers

Answer:

5 Kilobytes

Explanation:

5000 bytes ÷ 1000 = 5 kilobytes

Anote los tipos de direcciones de IP que existen.​

Answers

Answer:

ENGLISH PLEASE.

Explanation:

Hey, can somebody convert this Pseudocode into a Python Program, I've been struggling to do so for a while.

Answers

Answer:

print("Enter a positive whole number: ")

NumberIn = int(input())

NumberOut = 0

Count = 0

while NumberIn > 0:

   Count = Count + 1

   PartValue = NumberIn % 2

   NumberIn = NumberIn // 2

   for i in range(1, Count - 1):

       PartValue = PartValue * 10

   NumberOut = NumberOut + PartValue

print("The result is: " + str(NumberOut))

Outputs:

Enter a positive whole number:  

22

The result is: 1011

Enter a positive whole number:  

29

The result is: 1111

Enter a positive whole number:  

-1

The result is: 0

what is cyber crime? is hacking is cyber crime ​

Answers

Answer:

Crime committed using computer networks.

Explanation:

well I don't think sooo..........

HOPE IT HELPS.......

Answer:

Cyber crime means the crime done through the means of internet.Using others account without permission,Leaking others personal information,etc.are example of it.

Yes,hacking is a cyber crime.

u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory

Answers

Answer:

B

Explanation:

Dynamic Random-Access Memory

At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server.

State the type of computer system that is required for EACH of the following purposes..

Processing of scientific data ...........

Distribution of data over a network

Working from home .....

Answers

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

The computer that's needed for processing scientific data is the supercomputer.

The computer that is needed for the distribution of data over a network is the client or server computer while the computer that's needed for working from home is a laptop.

A supercomputer simply means a computer that has a high level of performance and has thousands of processors. The server computer provides functionality for other devices.

Learn more about computers on:

https://brainly.com/question/24540334

Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advantage of this software option is _____.

Answers

Since Mavis is considering signing up for a hosted enterprise software solution for her small business, an advantage of the software is lower cost.

A hosted enterprise software solution is typically hosted off-site and in a private server that is owned by a third party. It's vital for organizations as it can be used in managing daily business activities.

The advantages of a hosted software model include reliable backup, reduction in IT costs, scalability of computing resources, etc. It is also necessary for managing critical business processes.

Read related link on:

https://brainly.com/question/25526416

With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.

Answers

Answer:

Your answer is...

Visual.

With visual voicemail, users can view message details, and in some cases read message contents without listening to them.

I hope this helped at all.

True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.

Answers

Answer:

True

Just look it up and put quizlet at the end of your question youll find it.

Other Questions
Successful marriages have all of the following characteristics except __________. A. Good communication B. Good debating skills C. Shared values and interests D. Commitment. Need help with this. What conclusion can you draw from the information shown in this figure?The speed of sound varies with the material in which the waves travel.Sound waves can move more quickly through liquids than through solids.Sound intensity is greater in water than in air.The frequency of sound increases with wave speed. Help Fast!!!!Part 1) Which decision by the British government made the colonies want to declare independence, according to the Declaration of Independence?Britain allowed the colonial legislatures to have too much power.Britain forced people to move to the United States.Britain enforced unfair taxes on the colonists. Britain refused to defend the colonies when they were attacked.Part 2) What is significant about the Declaration of Independence?It increased the power of government.It ended the American Revolution.It stated the American philosophy of government.It declared rights for women and African Americans. Submit your annual review. Make sure you have provided answers for things you have done well, things you need to improve, and your goals. Use as many of your spelling words as you can, ensuring that you spell them correctly. Remember to underline your spelling words when you use them. Use the following template to assist you with this project.Word Bank: annual, anniversary, annals, perennial, quadrennial, biennial, millennium, centennial, dialogue, poisonouscan someome help with this as soon as possible? if you were one of the soldiers that Washington helped, how would you feel? 4. Which of the following does the Bill of Rights protect?|A. The right to provoke a riot for a good causeB. The power of government to operate efficientlyC. The freedom to act without government interferenceD. The choice to overthrow an unjust government by force (I saw their starved lips in the gloam) 3) In this line from the poem, what does the phrase starved lips suggest? A) They are hungry for love. B) They are lonely and need more attention. C) They cannot speak and are mute, so their lips are starved. D) Their lips are colorless because the blood has drained from their faces Three of the forces in nature attract particles together, with varying strengths, to build the universe. Which is the only one that energizes the universe by making nuclear fusion possible Modeling by health leaders demonstrates the ______________ expected by everyone in the organization. the price of a machine is given as GHC 20,000 plus VAT. If the VAT rate is 12%, find the price that a customer must pay for the machine. Miss Rudolph recorded the change in temperature of a cooling liquid as -27.5 Fahrenheit over 2.5 minute. The temperature fell at a constant rate what was the rate of change in the temperature what name was given to territoty set aside for indigenous americans displaced from their traditional lands what is the medium for the sound waves for whales to communicate with each other? what is the name of the process in bacteria that involves dna transfer through a cytoplasmic connection known as a pilus? Find anangle in each quadrant with a common reference angle with 280, from0 brian period occurred approximately 500 million years ago, and we are currently in the Quaternary period.PERIODANIMALSPLANTSHumansFloweringplantsMammalsBirdsGinkosQuatemaryTertiaryCretaceousJurassicTriassicPermianPennsylvanianMississippianDevonianSilurianOrdovicianCambrianReptilesPinesAmphibiansClub mossesHorsetail rushesFemsAnimals with shellsFishesBased on the chart, describe the trends that can be observed in animal and plant fossils as they evolved over time.Use evidence from the chart to support your conclusions.B IV x x Font Sizes simplify the equation 8/27 simplified as an exponent Evolution represents biological change that accumulates over time. However, this change is not always apparent at every level in the biological hierarchy. Scientists most commonly observe the effects of evolution at the ________ level.