We want to simulate constantly flipping a coin until we get 3 heads in a row. What kind of loop should we use

Answers

Answer 1

There are different types of loops that are used in computer programming. The kind of of loop that is suitable is the

while loop.

In computer programming languages, a while loop is simply known to be a control flow statement that gives code to be executed everytime based on a given Boolean condition.

The while loop can simply be said to be a repeating if statement.

It used to repeat a particular block of code in any number of times, until a said point or condition is met.

When used in C programming, it often in repeated manner executes a target statement.

Learn more from

https://brainly.com/question/21298406


Related Questions

Time shifting occurs when _______. A. Clocks move ahead one hour in the spring b. Works are copied and kept for future generations c. Individuals copy works to view at a later time d. Copyrighted materials comes into the public domain.

Answers

Answer:

c. Individuals copy works to view at a later time

Explanation:

Time Shifting: Recording a program to a storage medium to be consumed at a later date.

Time shifting occurs when Individuals copy works to view at a later time. The correct option is c.

What is time shifting?

As the name implies, time shifting is the shifting of a signal in time. This is accomplished by adding or subtracting a shift quantity from the time variable in the function.

Time shifting or Shifting a signal in time means that the signal is either delayed or advanced in the time axis.

Other space shifting processes include time shifting, which involves recording a radio broadcast and listening to it later, and format shifting, which involves converting a media file into a different format.

You can watch a show at separate moments of the day by changing the time. When people copy works to view later, they are time shifting.

Thus, the correct option is c.

For more details regarding time shifting, visit:

https://brainly.com/question/11563105

#SPJ5

What is a megavirus in computing

Answers

In the lab experiments conducted by Professor Claverie and colleagues, in which they infected fresh-water amoebas, Megavirus was seen to construct large trojan organelles - the "cells within cells" that would produce new viruses to infect other amoebas.

quadratic equation 4

Answers

In algebra, a quadratic equation is any equation that can be rearranged in standard form as ax^{2}+bx+c=0 where x represents an unknown, and a, b, and c represent known numbers, where a ≠ 0. If a = 0, then the equation is linear, not quadratic, as there is no ax^2 term.

HOPE IT HELPS:)

The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses.

Answers

Answer:

url

Explanation:

what is not an example of a changing operating space?

Answers

What is not an example of a changing operating space? A parking garage. Riley is driving down the highway when the road starts curving to the right.

Parking in garage is not an example of a changing operating space.

What is operating space?

When an operating space is said to be "changing," it usually means that the environment around your car is deteriorating or switching from an open to a closed state.

Operational Spaces are the space(s) inside the Facilities from which the Concessionaire shall have the right, privilege, and obligation to continuously and for the duration of the Term operate its concession in accordance with the terms and conditions of this Agreement.

Distractions while driving, such as texting and using a phone, driving dangerously, such as going too fast or following too closely.

Driving when intoxicated. While drinking and driving is not especially high among novices, it produces a disproportionate number of fatal crashes.

Thus, parking garage is the answer.

For more details regarding operating space, visit:

https://brainly.com/question/9339555

#SPJ6

what are the different forms of auto form?​

Answers

Answer:

There are two types of AutoForm—the New Object: AutoForm and the builder-based AutoForm. The New Object: AutoForm generates a very simple and uninspiring data entry form. The builder-based AutoForm creates five different types of forms: Columnar, Tabular, Datasheet, PivotTable, and PivotChart.

Coordination in a global information system requires a _____ architecture for data, standardization within departments.

Answers

Coordination in a global information system requires a decentralized architecture for data, standardization within departments

A(n) ___________ allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards.

Answers

Answer:

A(n) videoconference allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards.

who is the father of computer?
a.jeff bezos
b.cgarles babagge
c.micky pointe
d.marlos carten​

Answers

Answer:

Explanation:

B.

Anote los tipos de direcciones de IP que existen.​

Answers

Answer:

ENGLISH PLEASE.

Explanation:

What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device

Answers

the smallest unit of data in a computer is bit

The frame rate is the result of multiplying the length of the film times its width

True or False

Answers

Answer:

False

Explanation:

frame rate is how many frames are shown per second in a video

the length of the film times the width is the resolution. not frame rate

A ______________ utility provides an overview of your files and lets you rename, delete, move, and copy files and folders.

Answers

Answer:

File Management Utility

Explanation:

File Management Utility is a computer software that help to browse, search, arrange, find information, and quickly preview the files of the system.

List down 5 elements of Multimedia

Answers

Answer:

text, image, audio, video, animation

Answer : The five elements of Multimedia are text, images, audio, video and animation.

Hope This Helps You.

SOMEONE WHO ACTUALLY KNOW HOW TO DO THIS PLEASE DO IT AND SEND A SCREENSHOT I REALLY NEED IT FOR MY EXAMS AND DONT TROLL ​

Answers

What computer do you own?

Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).

Answers

Sandbox. ... Real-time strategy (RTS) ... Shooter (FPS and TPS) ... Multiplayer online battle arena (MOBA) ... Role-playing games (RPG, ARPG, and more) ... Simulation and sports.

- BRAINLIEST answerer

Lol yeah I agree w the person above, I don’t wanna copy

In Linux, most applications and commands are in the ____ directory or its subdirectories bin and sbin.

Answers

On a Linux computer, most of the software applications are saved in the /usr directory or in its subdirectories named, bin and sbin.

A Linux can be defined as an open-source and community-developed operating system (OS) that is designed and developed for the following electronic devices:

Mainframes. Computers.Embedded systems.Mobile devices.

Generally, the Linux operating system (OS) is based on UNIX and it is typically released under the GNU general public license (GPL).

On a Linux computer, the commonly used directory for saving most software applications is the /usr directory or sometimes its subdirectories named, bin and sbin.

Read more: https://brainly.com/question/20629962

________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.

Answers

Answer:

Social engineering is a process of manipulating people into breaking normal security procedures or divulging confidential information.

Explanation:

What is an FPS? Describe the acronym as it applies to video games and explain two games popular in the 2000s that flourished in this game category.

Answers

1. Short for frames per second, fps is a measure of how many full screen, still images are captured or displayed in one second of video recording/playback or video game play.

help me i'll brainiest if its right

Answers

Answer:

Your response is correct.

I hope this helped at all.

Answer:A

Explanation: by limiting the amount of thermal energy that flows  out of the drink keeps it nice and taste :D

7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​

Answers

Answer:

18

Explanation:

lets go step by step.

the function called tryIt has a value, a variable named "a". this "a" variable will be whatever the user enters when the program says, Enter a number.

ok so if we enter "a" as 2, and b in the function will always be 7, and 2 + 7 equals 9,

and the ans variable (short for answer) will take the result of the function (9) and multiply it by 2,

then the answer is 18

To delete a database object, press and hold or right-click the object in the Navigation Pane and then tap or click ____ on the shortcut menu.

Answers

Answer:To delete a database object, press and hold or right-click the object in the Navigation Pane and then tap or click Delete on the shortcut menu.

Explanation:

Hope I could help. Have a nice time there.

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

Answers

Computer data storage

An electronic element that stores data by changing its resistance based on the current that has passed through it, similar to RRAM (Resistive Random Access Memory), is called a Memristor.

What is memristor

The term "memristor" is a combination of "memory" and "resistor," indicating its ability to retain information based on its resistance state.

Memristors are considered a fourth fundamental passive circuit element, alongside resistors, capacitors, and inductors.

Learn more about electronic element at

https://brainly.com/question/24977425

#SPJ2

The use of computer systems to distribute potentially harmful information is called:
A) Propaganda
B) Cyber security
C) Computer fraud
D) Industrial espionage

Answers

Answer:

cyber security I think that is what it is

Explanation:

m

A cyber security is the distribution of malware and other server attack that are aimed at destroying the integrity of the system and is also called as the information compromise.

There are various tools and techniques that can be used to protect and save from such harmful attacks. Other attacks include cyber fraud and are done to distribute the harmful information.

Hence the option B is correct,

Learn more about the computer systems to distribute potentially.

brainly.com/question/25705570.

If you want to excel in the field of web design, what must you be able to make and keep?
price estimates
statement of work
final deadlines
promises

Answers

Answer:

You  need to beable to make final deadlines because maybe if your adding divs or maybe something takes a bit long for you to do you need to give the person your working for an idea of what and why you may take long to get your website polished.

Explanation:

Answer:

B. final deadlines

Explanation:

edg 2021 (got 100%)

how do you play pokemon go

Answers

Download the app and make an account hope this helps!

Answer:

download the app then tap your screen for the rest of your life

(And I'm being serious)

Raina remembered when she taught Amara to draw. What happened?

Answers

Sisters is an autobiographical graphic novel written by Raina Telgemeier as a follow-up to her earlier graphic memoir Smile. It details a long summer road trip taken from San Francisco to Colorado by her family and explores the relationship between Raina and her younger sister, Amara.

- BRAINLIEST answerer

The USGS and National Weather Service have many sensors collecting data about natural events.

That data can be used to create a weather map.

Identify the parts of the Input-Process-Output model for each step.


(output, input, process): weather map displayed on a web page


(output, input, process): determination of color to be used on the map


(output, input, process): sensors collect temperature and precipitation data

Answers

Answer:

Explanation:

Throughout many regions on the chart, a standard plotting code demonstrates air currents speed and direction, average temperature and relative humidity, barometric pressure and its change over the previous hours, the number and variety of clouds, the weather type, including visibility restrictions, and the amount and type of precipitation.

USGS and National Weather Service

As per the question, the USGS  and National weather services are mapping out the region to collect the data for the natural events. The data is collected in the form of maps and is used for the identification of the input and the output model steps.

The answer is precipitation data, visibility data.

The NWS is a federal agency of the united stated that is tasked to prove the forecasts and for the formation of hazardous weather events and warns the public of the related events.

Learn more about the National Weather Service

brainly.com/question/17774978.

using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

Other Questions
The two major organs that play an important role in the maintenance of normal acid base homeostasis Previous 11NextintoSubmit TestPretest: Defining CultureReader Tools11Drag each tile to the correct boxMatch each detail from the passage with the statement that best explains how it develops the character of Simon Wheeler inthe cultural setting."dozing comfortably by the stove of therun-down tavem in the decayed mining campadapted from The Celebrated jumping Frog of Calaveras Couby Mark TwainI found Simon Wheeler dozing comfortably by the stove of therun-down tavern in the decayed mining camp of Angel's. Inoticed he was fat and bald-headed and had a gentle, simpleexpression on his calm face. He stood up and said good day tome. I told him that a friend of mine had asked me to inquireabout a dear companion of his from boyhood named LeonidasW. Smiley-Reverend LeonidasW. Smiley. He was a youngminister who supposedly was living at one time at Angel'sCamp. I added that if Mr. Wheeler could tell me anything aboutthis Reverend Leonidas W. Smiley, I would be most grateful.Simon Wheeler backed me into a comer and trapped methere with his chair. Then he sat down and reeled off amonotonous story. He never smiled; he never frowned. Henever changed his volce from the gentle-flowing tone in whichhe began his first sentence. He never gave the slightest hint ofenthusiasm. But all through the endless narrative he stayedImpressively earnest and sincere. This showed me that, farfrom thinking there was anything ridiculous or funny about hisstory, he thought it was a really important matter. He admiredthe heroes of the story as men of great genius. I let him go on inhis own way and never interrupted him once."backed me into a corner and trapped methere with his chair"admired the heroes of the story as men of"great geniusThis detall reveals that the settingprovidesSimon Wheeler with plenty of freetimeO 2021 Edmentum. All rights reserved.AUS 3:57 Approximately how many Africans were forced into the transatlantic slave trade between 1400 through 1800 To minimize signal distortion, at each end of the J-1939 CAN-bus there is a(n)_____________resistor. What is one disadvantage of a hedge fund? A. Hedge funds only target investors with a low net worth. B. Hedge funds are public and tend to be overrun with investors. C. Hedge funds often use high-risk methods to produce high returns. D. Hedge funds are safe investments but tend to produce low returns. Help please I really dont understand SOS Due today 8. In an ionic bond, electrons areelectrons arewhile in a covalent bond,? Which of the following statements is TRUE?O The interest rate on your savings account will remain the same as long as you keep the account open.O You can choose the interest rate on your savings account, but only once per year. O The interest rate on your savings account will vary over time and be set by the bank.O The interest rate on your savings account will vary over time and be set by the government. What average force magnitude is required to stop a 15,000 kg train in 12.1 s if the train is traveling at 86 km/hr how did dominos develop its reputation in the pizza market? I NEED HELP IDENTIFYING THE STAGES!!! PLZ HELP!!! Interphase, Prophase, Metaphase, Anaphase, or Telophase pls help plssshelp plss Which parts of the United States does King mention in his speech? How does the mention of these places help support Kings central idea and purpose? Match the terms to their definition.1. the result of a transformation on a point or figure2. a transformation that preserves distancethe flipping of a plane about a fixed line; a transformation3.resulting in a mirror image over a linethe process of setting up correspondence between the4. elements by of two sets so that every element of the first set corresponds to a unique element in the second setIsometry Image Reflection Transformation find the percentage change of $20 to $25 7x+3y=m, solve for y Which graph represents a proportional relationship? In which order would these rocks and minerals be found in the layers of Earth from the crust to the lower mantle? eclogite, perovskite, rhyolite, stishovite stishovite, rhyolite, perovskite, eclogite stishovite, perovskite, eclogite, rhyolite rhyolite, eclogite, perovskite, stishovite. Can you please help I cant play in my basketball game Tuesday if I cant pass this ! please help, this is due today: