write a program that simulates the rolling of two dice. the program should use a c random number generator to roll the first die (returning a value between 1 and 6) and again to roll the second die. the sum of the two values should then be calculated. your program should roll the two dice 3600 times. g

Answers

Answer 1

A single-subscripted array can be used to count the instances of each sum.

Write a program that simulates the rolling of two dice?

#include <stdio.h>

#include <stdlib.h>

#include <time.h>

int main()

{

int die1, die2, sum, roll;

srand(time(0));

for (roll = 1; roll <= 3600; roll++)

{

 die1 = (rand() % 6) + 1;

 die2 = (rand() % 6) + 1;

 sum = die1 + die2;

 printf("Roll #%d: Die 1: %d  Die 2: %d  Sum: %d\n", roll, die1, die2, sum);

}

return 0;

}

#include <stdio.h>

#include <stdlib.h>

#include <time.h>

int main(){

   int i, sum;

   // initialize random seed

   srand(time(0));

   // roll the dice 3600 times

   for(i = 0; i < 3600; i++){

       int dice1 = rand() % 6 + 1; // roll the first die

       int dice2 = rand() % 6 + 1; // roll the second die

       sum = dice1 + dice2; // calculate the sum of the two dice

       printf("Dice 1: %d\tDice 2: %d\tSum: %d\n", dice1, dice2, sum);

   }

   return 0;

}

To learn more about a program that simulates the rolling of two dice refer to:

https://brainly.com/question/18751332

#SPJ4


Related Questions

What is the Start menu PC?

Answers

The Start menu is a graphical user interface element used in Microsoft Windows since Windows 95 and in other operating systems. It provides a central launching point for computer programs and performing other tasks in the Windows shell. It is named Start screen in Windows 8.
ANSWER -

in terms of the ansi-sparc architecture, when designing a database, a determination of the general types of queries that the database should be able to support should be done during question 6 options: this is nonsense, queries are not a consideration in the database design process the logical design phase the cartographic process the conceptual design phase the physical design phase

Answers

The general types of queries that the database should be able to support should be decided upon during the logical design phase of the database design process.

What is the logical design phase?This is an important phase since the queries will determine the structure and operation of the database.The needs for the database are identified and its structure is designed during the logical design stage. The construction of tables, fields, indexes, and relationships may be part of this. Additionally, the queries that will be used to communicate with the database are chosen. Depending on the application and the database's goal, these queries will change.The queries should also be planned to enhance the database's performance. The phase of physical design can start once the queries have been resolved. Here, the storage architecture, access strategies, and security controls for the database are further honed.The database can be implemented once the logical and physical design processes have been finished.

To learn more about The logical design phase refer to:

https://brainly.com/question/17216999

#SPJ4

iba uses the offline files feature for two users, abed and jessica, working on the same project to enable the sharing of data when they go offline. abed makes changes on a synchronized file at home. meanwhile, jessica makes changes to the original file in the shared folder. what will happen when abed returns to the office and tries to sync the file that he edited?

Answers

The thing that happen when Abed returns to the office and tries to sync the file that he edited is option  a. Abed's changes will overwrite the changes made by Jessica.

What is the name for editing a document?

Editing is the process of making changes to a document that has already been created before it is finalized or printed.

Therefore, File synchronization, sometimes known as "file sync," is a technique for updating files that are kept in numerous different physical places. Vendors of storage and the cloud frequently provide software that facilitates this procedure. File synchronization has becoming more crucial as businesses embrace the cloud for collaboration.

Learn more about changes on documents from

https://brainly.com/question/3247005
#SPJ1

See full question below

Iba uses the offline files feature for two users, Abed and Jessica, working on the same project to enable the sharing of data when they go offline. Abed makes changes on a synchronized file at home. Meanwhile, Jessica makes changes to the original file in the shared folder.

What will happen when Abed returns to the office and tries to sync the file that he edited?

 a.

Abed's changes will overwrite the changes made by Jessica.

 b.

Jessica's changes will overwrite the changes made by Abed.

 c.

Abed or Jessica will have to manually resolve the sync conflict.

 d.

Abed's version will be saved as a new file in the shared folder.

The industry standard is for all cameras to be operated by humans.

A) True
B) False

Answers

the correct answer is true

answer true
I Believe the answer would Be A. True Explanation: It's true

users at dreamhouse reality are only allowed to see opportunities they own. leadership wants an enterprise- wide dashboard of all open opportunities in the pipeline so that users can see how the company is performing at any point in time. how should an administrator create the dashboard without changing any sharing setting?

Answers

For profiles that require access to the corporate results, create individual dashboards.

What dashboard feature enables users to view a dashboard that just contains their data?

Using the dashboard viewer Viewers of dashboards perceive data as they do, based on their own data access. Dynamic dashboards are what these types of displays are known as. Charts, tables, gauges, metrics, and other components that you can make using VisualForce can all be used as dashboard components.

What do the three dashboard layers refer to?

Three separate informational levels can be divided into a dashboard: Using graphical, metrics-based data, executives may monitor information. Information for analysts using dimensional, summary data.

To know more about dashboards visit :-

https://brainly.com/question/29023807

#SPJ4

What is the main responsibility of the executive?

Answers

The President picks the leaders of all government agencies, including the Cabinet, in order to carry out and enforce the laws passed by Congress. The Vice President is also part of the Executive Branch.

What are the executive's primary duties? The President picks the leaders of all government agencies, including the Cabinet, in order to carry out and enforce the laws passed by Congress.The Vice President is a member of the Executive Branch and is prepared to take over as President if necessary.An executive manages operational activities for their company or organization and is typically in charge of developing policies and strategies to achieve organizational objectives.Executives frequently travel to conferences, meetings, and local, regional, national, and worldwide offices.Traveling executives frequently visit regional, local, national, and worldwide workplaces in addition to attending meetings and conferences.The executive branch is headed by the president, whose constitutional duties include acting as head of state, commander in chief of the armed forces, treaty negotiator, federal judge (including members of the Supreme Court), ambassador, and cabinet official.

To learn more about  executive branch refer

https://brainly.com/question/20658746

#SPJ4

As part of Azure AD Cloud sync troubleshooting, what would be a viable troubleshooting step? (More than one answer may apply.) * (5 Points) O Make sure Active Directory is updated to the latest version O Check that inbound traffic is completely open to all traffic through the firewall for ports 80 and 443 O Check that permissions are being applied to the local NT Service sign-in account created by the installer (NT SERVICE\Administrator) O Make sure the service is running O Check the Azure portal for object synchronization issues to view the logs

Answers

As part of Azure AD Cloud sync troubleshooting, The steps that would be a viable troubleshooting are:

Making sure Active Directory is updated to the latest versionChecking that inbound traffic is completely open to all traffic through the firewall for ports 80 and 443Checking that permissions are being applied to the local NT Service sign-in account created by the installer (NT SERVICE\Administrator)Making sure the service is runningChecking the Azure portal for object synchronization issues to view the logs

What is the Cloud sync troubleshooting about?

It is also important to make sure that the Azure AD Connect service is properly configured and that the sync between the on-premises Active Directory and Azure AD is working as expected.

Therefore, in the above case, you may want to check the sync logs and run the Azure AD Connect Health tool to diagnose any issues. Additionally, you can try running the Azure AD Connect configuration wizard to see if it can detect and resolve any issues.

Learn more about troubleshooting from

https://brainly.com/question/29022893

#SPJ1

In reference to cloud computing, what does the term cloud mean?

Answers

The definition of cloud, Based on the standard cloud illustration used to describe the telephone network, it is a metaphor for the internet.

Servers that can be accessed online, together with the programmes and information they house, are collectively referred to as "the cloud." All across the world, data centres house cloud servers.

Simply described, cloud computing is the supply of computer services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence, to provide speedier innovation, flexible resources, and scale economies. You normally only pay for the cloud services that you actually use, which helps you reduce operational expenses, manage your infrastructure more effectively, and grow as your business requirements change.

The way organisations think about IT resources has significantly changed as a result of cloud computing. Here are seven typical reasons why businesses are utilising cloud computing services.

Learn more about Cloud here:

https://brainly.com/question/29737287

#SPJ4

How has social networking changed political communication?

Answers

When movement organizers can use social media to swiftly and efficiently convey information about upcoming events and political changes, organizing protest activities is made easier.

What is political communication research?

Social media, especially when it comes to political views, is a persuasive communication tool that commonly works to change or influence beliefs since there are so many ideas, thoughts, and opinions circulating on the social media platform.

The introduction of social media in the mid-2000s dramatically changed political communication in the United States because it allowed regular people, politicians, and thought leaders to publicly convey their ideas to sizable networks of like-minded people and engage with them.

It is simpler to organize protest activities when movement leaders can quickly and effectively disseminate information about impending occasions and political changes using social media.

With a focus on comprehending the historical and present state of technological developments, PEC (Political Economy of Communications) analyzes the power relations between the mass media system, information and communications technologies (ICTs), and the larger socioeconomic structure in which these operate.

To learn more about political communication refer to:

https://brainly.com/question/2499229

#SPJ4

what is the first valid host on the subnetwork that the node 192.168.4.241 255.255.255.192 belongs to?

Answers

The first legitimate host on the subnetwork that the node 192.168.4.241 255.255.255.192 belongs to is 192.168.101.65.

How can I identify the very first and very last legitimate hosts on a subnetwork?

In easy mask, the method for locating the first and last IP addresses is the same. Copy the subnet number, then add 1 to the fourth octet to determine the first valid IP address. Copy the broadcast address and add 1 to the fourth octet to get the last IP address that is still in use.

A 255.255.255.0 subnet is what?

A class C network would have a subnet mask of 255.255.255.0, indicating that the network is constructed using 24 bits. A /24 is appended to the end of the IP address in CIDR notation to denote this.

To know more about IP addresses visit:-

https://brainly.com/question/16011753

#SPJ4

values passed to functions when the function is called are called parameters, and the parameter values are assigned to arguments to be used in the function. group of answer choices true false

Answers

Parameter  are values passed to functions when the function is called, and the parameter values are assigned to arguments to be used in the function is true.

What is parameter?A parameter, generally, is any characteristic that can help in defining or classifying a particular system. That is, a parameter is an element of a system that is useful, or critical, when identifying the system, or when evaluating its performance, status, condition, etc.A set of facts or a fixed limit that establishes or limits how something can or must happen or be done.parameter, in mathematics, a variable for which the range of possible values identifies a collection of distinct cases in a problem.

To learn more about classifying refer to:

https://brainly.com/question/29629793

#SPJ4

Consider the following snippet of code in a 32-bit computer.

#define max 10
struct contact {
char name[30];
char email[30];
int phone;

};
struct contact A[max];

What is the size of the entire array A in bytes?

Answers

We begin with centralized systems because they are the most intuitive, understandable, and easy to define.

Centralized systems are client/server architecture systems in which one or more client nodes are directly connected to a central server. In many firms, this is the most prevalent sort of system, in which a client submits a request to a company server and receives the response. Vertical scaling is only feasible on the central server. Horizontal scaling will contradict the system's single central unit feature of a single central entity.

main()  

{  

  char x [10], *ptr = x;  

 scanf ("%s", x);  

 change(&x[4]);  

}  

change(char a[])  

{  

  puts(a);  

}  

Learn more about server here-

https://brainly.com/question/3211240

#SPJ4

Please help!
I own a SanDisk flash drive, and I want to download pictures on it so I can plug into my tv and use them for art references, but when I put the flash drive into my tv, and when I clicked on an image, it say that, "the files are unsupported."
Any idea what that means, and how I can fix it?
Thanks!

Answers

If the SanDisk flash drive does not support your file images, the TV would not support the images of the file. Use another device to open images.

What is a flash drive?

A USB flash drive can be used to launch an operating system from a bootable USB, store crucial files and data backups, transport preferred settings or programs, perform diagnostics to diagnose computer issues, and more.

The drives are compatible with a wide range of BIOS boot ROMs, Linux, MacOS, and Microsoft Windows.

Therefore, your file's photos would not be supported on the TV if the SanDisk flash drive could not read them. To view photos, switch to another device.

To learn more about flash drive, refer to the link:

https://brainly.com/question/30032318

#SPJ1

question 1 relational databases contain a series of tables connected to form relationships. which two types of fields exist in two connected tables?

Answers

A relational databases typically have two types of fields: a foreign key field in one table, and a primary key field in the other table.

What is database?

Any type of data may be stored, maintained, and accessed using databases. They gather data on individuals, locations, or objects. It is gathered in one location so that it may be seen and examined. You might think of databases as a well-organized collection of data.

In a relational database, two tables that are connected to form a relationship typically have two types of fields: a foreign key field in one table, and a primary key field in the other table.

The foreign key field in one table is used to refer to the primary key field in the other table. For example, consider a database that has two tables: a "customers" table and an "orders" table. The "customers" table might have a primary key field called "customer_id", and the "orders" table might have a foreign key field called "customer_id" that refers to the "customer_id" field in the "customers" table.

The primary key field in a table is used to uniquely identify each record in the table. It is typically a field that contains a unique value for each record, such as a customer's ID number or a product's serial number. The primary key field is often used as the foreign key field in other tables to establish relationships between those tables.

To know more about database checkout  https://brainly.com/question/29412324

#SPJ4

Sprint, T-Mobile, ATT & ___ are the major national cell phone providers in the U.S

Answers

Major national cell phone providers in the U.S. include Sprint, T-Mobile, ATT, and Verizon.

Which two of the following are necessary for setting up a home Wi-Fi network?

The essential elements needed to create a standard home/small business network are as follows: Network to Internet connection is made via a router or wireless router. Wi-Fi equipped devices are linked to the network by means of a wireless access point.

What type of internet can you get the quickest?

This is gigabit service, which guarantees internet download rates of at least 1,000 Mbps. Gigabit service is offered by nearly all cable and fiber internet providers, and since there is so much competition, the costs have remained cheap.

To know more about T-Mobile visit :-

https://brainly.com/question/28480148

#SPJ4

true or false: inodes are organized in an array and placed on disk at a random location (or locations). select one: true false

Answers

The right response is "False," indicating that inodes are arranged in an array and scattered throughout the disk (or locations).

What aspect of the operating system decides which job will be executed?

It is the transition of the process from its ready state to its running state. The CPU scheduler chooses a process from those that are prepared to run and allots CPU resources to that particular process. Dispatchers, another name for short-term schedulers, choose which process should be carried out next.

What are a file type and a file system?

A file system, often written as filesystem, refers to the way files are labeled and logically structured for storage and retrieval in a computer.

To know more about an array visit:-

https://brainly.com/question/13107940

#SPJ4

The system that data takes to flow between devices on a network is called?

Answers

Transmission media refers to the mechanism by which data moves between devices on a network.

A communication channel known as "transmission media" is used to send information from a source or transmitter to a receiver. Through electromagnetic impulses, it is a physical route for data transport. Through the LAN, information is transmitted in bits. The transmission of signals for telecommunications can be mediated by it. An appropriate wave for the selected medium is applied with signals. Under the physical layer that controls them, these media are located.

Guided and unguided media are the two main categories of the transmission medium in computer networks. Additionally, there are subcategories of these two transmission media types. Let's get into further depth on these.

Wired and bounded media are other names for guided media. The cables that make up these mediums are used to transfer data.

Learn more about Transmission media here:

https://brainly.com/question/13095080

#SPJ4

Pls answer these

Question-1 Write a program in Python to read the room temperature and display the same using variable.

Question-2 list 3 input and output in smart living

Question-3 Write a program in python to turn the LED on/off according to the availability of light using IF…ELSE statement.

Question-4 Mary wants to help her visually challenged elderly uncle to maintain the room temperature by switching on AC; alert him with a beep sound(temp>28).Create a python script for the same.

Answers

Using the knowledge in computational language in python it is possible to write a code that read the room temperature and display the same using variable.

Writting the code for the temperature and a list:

temp = float(input("Enter Temperature: "))

unit = input("Enter unit('C' for Celsius or 'F' for Fahrenheit): ")

if unit == 'C' or unit == 'c' :

   newTemp = 9 / 5 * temp + 32

   print("Temperature in Fahrenheit =", newTemp)

elif unit == 'F' or unit == 'f' :

   newTemp = 5 / 9 * (temp - 32)

   print("Temperature in Celsius =", newTemp)

else :

   print("Unknown unit", unit)

Writting the code for the LED:

from pyfirmata import util, Arduino

import time

def blink(b_time):

   board = Arduino('COM5')

   it = util.Iterator(board)

   it.start()

   led_13 = board.get_pin('d:13:o')

   while True:

       led_13.write(1)

       print('Led ON')

       time.sleep(b_time)

       led_13.write(0)

       print('Led OFF')

       time.sleep(b_time)

if __name__ == '__main__':

   blink(0.2)

See more about python at brainly.com/question/29897053

#SPJ1

The main function of Cyber Incident Response Capability (CIRC) is to _____.

a.

restrict access controls to unauthorized personnel

b.

provide level 1 security

c.

create backdoors to bypass security protocols

d.

provide information on security incidents

Answers

The main function of Cyber Incident Response Capability (CIRC) is to provide information on security incidents. so the correct option is D.

What is access control in security?

Access controls restrict unauthorized individuals from using information resources. These controls involve two major functions: authentication and authorization. Authentication confirms the identity of the person requiring access.

Access control is a central region of the information security that directs who's permitted to access and utilize organization data and assets.

Cyber Incident Response Capability (CIRC) provide the information on security incidents.

Therefore, the correct option is D.

Learn more about access control here:

brainly.com/question/27961288

#SPJ4

which of the following is true about overloaded methods? a. java cannot use a method's return type to tell two overloaded methods apart b. java cannot use a method's parameters to tell two overloaded methods apart c. you can only overload methods that have parameters. d. all overloaded methods must have different names. e. none of the above

Answers

Note that the option that is true about overloaded methods is: "Java cannot use a method's return type to tell two overloaded methods apart." (Option B)

What are overloaded methods in programming?

Overloading occurs when two methods with the same name but distinct signatures coexist (or arguments). We can implement two or more methods with the same name in a class. Overloaded methods are distinguished by the number and kind of parameters given as method arguments.

Method Overloading, in other words, is a feature that permits a class to have numerous methods with the same name but different numbers, sequences, or types of parameters. In summary, numerous methods with the same name but distinct signatures exist.

Polymorphism is classified into two types:

method overloading and method overriding.

Method overloading occurs when many methods with the same name but different parameters are used. Method overriding indicates that a method with the same name as the parent class but a different implementation can exist in the child class.

Learn more about Java:
https://brainly.com/question/12978370
#SPJ

Which methods can you use to fix a windows 10 computer that has a broken trust relationship with the domain?

Answers

The good news is that there are techniques to repair damaged trust. However, both parties must be dedicated to reaching an agreement through dialogue, real apologies, and continuous relationship effort.

However, trust is not something that can be restored in a single day or even a week. The quick answer is that it can in the short term, but trust is required for long-term success. So, how to save a relationship with trust issues begins with following these steps and modifying them to your specific scenario. When trust is shattered, we frequently experience intense anxiety and animosity, which can create a barrier between us and our partners. We may withdraw from those close to us and feel rather lonely as a result.

Learn more about success here-

https://brainly.com/question/1938929

#SPJ4

there is a simple pattern for determining if a binary number is odd.What is it and why does the pattern occur

Answers

If the last digit of a binary number is 1, the number is odd; if it’s 0, the number is even.

What is the pattern of binary numbers?A binary number is odd if its rightmost digit is 1, and even if its rightmost digit is 0. This pattern occurs because binary numbers are based on the base-2 number system, in which only the digits 0 and 1 are used. In the base-2 system, the rightmost digit represents the units place, the next digit to the left represents the twos place, the next digit represents the fours place, and so on.When a number is odd, it means that there is one extra unit that needs to be accounted for. In the base-2 system, this extra unit is represented by a 1 in the units place. The pattern of odd and even binary numbers occurs because the base-2 system is based on the concept of binary digits, which can have only two possible values: 0 and 1. Since there are only two possible values for each digit, each digit can only represent two possible numbers: 0 and 1.

To learn more about binary number refer :

https://brainly.com/question/16612919

#SPJ1

Please Help! (Language= Java) Beginners Comp. Science
Assignment Details=

Create a class called Palindromes, which will determine if a user’s entry is a palindrome. A
palindrome is a word or phrase that reads the same backwards or forwards. See the examples.
A Santa at NASA My gym taco cat kayak NOW I WON race car
Your program will ignore spaces and ignore case when determining if a string is a palindrome.
Use the String method replace to remove the spaces. If it is a palindrome, output
PALINDROME, or else output NOT PALINDROME.
Additional requirements:
 Add an infinite loop with a sentinel-trigger break test (allowing them to input multiple
attempts). You may decide on its command word or exit-condition.
 As below, make sure a spacer line exists between each run of the program
Here are two sample runs of the program.
Enter a word or phrase: Noon
PALINDROME
Enter a word or phrase: bookkeeper
NOT PALINDROME

Answers

Answer:

import java.util.Scanner;

class Main {

 public static void main(String[] args) {

   test("A Santa at NASA");

   test("My gym");

   test("taco cat");

   test("kayak");

   test("NOW I WON");

   test("race car");

   test("bookkeeper");

   Scanner scanner = new Scanner(System.in);

   

   while(true) {

     System.out.print("Enter a word or phrase: ");

     String line = scanner.nextLine();

     if (line.equals("exit")) break;

     if (Palindromes.isPalindrome(line)) {

       System.out.println("PALINDROME");

     } else {

       System.out.println("NOT PALINDROME");

     }

   }

   scanner.close();

 }

 public static void test(String s) {

   System.out.printf("'%s' is %sa palindrome\n", s, Palindromes.isPalindrome(s) ? "" : "not ");

 }

}

class Palindromes {

 static boolean isPalindrome(String s) {

   s = s.replaceAll("\\s","").toLowerCase();

   return s.equals(reverseString(s));

 }

   public static String reverseString(String str){  

     StringBuilder sb = new StringBuilder(str);  

     sb.reverse();  

     return sb.toString();  

 }  

}

Explanation:

I chose to use a string reverse routine. This is slightly less efficient than iterating the string from both ends, but performance is less important than readability here.

The stop word is exit.

At what point are you responsible for following the terms in a software license agreement?- when you purchase the software- when you give the software to someone else- when you click or take another action to accept the terms- when you register the software

Answers

when you click or take another action to accept the terms  in a software license agreement.

What does licensing agreement mean?

An agreement between two parties (the licensor and licensee) known as a licensing agreement allows the licensee the right to utilize the brand name, trademark, copyrighted technology, or the capacity to create and sell items that the licensor owns.

What does a software license agreement serve?

An agreement known as a software license agreement permits a licensee to use software but not to really own it.

                      The rights to continue selling the program to others and to allow the licensee to use it on a single computer are rights that the software creator retains.

Learn more about  software license agreement

brainly.com/question/29272295

#SPJ4

Help.....
What does unsuported file mean?

I keep trying to download images on a flash drive, and when I plug it into my tv to view the image, when I click on it, it keeps reading, "this is an unsuported file"

How do I fix this!!!

Thank you!

Answers

An unsupported file is a file that cannot be opened or played by the device or program you are trying to use. This error message usually indicates that the device or program you are using does not have the necessary software or codecs to recognize and open the file.

There are a few different ways you can try to fix this issue:

Check the file type: Make sure that the file you are trying to open is a type that is supported by your TV. Consult the TV's manual or the manufacturer's website for a list of supported file types.
Convert the file: If the file is in a format that is not supported by your TV, you may be able to convert it to a different format using a file conversion tool. There are many free online tools that can convert a variety of file types.
Install additional software: If the file is in a format that is not supported by your TV, but you have software on your computer that can open it, you may be able to transfer the file to your TV using additional software. For example, if you have a media player on your computer that can open the file, you can use it to stream the file to your TV over a network connection.
Check for updates: Make sure that you have the latest software and firmware updates for your TV. These updates may include support for new file types or improvements to existing support.
I hope these suggestions help! If you are still having trouble, it may be helpful to consult the manufacturer's website or customer support for additional assistance.

The accelerated mobile pages project is trying to address what shortcoming of mobile devices?

Answers

The accelerated mobile pages project is trying to address slow loading of webpages.

A web page or webpages is a piece of writing that is typically created in HTML and is accessed in an internet browser. You may visit a web page by typing a URL address into the address bar of your browser. Text, pictures, and connections to other web sites and files are all possible components of a web page.

In order to better explain crucial concepts to users, material is frequently provided on a website in the form of images or videos. Additionally, visitors may be sold goods or services via a website. A website, such as the one for Computer Hope, is composed of several web pages.

Learn more about Webpages here:

https://brainly.com/question/21587818

#SPJ4





I Sing the Body Electric

by Walt Whitman



Part 1:



I sing the body electric,


The armies of those I love engirth me and I engirth them,


They will not let me off till I go with them, respond to them,


And discorrupt them, and charge them full with the charge of the soul.



Was it doubted that those who corrupt their own bodies conceal themselves?


And if those who defile the living are as bad as they who defile the dead?


And if the body does not do fully as much as the soul?


And if the body were not the soul, what is the soul?



1855





Answers

These seeming rhetorical and cynical questions close out Part 1. It has been believed that Whitman struggled between disclosing and hiding his homosexuality because of the grammar's seeming purposeful obscurity.

Who is Walt Whitman?

American poetry, writer, and newspaper by the name of Walter Whitman. He was indeed a humanist who participated in the shift from existentialism to realism by mixing both ideologies into his writing. Whitman, who is frequently referred to as the founder of free poetry, is one of the most significant poets in American literature.

These queries, however, might also serve as a starting point for the poem's condemnation of slavery, a significant subject covered in such poem's portions also cast in shadow more by antithesis of corruption as well as "discorruption." The slave markets that were held not too far from Whitman's quarters horrified him. This is important in relation to the great, almost religious question, "And if the body were not the soul, what is the soul?" Whitman's response is shown throughout the entire poem.

Learn more about Walt Whitman, Here:

https://brainly.com/question/2241669

#SPJ4

The question is incomplete, the complete question will be :

Why was the grammar that was written in the poem tested or instructive that was written by Walt Whitman?

I Sing the Body Electric

by Walt Whitman

Part 1:

I sing the body electric,

The armies of those I love engirth me and I engirth them,

They will not let me off till I go with them, respond to them,

And discorrupt them, and charge them full with the charge of the soul.

Was it doubted that those who corrupt their own bodies conceal themselves?

And if those who defile the living are as bad as they who defile the dead?

And if the body does not do fully as much as the soul?

And if the body were not the soul, what is the soul?

True/False Mark T for True and F for False. If False, rewrite the statement so that it is True.
1. Application software serves as the interface between the user, the apps, and the computer's or mobile devices hardware.
2. Enterprise and professional users employ cloud storage services to back up all of their files in case of disaster.
3. Open source software is mass-produced, copyrighted software that meets the needs of a wide variety of users.
4. When downloading shareware, freeware, or public-domain software, it is good practice to seek websites with ratings for and reviews of products.
5. Because they run in a browser, you always access the latest version of web apps.
6. With database software, users run functions to retrieve data.
7. Software suites offer three major advantages: lower cost, ease of use, and integration.
8. A PDF file can be viewed and printed without the software that created the original document.
9. Augmented reality apps require the use of a special viewer device to display 360-degree images or videos.
10. Many routers also can function as a hardware firewall.
11. A power management app will turn off Internet connectivity when your battery runs low.
12. Cookies typically are considered a type of spyware.

Answers

It is false that application software serves as the interface between the user, the apps, and the computers or mobile devices hardware.

It is true that enterprise and professional users employ cloud storage services to back up all of their files in case of disaster.

It is false that open-source software is mass-produced, copyrighted software that meets the needs of a wide variety of users.

It is true that when downloading shareware, freeware, or public-domain software, it is good practice to seek websites with ratings for and reviews of products.

It is true that because they run in a browser, you always access the latest version of web apps.

It is false that with database software, users run functions to retrieve data.

It is true that software suites offer three major advantages: lower cost, ease of use, and integration.

It is true that a PDF file can be viewed and printed without the software that created the original document.

It is false that augmented reality apps require the use of a special viewer device to display 360-degree images or videos.

It is true that many routers also can function as a hardware firewall.

It is false that a power management app will turn off Internet connectivity when your battery runs low.

It is false that cookies typically are considered a type of spyware.

The operating system, therefore, serves as the interface between the user, the applications and other programs, and the computer’s or mobile device’s hardware

Enterprise and professional users employ cloud storage services to back up all of their files in case of disaster.

Retail software is mass-produced, copyrighted software that meets the needs of a wide variety of users

When downloading shareware, freeware, or public-domain software, it is good practice to seek websites with ratings for and reviews of products.

Because they run in a browser, you always access the latest version of web apps.

Using database software, you can add, change, and delete data in a database; sort and retrieve data

Software suites offer three major advantages: lower cost, ease of use, and integration.

A PDF file can be viewed and printed without the software that created the original document.

Augmented reality app overlays information and digital content on top of physical objects or locations.

Many routers also can function as a hardware firewall.

Power management apps can enable power saving mode automatically when a device’s battery runs low so that the battery will last longer until charged.

Cookies are not considered spyware because website developers do not attempt to conceal the cookies.

learn more about computer science questions and answers here: https://brainly.com/question/23275071

#SPJ4

How many free answers does students get?

Answers

you can get more by answering.

Information security policies would be ineffective without _____ and _____.

Answers

Information security policies would be ineffective without audit and enforcement.

Information security, often known as InfoSec, refers to the methods and devices that businesses employ to safeguard their data. This includes setting up the appropriate policies to bar unauthorized users from accessing either personal or professional data. Network and infrastructure security, testing, and auditing are just a few of the many areas that infosec, a rapidly expanding and dynamic profession, encompasses.

Sensitive data is protected by information security from unauthorized actions such as interruption, destruction, change, scrutiny, and recording. It is important to protect the security and privacy of sensitive data, including financial information, intellectual property, and account information for customers.

Private information theft, data tampering, and data erasure are all effects of security events. Attacks have a real cost as well as the potential to interfere with business operations and harm a company's reputation.

Learn more about Information security here:

https://brainly.com/question/5042768

#SPJ4

Other Questions
a credit sale of $700 is made on july 15, terms 2/10, net/30, on which a return of $50 is granted on july 18. what amount is received as payment in full on july 24? a. $700 b. $637 ($700 - $50)*.98 c. $650 d $686 What is the legacy of the 9/11 attacks? for the capacitor network shown in (figure 1), the potential difference across ab is 48 v . suppose the correlation coefficient is .4. what percentage of the total variation in salar can be explained by gender What type of jurisdiction refers to the authority of a court to hear a case for the first time? Select the correct text in the passage.Which detail best characterizes the woman in the excerpt as a lonely person? aadapted excerpt from Madame Bovaryby Gustave FlaubertShe thought, sometimes, that, after all, this was the happiest time of her lifethe honeymoon, as people called it. To taste the full sweetness of it, itwould have been necessary doubtless to fly to those lands with thundering names where the days after marriage are full of laziness most pleasant.In post beds behind blue silken curtains to ride slowly up steep road, listening to the song of the postilion re-echoed by the mountains, along with thebells of goats and the muffled sound of a waterfall; at sunset on the shores of guifs to breathe in the perfume of lemon trees; then in the evening onthe villa-terraces above, hand in hand to look at the stars, making plans for the future. It seemed to her that certain places on earth must bringhappiness, as a plant peculiar to the soil, and that cannot thrive elsewhere. Why could not she lean over balconies in Swiss chalets, or enshrine hermelancholy in a Scotch cottage, with a husband dressed in a black velvet coat withlong tails, and thin shoos, a pointed hat and frills? Perhaps shewould have liked to confide all these things to someone. But how tell an undefinable uneasiness, variable as the clouds, unstable as the winds?Words failed her-the opportunity, the courage.If Charles had but wished it, if he had guessed it, if his look had but once met her thought, i seemed to her that a sudden plenty would have goneout from her heart, as the fruit falls from a tree when shaken by hand. But as the familiarity of their life became deeper, the greater became the gurthat separated her from himCharles's conversation was commonplace as a street pavement, and everyone's ideas trooped through it in their everyday garb, without excitingemotion, laughter, or thought. He had never had the curiosity, he said, while he lived at Rouen, to gothe theater to see the actors from Paris. Hecould neither swim, nor fence, nor shoot, and one day he could not explain some term of horsemanship to her that she had come across in a novel. Largest Gland of our human Body? Express x^2 - 5x + 8 in the form of (x - a)^2 + b where a and b are too heavy fractions A neoclassical tragedy should not tell the story of an ordinary person because of? serious signs and symptoms of unstable tachycardia are usually not seen with ventricular rates less than: How many patterns are there in rural settlement? In which of the following situations is the gravitational force the dominant force? Select two answers. A A satellite is in orbit around a planet. B An object is in free fall just after it is released from rest. C An electron and a proton are bound together in an atom. D A proton and a neutron are bound together in an atom's nucleus. If you were to embark on a research project of ethnic enclaves in urban areas in the united states, it would be most helpful to know that __________. expert that helps you learn core concepts.See AnswerCurrent liabilities could include all of the following except:accounts payable due in 30 days.notes payable due in 9 months.a bank loan due in 18 months.any part of long-term debt due during the current period. Is preparing for a speech at a Toast Masters competition he is feeling nervous but wants to exude confidence which strategy uses a keyword to trigger confidence? !Please help! will give 10 pts!:) The function f is such that f(x) = x^2 - 8x +5 Where x a bond issue with a face amount of $495,000 bears interest at the rate of 10%. the current market rate of interest is also 10%. these bonds will sell at a price that is: Preterite Write the correct form of the preterite.1. yo (tomar)2. t (comprar)3. ustedes (descansar) 4. nosotros (hablar) 5. ella (visitar) Typically facilitated by mental health professionals, psychologists, social workers, or certified alcohol and drug counselors, which of these counseling groups typically improve psychological functioning and the adjustment of the members?