Please help i will give brainiest. Plus 30 points



Games that do not have a clearly-defined end and often use exploration or simulation to allow freedom of character development, like Minecraft, Grand Theft Auto, and World of Warcraft, feature what kind of gameplay style?
adaptive
cyclical
linear
open-ended

Answers

Answer 1

Answer:

open ended

Explanation:

Adaptive: composition is a high-level game design framework for heightening physical empathy and the sensory experience of players with a focus on art and narrative-driven games and transmedia. so it is clearly not adaptive

Cyclical: is used to describe things that are regularly patterned or that occur in regular intervals. The root of cyclical is “cycle” which means movement in a circular fashion, or the circular fashion itself. Planets orbit the sun in cyclical patterns, the moon's phases are cyclical as well. we can keep cyclical in our option list but we still need to narrow it down more.

linear: A linear game follows a strict path for the player with little, if any, deviation. Basically, you traverse from stage 1 to stage 2 all the way to the final stage. Take, for example, Ghosts and Goblins or Magical Pop'n. A non-linear game deviates in some fashion, either throughout the whole game or just for a portion. obviously it is not linear because it is stage to stage which means that it has a end.

open ended: A game that is significantly nonlinear is sometimes described as being open-ended or a sandbox, though that term is used incorrectly in those cases, and is characterized by there being no "right way" of playing the game. Whether intentional or not, a common consequence of open-ended gameplay is emergent gameplay. this is very hard to understand if you do not have common sense or try to think things through too fast. we know that it is not linear and adaptive so we can clear those out of our choices. because cyclical uses a pattern and we are looking for something that gives us freedom it isnt that. so the answer has to be open ended

Answer 2

Answer: give him brainly

Explanation:


Related Questions

Question # 6
Dropdown
Choose the correct ending to the sentence below.


The function localtime() _____________________

Answers

Answer:

returns a different value every time you use it

Explanation: :)

If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decryption techniques, then you are learning about cryptography.

If you are a cryptography student and want to write a PHD style paper on cryptography and cryptanalysis, then you are learning about cryptology.

If you work at the code breaking division at the National Security Agency (NSA), then you are part of which team?

A. Cryptosystems Team
B. Cryptanalysis Team
C. Cryptologist Team
D. Cracker Team​

Answers

Answer:

d

Explanation:

hi

Question #11
If A = 5 and B = 10, what is A* B equal to?
estion #2
estion # 3
restion #4
testion5
O 15
O Five
OTwo
O 50
Read Question

Answers

Answer:

Option 4: 50 is the correct answer.

Explanation:

Arithmetic operations can be performed using the programming languages. Some symbols used in programming languages are different from what we use in mathematics.

The symbol * is used to represent multiplication in programming languages.

Given

A = 5

B = 10

So, A*B will be equal to: 5*10 = 50

Hence,

Option 4: 50 is the correct answer.

I really need help with coderZ does anyone kno?

Answers

Answer:

Easy-to-use virtual robotics and STEM platform tailored to serve every student at every level!

CoderZ is a powerful, award-winning online platform.

Explanation:

CoderZ is a powerful, award-winning online platform through which students learn valuable STEM skills such as coding, robotics, and physical computing. CoderZ is highly flexible and designed for use in the classroom or through a wide range of remote learning environments.  Computers and technology are everywhere. Studying science, technology, engineering and math gives kids valuable skills for the future and develop life-skills like computational thinking, critical thinking and problem-solving as well.

STEM and CS education focuses on how to approach complex problems, break down the challenges into small pieces and approach resolving them in a logical manner – critical skills for any career path.

explain the principles of computer applications ​

Answers

Answer:

The nature of computers and code, what they can and cannot do.

How computer hardware works: chips, cpu, memory, disk.

Necessary jargon: bits, bytes, megabytes, gigabytes.

How software works: what is a program, what is "running"

How digital images work.

Computer code: loops and logic.

Big ideas: abstraction, logic, bugs.

Write a recursive method called, doMyMath, which takes as input any positive integer and calculates the factorial (use comments for necessary items).

Answers

Answer:

def doMyMath(n):  

    if n == 1:  

         return n  

    else:  

         return n*doMyMath(n-1)  

Explanation:

This line defines the function

def doMyMath(n):  

This line checks if n is 1. If yes, it returns n (1)

    if n == 1:  

         return n  

If otherwise, it calculates the fibonacci recursively

    else:  

         return n*doMyMath(n-1)  

To call the function from main, you can use:

print(doMyMath(5))

or

num = int(input("Number: "))   --- This gets the number from user

print("Result: ",doMyMath(num)) --- This calculates the factorial

This question is answered in Python

Which interpersonal skill is the most important for a telecom technician to develop?
teamwork
active listening
conflict resolution
social awareness

Answers

Answer: Interpersonal communication is the process of face-to-face exchange of thoughts, ideas, feelings and emotions between two or more people. This includes both verbal and nonverbal elements of personal interaction.

Explanation:

i think plz dont be mad

Columns, margins and orientation can all be found on what tab

Answers

Answer:

The right answer is: Option C: Layout.

Explanation:

Columns are used to write text in a word document in more than one columns. Similarly, margins is the empty space that is left blank from all sides of the page. Orientation can be either landscape or portrait.

all these options are found in the Layout tab in MS word.

Hence,

The right answer is: Option C: Layout.

Select the examples that best demonstrate likely tasks for Revenue and Taxation workers. Check all that apply. Brenda works for the IRS reviewing paperwork. Jenny reviews buildings to determine how much money they are worth. Luke administers tests for driver licenses. Vernice negotiates with foreign officials in a U.S. embassy. Kareem advises businesses to make sure they handle their finances correctly. Parker takes notes during city council meetings and creates reports for council members.

Answers

Answer:

Brenda works for the IRS reviewing paperwork.

Jenny reviews buildings to determine how much money they are worth

Kareem advises businesses to make sure they handle their finances correctly.

Explanation:

The best demonstrate likely tasks for Revenue and Taxation workers are:

a. Brenda works for the IRS reviewing paperwork.

b. Jenny reviews buildings to determine how much money they are worth

e. Kareem advises businesses to make sure they handle their finances correctly.

What are Revenue and Taxation?

In practically every nation on the planet, governments impose taxes as mandatory levies on people or things. Taxation is primarily used to generate money for government spending, though it can also be used for other things.

A tax is a mandatory financial charge or another sort of levy that is placed on a taxpayer by a governmental entity in order to pay for public services and other expenses.

Taxes are essential because governments use the money they raise from them to fund social programs. Government investments in the healthcare industry would not be possible without taxes. Health services including social healthcare, medical research, social security, etc. are paid for by taxes.

Therefore, the correct options are a, b, and e.

To learn more about Revenue and Taxation, refer to the link:

https://brainly.com/question/29570932

#SPJ2

Select the correct answer from each drop-down menu.
Complete the sentence listing the basic parts of a computer.
All computers have these four basic parts: an input device, a

Answers

Answer:

all computers have an input device, storage, proccesing,and output

hope it helped

Explanation:

How did NAT help resolve the shortage of IPV4 addresses after the increase in SOHO, Small Office Home Office, sites requiring connections to the Internet?

Answers

Question Completion:

Choose the best answer below:

A. It provides a migration path to IPV6.

B. It permits routing the private IPV4 subnet 10.0.0.0 over the Internet.

C. NAT adds one more bit to the IP address, thus providing more IP addresses to use on the Internet.

D. It allowed SOHO sites to appear as a single IP address, (and single device), to the Internet even though there may be many devices that use IP addresses on the LAN at the SOHO site.

Answer:

NAT helped resolve the shortage of IPV$ addresses after the increase in SOHO, Small Office Home Office sites requiring connections to the internet by:

D. It allowed SOHO sites to appear as a single IP address, (and single device), to the Internet even though there may be many devices that use IP addresses on the LAN at the SOHO site.

Explanation:

Network Address Translation (NAT) gives a router the ability to translate a public IP address to a private IP address and vice versa.  With the added security that it provides to the network, it keeps the private IP addresses hidden (private) from the outside world.  By so doing, NAT permits routers (single devices) to act as agents between the Internet (public networks) and local (private) networks.  With this facilitation, a single unique IP address is required to represent an entire group of computers to anything outside their networks.

In java
Write a program that draws out a path based on the user input. The starting coordinates for the path is the middle of the DrawingPanel. Ask the user to enter an x and a y coordinate for a DrawingPanel. Your program will draw a line from the last coordinates to the current coordinates the user enters. If the user enters an x value or y value out of bounds of the DrawingPanel, then end the program.

Answers

Answer:

import javax.swing.JPanel;

import javax.swing.JOptionPane;

import javax.swing.JFrame;

import javax.swing.JLabel;  

import javax.swing.JTextField;

import javax.swing.border.Border;

import java.awt.event.ActionEvent;

import java.awt.event.ActionListener;

import javax.swing.BorderFactory;

import javax.swing.JButton;

import java.awt.BorderLayout;

import java.awt.Color;

import java.awt.FlowLayout;

import java.awt.Graphics;

import java.awt.Rectangle;

public class DrawingPanel{

 

private static final int width = 800;

private static final int heigth = 500;

private static JFrame mainFrame;

private static JPanel mainPanel, inputPanel, drawPanel;

private static JLabel xLabel, yLabel;

private static JTextField xField, yField;

private static JButton drawButton;

 

public static void main(String[] args)

{

mainFrame = new JFrame("Draw Path");

mainPanel = new JPanel(new BorderLayout());

 

inputPanel = new JPanel(new FlowLayout(FlowLayout.CENTER));

xLabel = new JLabel("X Coordinate: ");

xField = new JTextField(5);

yLabel = new JLabel("Y Coordinate: ");

yField = new JTextField(5);

drawButton = new JButton("Draw");

inputPanel.add(xLabel);

inputPanel.add(xField);

inputPanel.add(yLabel);

inputPanel.add(yField);

inputPanel.add(drawButton);

 

Border border = BorderFactory.createLineBorder(Color.black);

drawPanel = new JPanel(new FlowLayout(FlowLayout.CENTER));

drawPanel.setBorder(border);

 

mainPanel.add(inputPanel, BorderLayout.NORTH);

mainPanel.add(drawPanel, BorderLayout.CENTER);

 

mainFrame.add(mainPanel);

mainFrame.setSize(PANEL_WIDTH, PANEL_HEIGHT);

mainFrame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);

mainFrame.setLocationRelativeTo(null);

mainFrame.setResizable(false);

mainFrame.setVisible(true);

 

// action listener for draw button

drawButton.addActionListener(new ActionListener() {

(use the at sign here)Override

public void actionPerformed(ActionEvent e) {

if(xField.getText().equals("") || yField.getText().equals(""))

JOptionPane.showMessageDialog(null, "Please enter the x and y coordinates!");

else

{

int x2 = Integer.parseInt(xField.getText().trim());

int y2 = Integer.parseInt(yField.getText().trim());

if(x2 > WIDTH || y2 > HEIGHT)

JOptionPane.showMessageDialog(null, "x and y coordinates should be less than "

+ width + " and " + height + " respectively!");

else

drawPath(x2, y2);

}

}

});

}

 

public static void drawPath(int x2, int y2)

{

int x1 = (int)drawPanel.getBounds().getCenterX();

int y1 = (int)drawPanel.getBounds().getCenterY();

 

Graphics g = drawPanel.getGraphics();

Rectangle r = drawPanel.getBounds();

g.setColor(drawPanel.getBackground());

g.fillRect(r.x, r.y, r.width, r.height);

 

g.setColor(Color. blue);

g.drawLine(x1, y1, x2, y2);

}

}

Explanation:

The class DrawingPanel is a Java class that gets the user input for the coordinate of a path with predetermined heigth and width (defined in the class). The methods of the class are; getGraphics(), getBounds(), getBackground(), setColor() and fillRect(). The result is a rectangular path GUI on the screen.

A physical host machine has four quad-core CPUs, 16GB of RAM, 1TB of hard drive space, and two 1Gbps NICs. If we need to create four Windows 2008 servers, what will be the first bottleneck we should upgrade?a. CPUb. RAMc. Hard drived. NIC

Answers

Answer:

B. Ram

Explanation:

A random access memory (RAM) can be defined as the internal hardware memory which allows data to be read and written (changed) in a computer. Basically, a random access memory (RAM) is used for temporarily storing data such as software programs, operating system (OS), machine code and working data (data in current use) so that they are easily and rapidly accessible to the central processing unit (CPU).

Additionally, RAM is a volatile memory because any data stored in it would be lost or erased once the computer is turned off. Thus, it can only retain data while the computer is turned on and as such is considered to be a short-term memory.

There are two (2) main types of random access memory (RAM) and these are;

1. Static Random Access Memory (SRAM).

2. Dynamic Random Access Memory (DRAM).

Given a physical host machine that has four quad-core central processing units (CPUs), 16GB of random access memory (RAM), 1TB of hard drive space, and two 1Gbps network interface cards (NICs). Therefore, if we need to create four Windows 2008 servers, the first bottleneck we should upgrade is the random access memory (RAM) because it is typically the working memory that would be used by the server to store data, so they can be accessed easily and rapidly by the central processing unit (CPU).

Hence, the random access memory (RAM) may be increased from 16GB to 64GB or more depending on the client's requirements.

Design templates can be applied to presentations when _____.

they are opened
a new slide is added
all the slides are created
all of the above
none of the above

IT IS NOT WHEN A NEW S IS ADDED

Answers

Answer:

all of the above

Explanation:

The answer to this is all of the above. In the Microsoft Powerpoint software, you are able to add a design template as soon as you first open the software and begin creating your presentation. Aside from this, you can also add the design template you want to use when a new slide is added or all the slides have already been created. This is done by clicking on the Design tab in the top ribbon and choosing the desired template. From this tab, you are also able to select specific slides to which you want the design to be applied to.

Answer:

All of the above

Explanation:

EDG2021

What input is needed for the defined output?

Answers

Answer:

The data that are needed to be included in the output is called as

Inputs are the signals or data received by the system and outputs are the signals or data sent from it. The term can also be used as part of an action; to "perform I/O" is to perform an input or output operation

C++ please
Write a program that does the following.
Create a dynamic two dimensional squarearray of unsigned integers (array_one). Prompt the user to enter the number of rows and columns they want (maximum of 30) (rows and columns must be the same for a square array)
Pass the array to a function that will initialize the two dimensional array to random numbers between 0 and 4000 using the rand() library function. Here is the kicker: The array cannot have any repeated values!
Create another dynamic two dimensional array of the same size (array_transpose)
Pass both arrays to a function that will generate the transpose of array_one returning the values in array_transpose. (If you don’t already know the transpose swaps the rows and columns of an array.) Example: Suppose you have a 4 x 4 array of numbers (array_one). The transpose is shown below (array_transpose)
Array One Array Transpose
1 2 3 4 1 5 9 13
5 6 7 8 2 6 10 14
9 10 11 12 3 7 11 15
13 14 15 16 4 8 12 16
Pass each array to a print_array function that will print (to the screen or a file) the results of a test case with a 20 by 20 array.

Answers

Answer:

#include <iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   int n;

   cout<< "Enter the row and column length: ";

   cin>> n;

   int array_one[n][n];

   int array_transpose[n][n];

   for (int i = 0; i < n; i++){

      for (int j= 0; j < n; j++){

           srand((unsigned) time(0));

           array_one[i][j] = (rand() % 4000)

           array_transpose[j][i] = array_one[i][j];

       }

   }

}

Explanation:

The C source code has three variables, 'array_one', array_transpose' (both of which are square 2-dimensional arrays), and 'n' which is the row and column length.

The program loops n time for each nth number of the n size to assign value to the two-dimensional array_one. the assign values to the array_transpose, reverse the 'i' and 'j' values to the two for statements for array_one to 'j' and 'i'.

help please with the question in the photo

Answers

Answer:

A

Explanation:

A because, why would someone want to listen to your own interests?

How do you overload a C2677 error code in c++ for '-'?

Answers

The answer is the c++ one I know becuase I took the test

You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.

Answers

The answer is the 2 one becuase I took the test

Why are people's visions of utopias and dystopias subjective?
A. Because the vision one person has of paradise will likely match
the vision most people have of a utopia
B. Because only certain technologies make things better and
different ones make things worse in a dystopia
C. Because all technology is dangerous and can lead to the downfall
of all societies, resulting in dystopia
D. Because the technology needed for one person's utopia may be
what creates disaster for another person's dystopia

Answers

Answer:

D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.

Explanation:

Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia are people's visions of utopias and dystopias subjective. Thus option D is correct.

What are utopias and dystopias?

Speculative fiction categories that study social as well as political structures include utopian and dystopian literature. In order to pique readers' interest, utopian fiction often depicts a world that adheres to the author's ethics and has many elements of a different reality.

Ultimately, it all varies depending on who you ask. A person's dystopia may be another person's utopia. We don't all have the same notions regarding what a utopia would look like, which is, in my opinion, one of the grounds why people don't live in one. Therefore, option D is the correct option.

Learn more about utopias and dystopias, Here:

https://brainly.com/question/905235

#SPJ2

what is the operating system on an IBM computer?​

Answers

Answer:

OS/VS2 and MVS

Explanation:

IBM OS/2, is full International Business Machines Operating System/2, an operating system introduced in 1987 IBM and the Microsoft Corporation to operate the second-generation line of IBM personal computers, the PS/2 (Personal System/2.) hope this helps! Pleas mark me as brainliest! Thank you! :))

Problem 4 (25 points)Consider a byte addressing architecture with 64-bit memory addresses.(a)Which bits of the address would be used in the tag, index and offset in a direct-mapped cache with 512 1-word blocks. 3(b)Which bits of the address would be used in the tag, index and offset in a direct-mapped cache with 64 8-word blocks.(c)What is the ratio of bits used for storing data to total bits stored in the cache in each of the above cases

Answers

Answer:

Following are the solution to the given points:

Explanation:

The Memory address value = 64 bit

The Size of the word [tex]= \frac{64}{8} =8 \ Byte[/tex]

In point a:

The offset size [tex]= 3\ bits[/tex] ( in 1-word block size)  

The Index size [tex]= 9 \ bits[/tex] (as block number =512)  

Tag size [tex]= 64 - 12 = 52\ bits[/tex]

In point b:

The offset size [tex]= 8 \times 8 \ bytes = 2^6 = 6 \ bits.[/tex]

The Index size [tex]= 64 \ bits = 2^6 \ =6 \ bits[/tex]

Tag size  [tex]= 64 - 12 = 52\ bits[/tex]

In point c:

The Ratio at point a  

[tex]\to 3:64[/tex]

The Ratio at point b

[tex]\to 6:64[/tex]

Which of the following are downlink transport channels?
a. BCH.
b. PCH.
C. RACH.
d. UL-SCH.
e. DL-SCH.

Answers

I think it’s a or b

What is the output?

class car:
model = "
age = 20
myCar = car()
myCar.age= myCar.age + 10
print(myCar.age)

Output: ​

Answers

Answer:

The answer to this question is 30

The explanation is given below

You can also see the attachment section to see the image of result

Explanation:

This question want use to print the value of myCar.age

print(myCar.age)

If we look at line 3, age=20

So the previous value is 20 and we have to add 10 to add as shown

myCar.age= myCar.age + 10

The value will become 30

Answer:

30

Explanation:

trust

Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!

Answers

The answer is the first number line.

30/150 = 1/5 = 20%

Answer:

20%

Convert fraction (ratio) 30 / 150 Answer: 20%

The first one.

Please I need one more braniest for 'expert' may I get it?

Explanation:

how to create a structure using c# programming

Answers

Answer:

The answer to this question is given in the explanation section.

Explanation:

C# uses the struct keyword to declare structure.

The are used to store related data item.

For example the record of Student i-e his name, father name, address and class no can be declared using structure

using system

struct Student {

  public string name;

  public string father_name;

  public string address;

  public int class_no;

};

If an object someThing has a method someMethod( ), then you can call the method using the statement ____________ .
a. someMethod(someThing);
b. someThing.someMethod( );
c. someMethod.someThing() ;
d. someThing = someMethod( );

Answers

Answer:

C) someThing.someMethod( )

Explanation:

The methods in a class can be accessed outside the class (assuming they are public methods and not private to the class) by using the dot(.) symbol and calling the method on the instance or object of the class.

In this case, the object of the class someThing, calls the method, someMethod( ) by using a dot and the name of the method with a parentheses at the end. This enables the code in the method act on the class instance or object.

Even with a quality burglary-resistant chest on the premises, special function locks may be appropriate because:________.
a. A dishonest worker might open the safe at night .b. A burglar may force a worker to open the safe during working hours.c. Without special locking devices, workers may be tempted to leave the safe unlocked for easy access during the day.d. All of the above

Answers

Answer:

d ) all of the above

Explanation:

is the correct answer

Suppose that a 2M x 16 main memory is built using 256kB x 8 RAM chips and memory is word addressable, how many RAM chips are necessary?

Answers

Answer:

16 RAM chips

Explanation:

To calculate the number of RAM chips needed, we divide the total size of the main memory by the size of each RAM chip. Hence:

Number of RAM chips required = Main memory size / size of one RAM

2M = 2²¹, 16 = 2⁴, 256K = 2¹⁸, 8 = 2³

Hence:

Number of RAM chips required = (2²¹ * 2⁴) / (2¹⁸ * 2³) = 2⁴ = 16

Therefore 16 RAM chips are necessary

A strictly dominates choice B in a multi-attribute utility. It is in your best interest to choose A no matter which attribute youare optimizing.

a. True
b. False

Answers

Answer:

A strictly dominates choice B in a multi-attribute utility. It is in your best interest to choose A no matter which attribute youare optimizing.

a. True

Explanation:

Yes.  It is in the best interest to choose option A which dominates choice B.  A Multiple Attribute Utility involves evaluating the values of alternatives in order to make preference decisions over the available alternatives.  Multiple Attribute Utility decisions are basically characterized by multiple and conflicting attributes.  To solve the decision problem, weights are assigned to each attribute.  These weights are then used to determine the option that should be prioritized.

Other Questions
where would the oldest rock formation be found? A. Location A B. Location B C. Location C D. Location D What type of chemical reaction is the following? 2 Li + MgCl2 2 LiCl + Mg The length l of a rectangle is decreasing at a rate of 3 cm/sec while the width w is increasing at a rate of 3 cm/sec. When l=5 cm and w=12 cm, find the rates of change of the area, the perimeter, and the lengths of the diagonals of the rectangle. Determine which of these quantities are increasing, decreasing, or constant. a) The rate of changes of the area of the rectangle is _______ cm^2/sec Is the area increasing, decreasing, or constant? b) The rate of change of the perimeter of the rectangle is ____ cm/sec. Is the perimeter increasing, decreasing, or constant? c) The rate of change of the length of the diagonals of the rectangle is ____ cm/sec. Is the length of the diagonals increasing, decreasing, or constant. Write an equation of the line that passes through (4,-2) and is parallel to y=1/2x -7 what group of people were most respected in the empire of Mali and why Having a lot of choices when making a decision could cause someone toA. feel underwhelmedB. choose exactly what they wanC. feel post-decision regretD. be completely happy with one's choicePlease select the best answer from the choices provided how did you get that answer tho I gotta show my work who was lewis and clark? Geometry question 14 A candy shop sells a box of chocolate for $30. Which is the lnropper way to use this sentence? Which of the following statements is true?a. An insulator speeds up the transfer of heat.b. Radiation is the transfer of heat in solids.c. All moving objects experience friction.d. All work gains some energy as heat. please help me thanks farah pays $29 signup fee to join a car sharing service and a $5 monthly charge the total cost of using the car service for n months can be found using C(n)=29+5n comolete the table Cant figure this out what is the answer? Find the value of X Please help ASAP !!Please help ASAP !!Please help ASAP !! 15PTS PLEASE HELP ASAP!(dont write random answers pls)look at the pic attached: part two thinking a number between 1 and 10 but doble the money! Write the equation ofthe line that passesthrough (2,-4) &has a slope of -1.