The declaration and initialization of arrays involves creating and using the arrays
How to declare an array?Assume the programming language is Java.
To declare and initialize an array, we make use of:
One dimensional array: Data-Type Array-name [] = {List of array values}Two dimensional array: Data-Type Array-name [] [] = {List of array values}Assume the array name of the one dimensional array is num, and the data type is integer.
The following can be used to declare and initialize the array to have 5 elements
int num [] = {1,2,3,4,5}
Assume the array name of the two dimensional array is num, and the data type is integer.
The following can be used to declare and initialize the array to have 2 rows and 3 columns
int num [][] = {{1,2},{3,4},{5,6}}
Read more about arrays at:
https://brainly.com/question/22364342
Write a program that allows two players (player X and player O) to play a game of tic-tac-toe. Use a two- dimensional char array with three rows and three columns as the game board. Each element of the array should be initialized with an asterisk (*). The players take turns making moves and the program keeps track of whose turn it is. Player X moves first. The program should run a loop that:
#include <iostream>
using namespace std;
//function prototypes
void showBoard(char[][3]);
bool checkWinner(char[][3], char);
void playerMove(char[][3], char);
int main()
{
//declare variables needed
//declare 2D array for the board
//and initialize with all *
char board[3][3] = {{'*', '*', '*'},
{'*', '*', '*'},
{'*', '*', '*'}};
int moves = 0; //variable to keep track
//of number of moves
//to determine tie
cout << "TIC - TAC - TOE\n\n";
//while loop to repeat until 9 moves are done
while(true){
//display board
showBoard(board);
cout << "Player 1 moves\n";
//get player X move
playerMove(board, 'X');
//increment moves counter
moves++;
//if this is a winning move
//store winner and terminate
if(checkWinner(board, 'X')){
showBoard(board);
cout << "\nPlayer 1 (X) wins!\n";
return 0;
}
//if 9 moves are done
//break from loop
if(moves == 9)
break;
//display board again
showBoard(board);
cout << "Player 2 moves\n";
//do the same thing for player O
playerMove(board, 'O');
moves++;
if(checkWinner(board, 'O')){
showBoard(board);
cout << "\nPlayer 2 (O) wins!\n";
return 0;
}
}
//if we have gone this far and program
//still has not terminated (no winner)
//it means this is a tie
showBoard(board);
cout << "This game is a tie!\n";
//return 0 to mark successful completion of program
return 0;
}
//this function is helpful because we need to show
//the board repetitively during the program
void showBoard(char board[][3]){
cout << endl;
//loop on the rows
for(int row = 0; row < 3; row++){
//loop on the columns
for(int col = 0; col < 3; col++)
cout << board[row][col] << " ";
//display newline after each row
cout << endl << endl;
}
cout << endl;
}
//this function checks if second argument
//is a winning player
bool checkWinner(char board[][3], char player){
//boolean variable to check
//for winner later
bool flag;
//CHECK FOR WINNER IN ROWS
for(int row = 0; row < 3; row++){
//initialize flag to true
flag = true;
//loop within a row
for(int col = 0; col < 3; col++){
//Notice that the right part of the
//assignment operator, is an expression
//with a relational operator (==)
//this expression will yield either
//true (1) or false (0)
//while flag is already true (1)
//if multiplied by true (1) will result
//in true(0), or multiplied by false (0)
//will result in false (0)
flag *= (board[row][col] == player);
}
//after checking within row, if the flag
//is still true at this point, it means we have
//three chars of the same kind within the row,
//thus we have a winner
if(flag)
return true;
else
continue;
}
//CHECK FOR WINNER IN COLUMNS
//using a similar logic
for(int col = 0; col < 3; col++){
flag = true;
for(int row = 0; row < 3; row++){
flag *= (board[row][col] == player);
}
if(flag)
return true;
else
continue;
}
//CHECK FIRST DIAGONAL (row = col)
//reset flag to true
flag = true;
//check diagonal
for(int i = 0; i < 3; i++){
flag *= (board[i][i] == player);
}
//check if there is winner
if(flag)
return true;
//CHECK OTHER DIAGONAL (row = 2 - col)
//reset flag to true
flag = true;
//check diagonal
for(int col = 0; col < 3; col++){
flag *= (board[2-col][col] == player);
}
//check if there is winner
if(flag)
return true;
//if all of these have been checked
//and function still has not returned,
//it means there is no winner
return false;
}
//this function gets a move from the player,
//checks if it is valid, and if yes it puts
//it on the board
void playerMove(char board[][3], char player){
//variables to store user move
int row, col;
//get user move
cout << "Row: ";
cin >> row;
cout << "Col: ";
cin >> col;
//check if this is valid move
//you have to check if that tile has
//already been marked, or if tile
//of choice is out of bounds of board
while(board[row-1][col-1] != '*' ||
row > 3 || row < 0 ||
col > 3 || row < 0)
{
cout << "Invalid move! Try again\n";
cout << "Row: ";
cin >> row;
cout << "Col: ";
cin >> col;
}
//after validation, mark new move
board[row-1][col-1] = player;
}
Answer:
if on edgen. The answer is c
Explanation:
a) Explain any two problems associated with the existing system used by the organization. (25 marks)
Answer:
Lack of Strategy
Many of the most common MIS issues can be traced back to a lack of a solid strategy. Information systems leaders are well aware of the many tools available to gather data on their network. But putting that information to use is often a challenge.
At one time, technology departments served as a separate operation, providing tech support and keeping an organization’s server equipment running. Today, MIS leadership often sits alongside other business leaders, working together to ensure that the technology being used supports the overall mission of the company moving forward.
Meeting Organizational Needs
MIS plays an ever-increasing role in organizations, with professionals relying on technology for every aspect of operations. Sales and marketing rely heavily on customer relationship software to track client interactions, for instance, while accounting needs its own software for billing, invoicing and financial tracking.
With more than half of all companies now relying on big data analytics, MIS is playing an even more important role. Before making a decision, today’s management teams are likely to pull reports on existing activity to ensure they use facts rather than make educated guesses.
Explanation:
How many categories of computer do we have?
Answer:
The 10 types of computers include personal computers, desktops, laptops, tablets, hand-held computers, servers, workstations, mainframes, wearable computers and supercomputers.
list the factors that influenced the advancement of AI in recent years
Answer:
In any case, there are 5 factors which are driving the development of Artificial Intelligent and other technologies of Big Data, ML, etc.
Next-Generation Computing Architecture. ...
Open Data. ...
Growth in Deep Neural Networks. ...
Legal and Ethical Issues. ...
Historical Datasets.
positive and negative of adblock plus
Answer:
Pros and cons of ad blockers
Remove distracting ads, making pages easier to read.
Make web pages load faster.
Keep advertisers from tracking you across websites.
Reduce bandwidth (especially important with mobile devices)
Reduce battery usage (again, important for mobile devices)
p
What is information computer security
Answer:
Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
Explanation:
1.Skills
1.SkillsThe Top Skills Required for Cybersecurity Jobs
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...A Desire to Learn. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...A Desire to Learn. ...An Understanding of Hacking
2.Thesaurus
ThesaurusCybersecurity refers to the practice of securing electronic devices from unauthorized access or attack or the measures taken in pursuit of this practice.
3.Risk assessment
Risk assessmentWhat does a cybersecurity risk assessment include? A cybersecurity risk assessment identifies the various information assets that could be affected by a cyber attack (such as hardware, systems, laptops, customer data, and intellectual property), and then identifies the various risks that could affect those assets.
and last..........is four
4. Field
FieldDifferent branches of cyber security
FieldDifferent branches of cyber securityApplication security.
FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.
FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.
FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.
FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.Endpoint protection and mobile security.
FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.Endpoint protection and mobile security.Data governance, risk and compliance.
What service handles the execution of missed cron jobs in the /etc/cron.hourly, /etc/cron.daily, /etc/cron.weekly and cron.monthly files?
The service handles the execution of missed cron jobs is /etc/crontab.
Where are /etc/crontab is system crontabs file?This is a command that is often used by root user or daemons. It is used to configure system different kinds of jobs.
Vonclusively, Cron jobs are often seen in the spool directories. They are known to be often stored in tables known as crontabs. This /etc/crontab. is a service handles the execution of missed cron jobs.
Learn more about commands from
https://brainly.com/question/25243683
These are raised as livestock for meat and milk EXCEPT one
A. Hog
B. Goat
C. Carabao
D. Cattle
The livestock that is not raised for meat and milk is hog.
What are animals raised for meat?Livestock are known to be some domesticated animals that are said to be raised in an agricultural farm to give labor and produce things such as meat, eggs, milk, etc.
The animals that are raised for their meat and milk are:
Boar BroilerCattle, etc.Learn more about animals from
https://brainly.com/question/25897306
What year was internet inverted
[tex]\large\blue{\mid{\underline{\overline{\tt { →\:January \:1, 1983}\mid}}}}[/tex]
ARPANET→Advanced Research Projects Agency Networkthe forerunner of the Internet.[tex]\purple{\rule{15mm}{2.9pt}} \red{\rule18mm{2.5pt}} \orange{ \rule18mm{2.5pt}}[/tex]
[tex]\sf{\:мѕнαcкεя\: ♪...}[/tex]
How many bytes can be stored in a 4gb flash drive
Answer:
4,294,967,296; theoretically
Explanation:
There is 1024 bytes in a kb, 1024 kb in a mb, 1024 mb in a gb.
So we can use 1024³ as a multiplier to convert gb->byte.
1024³ * 4 = 4,294,967,296 bytes.
However, in practice hardrives always have less useable storage than the quoted amount.
What stands for “vlog”?
Answer:
Vlog means a Video Blog or log
Explanation:
Stay safe, stay healthy and blessed.
Have a blessed day !
Thank you
"vlog" stands for "video blog"
Explanation ↓If you have a vlog, you have a blog where most of the content is in video format. So your content is mostly videos.
hope helpful ~
In this lab, you will implement a temperature converter in JavaScript. The user may type a temperature in either the Celsius or Fahrenheit textbox and press Convert to convert the temperature. An image displays based on the converted temperature. (see the image uploaded here)
Use the knowledge in computational language in JAVA to write a code that convert the temperature.
How do I convert Celsius to Fahrenheit in Java?So in an easier way we have that the code is:
Fahrenheit to celsius:/* When the input field receives input, convert the value from fahrenheit to celsius */
function temperatureConverter(valNum) {
valNum = parseFloat(valNum);
document.getElementById("outputCelsius").innerHTML = (valNum-32) / 1.8;
}
Celsius to Fahrenheit:function cToF(celsius)
{
var cTemp = celsius;
var cToFahr = cTemp * 9 / 5 + 32;
var message = cTemp+'\xB0C is ' + cToFahr + ' \xB0F.';
console.log(message);
}
function fToC(fahrenheit)
{
var fTemp = fahrenheit;
var fToCel = (fTemp - 32) * 5 / 9;
var message = fTemp+'\xB0F is ' + fToCel + '\xB0C.';
console.log(message);
}
cToF(60);
fToC(45);
See more about JAVA at brainly.com/question/12975450
8. Show that x = xy + xy'
a) Using truth tables
b) Using Boolean identities
Answer:
B
Explanation:
Cause Show that x =Xy plus xy' is common = is Using Boolean Identify? tY me
The following code appears in a sort function. Will this function sort in increasing order (smallest first) or decreasing order (largest first)? Explain your answer if (list[index] < list[index + 1]) { temp = list [index]; list[ index] = list [index +1]; list[index +1] = temp; }
A sort function sorts in an ascending or desceding order
The true statement is that the function would sort in decreasing order.
What is a sort function?A sort function is a code segment that is used to reorder a list in ascending or descending order, when called or evoked
The order of the sort functionThe code segment is given as:
if (list[index] < list[index + 1]) {
temp = list [index];
list[ index] = list [index +1];
list[index +1] = temp;
}
In the above code, we can see that the code compares a list element with the next element on the list, and the larger value comes to the front
This means that the sort function sorts in decreasing order
Read more about code segments at:
https://brainly.com/question/16397886
Which method adds 10 to the right end of the array?
myArray.
insert
(10)
JavaScript has a set of mutator functions that allow you to modify the contents of an array without referencing the individual elements.To add to to myArray we us the push() method
Adding Elements to an ArrayTo add to to myArray we us the push() method
(10)
myArray.push(10)
There are two mutator functions for adding elements to an array: push() and unshift(). The push() function adds an element to the end of an array:
var nums = [1,2,3,4,5]; print(nums); // 1,2,3,4,5 nums.push(6);
print(nums); // 1,2,3,4,5,6
var nums = [1,2,3,4,5]; print(nums); // 1,2,3,4,5 nums[nums.length] = 6; print(nums); // 1,2,3,4,5,6
Learn more about arrays here:
https://brainly.com/question/24275089
It would be Array.append(10), so append is the answer.
In programming 2+6 is an example of what math
Answer:
[tex]beinggreat78~here~to~help.[/tex]
2 + 6 in programming is an example of math. It is the same as in the real world. Plus signs in coding are also a form of string concatenaction, the term used for combining two strings into one, or a variable into a string.
nivel 1: operadores pedir 2 números al usuario y Sumarlos, restarlos, multiplicarlo y dividirlos
Answer:
¿Esta pregunta no tiene ningún sentido?
Explanation:
¿que estas pidiendo?
What does the standard deviation of a set of data tell you?
O A. The smallest data value
B. Whether the data are spread out or not
O C. How many data points there are
O D. The maximum value of the data
SU
Answer: It tells us about how our set of data is spread out as compared to our mean or expected value.
Explanation: Note: Standard deviation is represented by Greek Letter sigma.For example: A teacher in a class of particular students takes a learning ability test from the students. Average or mean marks of students is 52 with +/- 10 marks. Then 1σ (Sigma = standard deviation) it means 1 standard deviation = 68% students will lie in between 52 + 10 =62 marks and 52-10 = 42 marks region. 2σ (2 standard deviation) means among the students 95% of them will lie between 52 + 20 =72 and 52-20= 32 marks region.3σ (3 standard deviation) means 99.7% of the students will lie in the region where 52 + 30 = 82 and 52 – 30 = 22 marks region. So for 3σ (3 Standard Deviations), only 0.3% of the total students deviate +/-30 marks from the average. It means 0.15% students will have marks less than 22 and 0.15% students will have marks greater than 82. In the schematic attached, I have tried to make you understand through a diagram. Please refer to the schematic 1. It tells us about the how our set of data is spread out as compared to our average or mean. And distance from mean can be calculated through number of standard deviations that the data is how much below or above the average.For example:For 1σ 68% students will come under the curve of “Average Learners” and rest of 32% will come under the curve of “Poor Learners” and “Very Talented Learners”.For 2σ 95% of the students will come under the curve of “Average Learners” and rest will come under the curve of “Poor Learners” and “Very Talented Learners”.For 3σ 99.7% of the students will come under the curve of “Average Learners” and rest of 0.3% will come under the curve of “Poor Learners” and “Very Talented Learners”.
Can someone give me answers for 1-4
Answer:
you want me help u with this one?
2. The different amount of shades of color
3. The artist had given every marvel or DC or villian the color that fit them and the texture is also very nice in the picture.
4. The artist maybe could make the pic a little bit more high quality cause in the image is sort of blurry and you cant really see the further people that well.
with the aid of your own example explain how memory,registers and secondary storage all work together
Memory, registers and secondary storage all work together so as to create or produce an ideal storage conditions.
How does memories works together?The use of storage memory serves for different purposes. There is the primary storage and secondary storage that are known to work together so as to bring about a better ideal storage conditions.
An example is if a person save their work in Word, the file data is said to move the data or file from primary storage to a secondary storage device for long-term keeping.
Learn more about Memory from
https://brainly.com/question/25040884
If you determine that the hard drive is experiencing excessive use but the Windows Experience Index reports that memory is the system bottleneck, which component do you upgrade first: memory or the hard drive? Why?
The reason why is it is good to use an Upgrade memory is because low amounts of memory can lead to much use of the hard drive and based n the fact that it is not costly to upgrade memory than to upgrade the hard drive.
What is upgrading memory?This is known to b an act done so as to improve the performance of a computer.
It is often known as a RAM or system memory upgrade. An upgrade implies that one is adding memory modules along with the ones that were there or replacing the old ones. It is less costly when compared to hard drive upgrade.
Learn more about Upgrade memory from
https://brainly.com/question/13196228
Which of the following is a characteristic of TIFFs?
universal standard for image file formats
cross-platform
the one version of TIFF that exists
only available as a vector graphic
please help
Answer:
What are the characteristics of a TIFF file?
A TIFF file supports grayscale as well as RBG,CMYK, and LAB color space. The format allows a color depth of up to 16 bits per color channel and is therefore ideal for data exchange during a RAW conversion. The abbreviation TIFF, or more rarely TIF, stands for “Tagged Image File Format”.
Answer:
universal standard for image file formats
A person entering the field of financial analysis
will end up taking what kind of classes in
college?
A. accounting
B. agriculture
C. astronomy
D. advertising
Answer:accounting
Explanation:
what is the future of web development
Answer:
Creating websites that can execute automated tasks and new programing languages revolving around web development.
Explanation:
Nhich of these is an optical medium of storage?
Answer:
Compact Disks, DVDs, Floppy Drives, Hard Disk Drives
What should I do instead of listen to music?
Type the correct answer in the box. Spell the word correctly.
Which firewall monitors traffic from the DMZ to the LAN?
When a DMZ is set up using dual firewalls, the___
-end firewall monitors traffic moving from the DMZ toward the LAN while the ___
firewall monitors the traffic from the Internet toward the DMZ.
The firewall that monitors traffic from the DMZ to the LAN is the second, or internal (dual-firewall)
Which firewall manages traffic from the DMZ to the LAN?In this kind of traffic, the second, or internal, firewall is known to be the one that gives room for traffic to move from the DMZ to the internal network.
Note that the dual-firewall approach is seen as a very secure way due to the fact that two devices have to be compromised before any kind of attacker can be able to gain access into the internal LAN.
When a DMZ is set up using dual firewalls, the web server is placed inside the DMZ and the private network is often placed behind the DMZ.
Learn more about firewall from
https://brainly.com/question/13693641
i need the full code for 6.1.3 code hs circles and squares please answer please help
In this exercise we have to use the knowledge in computational language in python to write a code with circles and squares.
how to draw geometric figures in python?inputs = 100
radius
draw_circle(radius);
pendown()
begin_fill()
circle(radius)
end_fill()
penup()
left(90)
forward(radius*2)
right(90)
penup()
setposition(0,-200)
color("gray")
bottom_radius = int(input("What should the radius of the bottom circle be?: "))
draw_circle(bottom_radius)
draw_circle(bottom_radius)
See more about python at brainly.com/question/18502436
Under what scenarios can we clear the NVRAM by moving the PSWD jumper to the RTCRST
pins?
One can clear the NVRAM by moving the PSWD jumper to the RTCRST pins in the following scenarios:
When the computer system is on for 10 secondsWhen the jumper is set to the closed positionWhat is a jumper ?A jumper (usually found on early days computers) is used when the computer needs to close an electrical circuit
The NVRAM which means a non-volatile random-access memory can be reset or clear when the computer system is on for 10 seconds and when the jumper is set to the closed position
Read more about computer at:
https://brainly.com/question/24032221
Ncomputing and thin client
what it is
why is done , how it works and how it's
done
The term NComputing is known to be a form of desktop virtualization company that is said to creates hardware and software to form virtual desktops.
The term Thin clients is known to be virtual desktops. They help a lot of users at the same time to share a single operating system instance.
What is the aim of a thin client?In Ncomputer networking, a thin client is known to be a kind of low-performance computer that is known to be optimized and used for setting up a remote connection.
It is often used with a server-based computing system. The server here is one that often does most of the work, such as launching software programs, etc.
Learn more about Ncomputing from
https://brainly.com/question/12629145