Answer:
files can easily infect your computer with viruses or malware.
Explanation:
Why is user testing an important pat of the design process?
a) it helps you understand how the game is designed.
b) it helps you know how people use your game and what parts to improve.
c) it helps determine if team members are working well together.
d) it tells you how much people will pay for your game.
Answer:
The answer is A) it helps you understand how the game is designed.
Explanation:
User testing an important pat of the design process because it helps you understand how the game is designed. Thus, option A is correct.
What is a Game Deconstruction?Deconstruction doesn't technically mean "demolition"; rather, it refers to "breaking down" or "analyzing" something (particularly the words in a work of fiction or nonfiction) to determine its ultimate significance, which is allegedly nearly never exactly what the creator intended.
A typical deconstruction procedure starts by removing the building's windows, doors, appliances, and finishes, many of which can be recycled or sold again. The building is then taken apart, typically starting at the top and working down to the foundations.
Therefore, A "deconstruction" in games is a process that broadly refers to applying a rigorous, critical, and analytical examination to a work of media or art, frequently by disassembling it to better understand its constituent elements and how they interact.
Learn more about deconstruction process from
brainly.com/question/26087397
#SPJ6
What is the main disadvantage of parallel circuits?
Any break in the circuit stops the flow of charges.
There are multiple paths for charges to flow.
If one bulb goes out, the other bulbs will go out.
They are complicated to design and build.
Answer:
d
Explanation:
Answer:
D: They are complicated to design and build.
Explanation:
The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simulate starting a bank with a specific number of coins, then adding to your piggy bank to bring your total to $2.12. What you need to do: Create a Coins object that initially has 4 quarters, 3 dimes, 2 nickels, and 1 penny. After you create the initial object, print out the total, then add coins to your bank until you have a total of 15 coins totaling 2.12. You will need to figure out which combination gets you to the correct total with the correct number of coins! When you are finished, call the method to print the bank count then the bank total to verify that you got the correct values.
Answer:
Coins c1 = new Coins (4, 3, 2, 1);
c1.bankValue();
c1.addQuarter();
c1.addQuarter();
c1.addDime();
c1.addDime();
c1.addPenny();
c1.bankCount();
c1.bankValue();
Explanation:
Movie recommendations? I’m in middle school so nothing nasty bro and I don’t really like horror movies so none of those either
Answer:
watch happy gilmore
Explanation:
Answer:
Uh... My Sister's Keeper... 5 Feet Apart... The Fault in Our Stars.
Explanation:
In these ones all your finding is the mean(average).
Please select the word from the list that best fits the definition
A small farmer who did not own land
That would be a peasant, hope this helps ^^
Answer:
peasant
Explanation:
right on edge
Why is it difficult to detect a Trojan horse?
Answer:
Explanation:
Because the virus disguises it self as something you are trying to download, then it attackes your device
Answer:
Since Trojan horses frequently appear disguised as legitimate system files, they are often very hard to find and destroy with conventional virus and malware scanners. ... The computer's antivirus and antimalware programs will be disabled and the necessary steps to remove malware will be inaccessible.
Explanation:
In general, a Trojan comes attached to what looks like a legitimate program. In reality, it is a fake version of the app, loaded up with malware. ... One form of Trojan malware has targeted Android devices specifically. Called Switcher Trojan, it infects users' devices to attack the routers on their wireless networks.
which of the following memory types cannot store the data for information permanently Ram chachi Flash Memory hard disk
Answer:
Memory hard disk is the answer
Answer: his answer is correct
Explanation:
What is the definition of a digital signal?
the push that makes electrons move in a wire; the greater the voltage, the stronger the push
a device that uses voice recognition to provide a service
communication of the binary data via the voltage level for each time interval
a device that converts one voltage to anoth
Answer:
communication of the binary data via the voltage level for each time interval
Explanation:
Answer:
communication of the binary data via the voltage level for each time interval
Explanation:
its on edge
What is a good title for and about me project
Answer: MODERN TECHNOLOGY
Explanation: I don't know what your project is about, but I would assume since this is computer science that it is about technology.
When and how should internet service providers be allowed to treat some kinds of internet traffic different from others?
Answer:
When the content of the internet traffic is deemed unlawful the internet service provider can discriminate, block or slow down the internet traffic
Explanation:
The internet service providers have the right to block website that promote terrorists views or are used for recruitment by terrorists as well as other materials that are objectionable
The internet service providers can also discriminate against materials that are obscene, lascivious, indicate harassment, contains severe or exceptionally high violence based on preparation of materials to be published through them on the internet, according to a 1996 federal law
Internet service providers can also provide as zero rating sites that are exempted from requiring data allowance so that they can then be viewed for free by the client.
If you are logged on to Windows Live Messenger, why would you be unable to engage
in an instant messaging session with your brother, who is logged on to his AOL
Instant Messenger account?
a. Because you use Windows and your brother uses Apple OS X
b. Because Windows Live Messenger has built-in security and AOL Instant
Messenger does not
c. Because AOL Instant Messenger and Windows Live Messenger use their own
proprietary protocols
d. Because AOL Instant Messenger encrypts
Answer:
C: Because AOL Instant Messenger and Windows Live Messenger use their own proprietary protocols
Explanation:
Presentation slides should not have more than _____ bullet points.
Answer:
The answer is four
Explanation:
don't use more than four bullet points on any slide and will avoid using single bullet points on a slide.
Question # 4
Multiple Choice
Which of the following is an example of planned obsolescence?
a smartphone company regularly updating cell signal technology
a television company building sets out of low-quality material
an online storage system upgrading storage capabilities
a computer software program regularly updating security
Answer:
the last one I think not 100% sure
Which statement accurately defines the Quick Steps feature in Outlook?
It simplifies common tasks into one-step commands.
It allows a user to add multiple steps to common tasks.
It is only configured for tasks that are not frequently used.
It allows multiple users to add commands to a single mailbox.
Answer:
A
Explanation:
The statement accurately defines the Quick Steps feature in Outlook will be that it simplifies common tasks into one-step commands.
What is the Outlook?The Tools menu is shown on the toolbar adjacent to the Actions menu under the Menus tab. When you select Tools, a drop-down menu with options like Send/Receive All Folders, Reject All, Com Add-Ins, Disable Items, Outlook Options, etc. appears.
You undoubtedly use Outlook every day and use some of its useful capabilities, including flags, categorize, and archive. Even if these capabilities already make it simple to handle your emails, there are other Outlook tools that can help you organize your emails even better.
The phrase "simplifies typical tasks into one-step commands" appropriately describes Outlook's Quick Steps feature.
More about the Outlook link is given below.
https://brainly.com/question/17457799
#SPJ6
Which function would you use to make sure all names are prepared for a mailing label?
Answer:
Proper Function
Explanation:
I just took the quiz on engenuity.
Answer:
Proper on edge
Explanation:
A linear representation of a hierarchical file directory is known as what?
Answer:
C.) a directory path
Explanation:
because I got it right.
find the 12th term of 14,9,-1,-6
Answer:
T12=a+(12−1)d=(a+11d)
=14×11×(−5)=−41
Explanation:
I hope this helps you out and if your feeling generous plz mark brainliest it helps me a lot thank you:)
Write a compound inequality that is represented by the graph.
5
6
7
8
9
10 11 12
13 14
15
A compound inequality using the variable x is
Answer:
[tex]7 < x < 14[/tex]
is the answer
in most cases, letters of recommendation are required for admission to
Motivation is best defined as
the reason to achieve a goal.
O accomplishing a long-term goal.
O taking a break from a goal.
O the reason to compare a goal.
Answer:
a
Explanation:
the reason to achieve a goal
Motivation is best defined as the reason to achieve a goal. Thus, the correct option is A.
What is Motivation?Motivation is the cause of a behavior's initiation, continuation, or termination in humans and other animals at a certain time. Motivational states are frequently interpreted as internal forces that produce a disposition to participate in goal-directed activity in the agent.
Different mental states are said to compete with one another, and only the strongest state can determine behavior. This implies that we can be inspired to act even when we don't.
Desire is the classic example of a motivating mental state. However, several other states, such as goals or views about what one should do, can also serve as motivation.
The word "motive," which refers to a person's needs, wishes, wants, or drives, is the root of the word "motivation."
It is the process of inspiring people to act in order to accomplish a goal. In the context of career aspirations, psychological factors influencing people's behavior may include a desire for money.
Learn more about Motivation, here
https://brainly.com/question/951988
#SPJ6
A shop will give discount of 10% if the
cost of purchased quantity is more than 100
Ask user for quantity
Suppose, one unit will cost 100
Judge and print total cost for user
Answer:
10%÷100 it is correct answer
Which of the following are examples of stakeholders?
a
Business Owners
b
Investors/Shareholders
c
Employees
d
All of the above
Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota? Check all that apply.
Left-click each message, and move it to the Trash folder.
Right-click the Deleted Items folder, and click Empty Folder.
Click the Folder tab, and click the Empty Folder in Clean Up group.
Right-click the Deleted Items folder, and click Mark All as Read.
In Backstage view, choose Cleanup Tools. Then, click Empty Deleted Items Folder.
Answer:
B, C, E are correct
Explanation:
Found on edg
Answer:
a,b,c,d
Explanation:
2021 i got it right
what is thesaurus?what do you mean by spell chek feature
Answer:
Thesaurous is a book that lists words in groups of synonyms and related concepts.
A Spell Checker (or spell check) is a Software feature that checks for misspellings in a text. Spell-checking features are often embaded in software or services, such as word processor, email client, electronic dictionary, or search engine.
List the basic computing and processing steps in order
Answer:
brainstoring and engeenerign process steps
Explanation:
because of science
____________ is related to the design of technologies to improve how people communicate with devices and applications to enter input and receive output.
Answer:
Human Computer Interaction
Explanation:
Human-Computer Interaction is related to the design of technologies to improve how people communicate with devices and applications to enter input and receive output.
What is computer interaction?Research on the design and application of computer technology that concentrates on the interfaces of humans and computers is known as the human-computer interface.
Experts in human-computer interaction (HCI) study how people use computers and develop solutions that let people use them in new and different ways.
The answer is Human-computer interaction.
Thus, Human-Computer Interaction is related to the design of technologies to improve how people communicate with devices and applications to enter input and receive output.
Learn more about computer interaction here:
brainly.com/question/3173766
#SPJ2
Complete each sentence to describe features of the VLOOKUP function. The VLOOKUP function structure begins with =VLOOKUP( , …) To use the VLOOKUP function, the lookup value should be in the of the table.
Answer:
The complete sentences are:
The VLOOKUP function structure begins with =VLOOKUP(value, table, col_index, [range_lookup])
To use the VLOOKUP function, the lookup value should be in the first column of the table.
Explanation:
Required
Complete the given sentence with the right values
In Excel, the syntax of the VLOOK function is:
=VLOOKUP (value, table, col_index, [range_lookup])
value -> The value to look up to and it should be located in the first column of the table
table -> The table name
col_index -> The column number to check
[range_lookup] -> This is optional and it returns either true of false depending on the result of the query,
Answer:
Complete each sentence to describe features of the VLOOKUP function.
The VLOOKUP function structure begins with =VLOOKUP(lookup value, table array... )
To use the VLOOKUP function, the lookup value should be in the first column of the table.
Explanation:
plssssssssssssssssssssssssssssssssssss help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
John is the yearbook president and is searching for computer storage that will have the most memory to save articles and pictures for the yearbook. What form of storage should John use?
Cloud storage
External hard drive
Floppy disk
USB flash drive
Answer:
flash drive, protects data
Answer:
USB flash drive
Explanation:
A USB flash drive would be used since most flash drives that are used nowadays can use up to 2 Terabytes. That's as of dates back in 2018, and Terabytes are the fourth largest " Byte " in the virtual world. USB flash drives are also commonly used to save projects and having the ability to plug it into one computer, save it, unplug it, and bring it to another computer to download the files and work on it at home. As a Graphic Designer, we use these all the times, hopefully this helps! :)
Think of an example in your life where a number could be described as data, information, and knowledge
Answer:
how many event you have been too in the last month (well non during this time but as an example)
Explanation: