Answer:
Equipment recycling, reduction of paper usage, virtualisation, cloud computing, power
Write a program that allows two players (player X and player O) to play a game of tic-tac-toe. Use a two- dimensional char array with three rows and three columns as the game board. Each element of the array should be initialized with an asterisk (*). The players take turns making moves and the program keeps track of whose turn it is. Player X moves first. The program should run a loop that:
#include <iostream>
using namespace std;
//function prototypes
void showBoard(char[][3]);
bool checkWinner(char[][3], char);
void playerMove(char[][3], char);
int main()
{
//declare variables needed
//declare 2D array for the board
//and initialize with all *
char board[3][3] = {{'*', '*', '*'},
{'*', '*', '*'},
{'*', '*', '*'}};
int moves = 0; //variable to keep track
//of number of moves
//to determine tie
cout << "TIC - TAC - TOE\n\n";
//while loop to repeat until 9 moves are done
while(true){
//display board
showBoard(board);
cout << "Player 1 moves\n";
//get player X move
playerMove(board, 'X');
//increment moves counter
moves++;
//if this is a winning move
//store winner and terminate
if(checkWinner(board, 'X')){
showBoard(board);
cout << "\nPlayer 1 (X) wins!\n";
return 0;
}
//if 9 moves are done
//break from loop
if(moves == 9)
break;
//display board again
showBoard(board);
cout << "Player 2 moves\n";
//do the same thing for player O
playerMove(board, 'O');
moves++;
if(checkWinner(board, 'O')){
showBoard(board);
cout << "\nPlayer 2 (O) wins!\n";
return 0;
}
}
//if we have gone this far and program
//still has not terminated (no winner)
//it means this is a tie
showBoard(board);
cout << "This game is a tie!\n";
//return 0 to mark successful completion of program
return 0;
}
//this function is helpful because we need to show
//the board repetitively during the program
void showBoard(char board[][3]){
cout << endl;
//loop on the rows
for(int row = 0; row < 3; row++){
//loop on the columns
for(int col = 0; col < 3; col++)
cout << board[row][col] << " ";
//display newline after each row
cout << endl << endl;
}
cout << endl;
}
//this function checks if second argument
//is a winning player
bool checkWinner(char board[][3], char player){
//boolean variable to check
//for winner later
bool flag;
//CHECK FOR WINNER IN ROWS
for(int row = 0; row < 3; row++){
//initialize flag to true
flag = true;
//loop within a row
for(int col = 0; col < 3; col++){
//Notice that the right part of the
//assignment operator, is an expression
//with a relational operator (==)
//this expression will yield either
//true (1) or false (0)
//while flag is already true (1)
//if multiplied by true (1) will result
//in true(0), or multiplied by false (0)
//will result in false (0)
flag *= (board[row][col] == player);
}
//after checking within row, if the flag
//is still true at this point, it means we have
//three chars of the same kind within the row,
//thus we have a winner
if(flag)
return true;
else
continue;
}
//CHECK FOR WINNER IN COLUMNS
//using a similar logic
for(int col = 0; col < 3; col++){
flag = true;
for(int row = 0; row < 3; row++){
flag *= (board[row][col] == player);
}
if(flag)
return true;
else
continue;
}
//CHECK FIRST DIAGONAL (row = col)
//reset flag to true
flag = true;
//check diagonal
for(int i = 0; i < 3; i++){
flag *= (board[i][i] == player);
}
//check if there is winner
if(flag)
return true;
//CHECK OTHER DIAGONAL (row = 2 - col)
//reset flag to true
flag = true;
//check diagonal
for(int col = 0; col < 3; col++){
flag *= (board[2-col][col] == player);
}
//check if there is winner
if(flag)
return true;
//if all of these have been checked
//and function still has not returned,
//it means there is no winner
return false;
}
//this function gets a move from the player,
//checks if it is valid, and if yes it puts
//it on the board
void playerMove(char board[][3], char player){
//variables to store user move
int row, col;
//get user move
cout << "Row: ";
cin >> row;
cout << "Col: ";
cin >> col;
//check if this is valid move
//you have to check if that tile has
//already been marked, or if tile
//of choice is out of bounds of board
while(board[row-1][col-1] != '*' ||
row > 3 || row < 0 ||
col > 3 || row < 0)
{
cout << "Invalid move! Try again\n";
cout << "Row: ";
cin >> row;
cout << "Col: ";
cin >> col;
}
//after validation, mark new move
board[row-1][col-1] = player;
}
Answer:
if on edgen. The answer is c
Explanation:
Type the correct answer in the box. Spell all words correctly.
Craig has told his team to design a website, but he wants to see a fully laid out detailed version before functionality can be added. How can his team produce this?
Craig's team can demonstrate this by creating a(n) {----------}
.
Answer:
A project scope
Explanation:
I just took this on plato
The team designs the website according to the team leader by a project scope.
What is a website?The website is a set of web pages located under a single domain name, generated by a single person or any organization.
Craig has told his team to design a website, but he wants to see a fully laid out detailed version before functionality can be added.
A project can be introduced to create a website for the team members whether individually or in a team.
Thus, the team produce this by a project scope.
Learn more about website.
https://brainly.com/question/19459381
#SPJ2
Which one of the following tuned-adm commands will set the Tuning Profile to desktop?
The "yum search tuned" command. tuned-adm commands will set the Tuning Profile to desktop.
What is tuning profile?The term Tuned is known to be a form of daemon that employs the use of udev to look into connected devices and so it also statically or dynamically tunes system settings based on a clicked profile.
Conclusively, Tuned is known to often shared with a number of predefined profiles that are often used in some common use cases such as high throughput, low latency, etc.
Learn more about tuning profile from
https://brainly.com/question/23275071
Explain the distinction between a real address and a virtual address.
Answer:
A real address is the physical address in main memory. Though a virtual address is the address of a storage location in virtual memory.
hopes this help (:`
Answer:
send to you and the world is
How does a workstation differ from a server in terms of price processing power storage and computer memory
Workstations are laptops and PCs that quickly perform complex, technical tasks such as digital content creation and detailed analysis. Servers are software and hardware that store data, manage network resources, and fulfill client requests.
How many categories of computer do we have?
Answer:
The 10 types of computers include personal computers, desktops, laptops, tablets, hand-held computers, servers, workstations, mainframes, wearable computers and supercomputers.
what is the important of hvac?
Answer:
Moreover, buildings need HVAC installed in them because:
HVAC systems are used for controlling the overall climate in a building. ...
HVAC fosters enhanced productivity in offices as they feel comfortable. ...
HVAC improves air quality in the building, helping make it appropriate for human breathing and comfort. ...
HVAC systems help you achieve more savings when it comes to energy bills
Explanation:
Answer:
Units larger than a terabyte include a petabyte, exabyte, zettabyte, yottabyte and brontobyte. A geopbyte is also larger than a terabyte and refers to 10 30 bytes, or 1,000 brontobytes. Additional units of measurement become necessary as the amount of data in the world increases.
Explanation:
One problem with backlighting is that your subject may squint.
True
False
Answer:
I would say that's False. Backlighting would be behind them. So they wouldn't need to squint.
Explanation:
A person entering the field of financial analysis
will end up taking what kind of classes in
college?
A. accounting
B. agriculture
C. astronomy
D. advertising
Answer:accounting
Explanation:
Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false questions. Each correct answer is worth 2 points.
The quiz program is an illustration of loops and conditional statements
Loops are used to perform repetitionConditional statements are used to make decisionsThe quiz programThe quiz program written in C++, where comments are used to explain each action is as follows:
#include <iostream>
using namespace std;
int main(){
//This prints the instruction
cout<<"Enter T/t for True; F/f for False\n";
//This initializes the question
string questions[5] = { "Q1", "Q2", "Q3", "Q4", "Q5"};
//This initializes the correct options
char options[5] = { 'T','T','F','F','T'};
//This declares the user response
char opt;
//This initializes the score to 0
int score = 0;
//This loop is repeated 5 times
for (int i = 0; i < 5; i++){
//This prints the current question
cout << i + 1 <<". "<<questions[i]<<"\nAnswer: ";
//This gets the user response
cin>>opt;
//If the user response is correct
if(toupper(opt) == options[i]){
//The score is incremented by 2
score+=2;
}
}
//This prints the total score
cout<<"Score: "<<score;
return 0;
}
Read more about loops at:
https://brainly.com/question/19347842
Misinformations about Corona virus
Answer:
be in a crowded place without a mark
in what year was CCTV added to a broadcast network?
CCTV added to a broadcast network in 1949
what does the GPU do?
Answer:
With graphics processing units (GPU), many pieces of data can be processed simultaneously, which makes them useful for applications such as machine learning, editing, and gaming. It is an electronics circuit capable of accelerating the processing of images, animations, and videos.
Explanation:
Good people can y'all help me do this activity
For Part 1 of the activity: 1. Look around you. Talk to your friends and family. Talk to other people in your network. Keep an eye on the local news. Search on the internet. Do you observe any common problem that many of these people are facing? That just can be your business opportunity! 2. But before you jump ahead and start looking at this problem as your business opportunity, you need to first think whether you have any idea on how to solve the particular problem. You also need to find out whether the people facing this problem are even keen on a solution they have to pay for. 3. As a tip, remember that your potential customers should feel that the problem that they are facing is an acute one and their life is affected because of it......
Answer: I don't think anyone can help with that
Explanation:
Also i don't think this is coding related-
What is information computer security
Answer:
Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
Explanation:
1.Skills
1.SkillsThe Top Skills Required for Cybersecurity Jobs
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...A Desire to Learn. ...
1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...A Desire to Learn. ...An Understanding of Hacking
2.Thesaurus
ThesaurusCybersecurity refers to the practice of securing electronic devices from unauthorized access or attack or the measures taken in pursuit of this practice.
3.Risk assessment
Risk assessmentWhat does a cybersecurity risk assessment include? A cybersecurity risk assessment identifies the various information assets that could be affected by a cyber attack (such as hardware, systems, laptops, customer data, and intellectual property), and then identifies the various risks that could affect those assets.
and last..........is four
4. Field
FieldDifferent branches of cyber security
FieldDifferent branches of cyber securityApplication security.
FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.
FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.
FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.
FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.Endpoint protection and mobile security.
FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.Endpoint protection and mobile security.Data governance, risk and compliance.
with the aid of your own example explain how memory,registers and secondary storage all work together
Memory, registers and secondary storage all work together so as to create or produce an ideal storage conditions.
How does memories works together?The use of storage memory serves for different purposes. There is the primary storage and secondary storage that are known to work together so as to bring about a better ideal storage conditions.
An example is if a person save their work in Word, the file data is said to move the data or file from primary storage to a secondary storage device for long-term keeping.
Learn more about Memory from
https://brainly.com/question/25040884
• Do you think documentaries are best delivered in media such as films or documentary?
• Do you think only thru survey can sustain authenticity of the information need within a study?
Answer:
I think documentaries are the best delivered in media format because it adds intrigue and lowers boredom.
I think surveys are nice for studies, but not good enough because people can click answers that they know to be false, at least, for them.
How many bytes/second is a 16Mbps cable modem connection?
Answer:
data transfer rate converter computer connection speed cable modem online converter page for a specific...cable modem to megabit per second(Mbps)
What stands for “vlog”?
Answer:
Vlog means a Video Blog or log
Explanation:
Stay safe, stay healthy and blessed.
Have a blessed day !
Thank you
"vlog" stands for "video blog"
Explanation ↓If you have a vlog, you have a blog where most of the content is in video format. So your content is mostly videos.
hope helpful ~
19) If you want to find your lowest paid, full time employee (with "FT" in column B and each employee's salary found in column C), you would use the ________ function.
A. IFSMAX
B. MAXIF
C. MIN
D. MINIFS
Answer:
MAXIF
Explanation:
The MAXIF function is a function used in Ms Excel.
This function indicates the maximum value located on an array .Option B
Answer:
MaxifExplanation:
If you want to find your lowest paid, full time employee (with "FT" in column B and each employee's salary found in column C), you would use the MAXIF function.
Identify three (3) general-purpose computing devices and write a short (no more than one page) essay explaining in detail the computing process.
The three general-purpose computing devices are desktops, notebooks, smartphones. The computing process of these devices are further explained below.
What are general-purpose computers?A general-purpose computer is a type of computer that has the ability to carry out many different tasks. The following tasks can be performed by the general purpose computing devices:
installation of softwares,processing of data, andstorage of processed data.The computing process of all the general-purpose computer are the same.
It involves preparation and inputting of data into the computer using the input devices.
The data is sent to the processing unit called the central processing unit (CPU) which has the electronic circuitry that manipulates input data into the information people want.
The information is then displayed in an output device example the monitor, for the user to view.
Therefore, the three general-purpose computing devices are desktops, notebooks, smartphones.Learn more about computing process here:
https://brainly.com/question/26409104
17) If you want to find the average salary (with each employee's salary found in column C) for those who are full time employees (which will have "FT" in column B), you would use the ________ function.
A. COUNTAVERAGE
B. IFAVERAGE
C. AVERAGE
D. AVERAGEIF
Answer:
AVERAGE
Explanation:
THIS is a function used in Microsoft Excel.
The steps to find average is
Sum/TotalHence
first we use AUtoSUM function to find sum then we use average to calculate
Answer:
AverageExplanation:
If you want to find the average salary (with each employee's salary found in column C) for those who are full time employees (which will have "FT" in column B), you would use the AVERAGE function.
Under what scenarios can we clear the NVRAM by moving the PSWD jumper to the RTCRST
pins?
One can clear the NVRAM by moving the PSWD jumper to the RTCRST pins in the following scenarios:
When the computer system is on for 10 secondsWhen the jumper is set to the closed positionWhat is a jumper ?A jumper (usually found on early days computers) is used when the computer needs to close an electrical circuit
The NVRAM which means a non-volatile random-access memory can be reset or clear when the computer system is on for 10 seconds and when the jumper is set to the closed position
Read more about computer at:
https://brainly.com/question/24032221
In this lab, you will implement a temperature converter in JavaScript. The user may type a temperature in either the Celsius or Fahrenheit textbox and press Convert to convert the temperature. An image displays based on the converted temperature. (see the image uploaded here)
Use the knowledge in computational language in JAVA to write a code that convert the temperature.
How do I convert Celsius to Fahrenheit in Java?So in an easier way we have that the code is:
Fahrenheit to celsius:/* When the input field receives input, convert the value from fahrenheit to celsius */
function temperatureConverter(valNum) {
valNum = parseFloat(valNum);
document.getElementById("outputCelsius").innerHTML = (valNum-32) / 1.8;
}
Celsius to Fahrenheit:function cToF(celsius)
{
var cTemp = celsius;
var cToFahr = cTemp * 9 / 5 + 32;
var message = cTemp+'\xB0C is ' + cToFahr + ' \xB0F.';
console.log(message);
}
function fToC(fahrenheit)
{
var fTemp = fahrenheit;
var fToCel = (fTemp - 32) * 5 / 9;
var message = fTemp+'\xB0F is ' + fToCel + '\xB0C.';
console.log(message);
}
cToF(60);
fToC(45);
See more about JAVA at brainly.com/question/12975450
Match the product to its function.
Answer:
MYSQL: Database
MONGO DB: Database
SVELTE: Framework
JS: Language
VUE: Framework
PHP: Language
POSTGRES: Database
React: Framework (a JS library actually)
Python: Language
Homework 8 Matlab Write a function called fibonacciMatrix. It should have three inputs, col1, col2, and n. col1 and col2 are vertical arrays of the same length, and n is an integer number greater than 2. It should return an output, fib, a matrix with n columns. The first two columns should be col1 and col2. For every subsequent column:
In this exercise we have to use the knowledge in computational language in python to write the following code:
We have the code can be found in the attached image.
So in an easier way we have that the code is:
function v = myfib(n,v)
if nargin==1
v = myfib(n-1,[0,1]);
elseif n>1
v = myfib(n-1,[v,v(end-1)+v(end)]);
end
end
function v = myfib(n,v)
if nargin==1
v = myfib(n-1,[0,1]);
elseif n>1
v = myfib(n-1,[v,v(end-1)+v(end)]);
elseif n<1
v = 0;
end
function [n] = abcd(x)
if (x == 1 || x==0)
n = x;
return
else
n = abcd(x-1) + abcd(x-2);
end
end
fibonacci = [0 1];
for i = 1:n-2
fibonacci = [fibonacci fibonacci(end)+fibonacci(end-1)];
end
>> myfib(8)
ans =
0 1 1 2 3 5 8 13
>> myfib(10)
ans =
0 1 1 2 3 5 8 13 21 34
See more about python at brainly.com/question/18502436
I need help with these certain questions on my activities in school
Answer:
*part 3 multiple choice*
1 d. none of the above
2d. water
3 a. insulator
*The Other Part*
4. electrons change direction of flow frequency in ""alternating current""
2. conductors
What service handles the execution of missed cron jobs in the /etc/cron.hourly, /etc/cron.daily, /etc/cron.weekly and cron.monthly files?
The service handles the execution of missed cron jobs is /etc/crontab.
Where are /etc/crontab is system crontabs file?This is a command that is often used by root user or daemons. It is used to configure system different kinds of jobs.
Vonclusively, Cron jobs are often seen in the spool directories. They are known to be often stored in tables known as crontabs. This /etc/crontab. is a service handles the execution of missed cron jobs.
Learn more about commands from
https://brainly.com/question/25243683
9.11: Array Expander
Write a function that accepts an int array and the array’s size as arguments. The function should create a new array that is twice the size of the argument array. The function should copy the contents of the argument array to the new array, and initialize the unused elements of the second array with 0. The function should return a pointer to the new array. Demonstrate the function by using it in a main program that reads an integer N (that is not more than 50) from standard input and then reads N integers from a file named data into an array. The program then passes the array to your array expander function, and prints the values of the new expanded array on standard output, one value per line. You may assume that the file data has at least N values.
Prompts And Output Labels. There are no prompts for the integer and no labels for the reversed array that is printed out.
Input Validation. If the integer read in from standard input exceeds 50 or is less than 0 the program terminates silently.
The Array Expander is an illustration of arrays and functions.
Arrays are variables that stores multiple valuesFunctions are named statements that are executed when calledThe Array Expander programThe Array Expander program written in C++, where comments are used to explain each action is as follows:
#include <iostream>
using namespace std;
//This declares the Array Expander function
int* ArrayExpander(int *oldArr, int size){
//This declares the new array
int *newArr = new int[size * 2];
//This iteration sets values into the new array
for (int i = 0; i < size * 2; i++) {
if(i < size){
*(newArr+i) = *(oldArr+i);
}
else{
*(newArr+i) = 0;
}
}
//This returns a pointer to the new array
return newArr;
}
//The main method begins here
int main(){
//This declares the length of the array, N
int N;
//This gets input for N
cin>>N;
int initArr[N];
//If N is between 1 and 50
if(N > 0 && N <=50){
//This iteration gets values for the array
for(int i = 0; i<N; i++){
cin>>initArr[i];
}
//This calls the Array Expander function
int *ptr = ArrayExpander(initArr, N);
//This iteration prints the elements of the new array
for (int i = 0; i < N*2; i++) {
cout << ptr[i] << " ";
}
}
return 0;
}
Read more abou C++ programs at:
https://brainly.com/question/27246607
Restarting a computer which is already on is referred as
Answer:
what is compute
Explanation:
computer is machine