Which of these statements regarding mobile games is true?

A.
They are typically played indoors.
B.
They have detailed environments.
C.
Their levels can be completed quickly.
D.
They are typically played for several hours at a time.
E.
They are played on large screens.

Answers

Answer 1
i have a feelings it’s the one that’s about playing for long lengths of time
Answer 2

Answer:

C. The levels can be completed quickly

#PlatoLivesMatter

Explanation:


Related Questions

Write the recursive method printNumber. The public static method named printNumber takes two parameters. The first parameter is an integer array called nums, and the second is parameter is an even int called index. The return value is an integer that is the product of the even index values in nums whose index is less than or equal to index. Assume that the array nums has length >

Answers

Answer:

The function is as follows:

public static void printNumber(int nums[],int index){

if (index < 0) {

 System.out.print(nums[0]);

 return;  }

if (index % 2 == 0){

    if(index!=0){

 nums[index-2]*=nums[index];}  }

printNumber(nums, index - 1);

}

Explanation:

To do this, we need to save the required product in the 0 index element of the array.

This defines the function

public static void printNumber(int nums[],int index){

If the index variable < 0,

if (index < 0) {

Print the 0 index as the product [i.e. the calculated product]

 System.out.print(nums[0]);

This ends the recursion

 return;  }

If the current array index is even

if (index % 2 == 0){

Check if index is not 0

    if(index!=0){

If both conditions are valid, calculate the product and save the result in index - 2 element. The final result is then saved in the 0 index

 nums[index-2]*=nums[index];}  }

Call the function while the base case has not been executed

printNumber(nums, index - 1);

}

Which of the following statements is correct?

Select one:

a. A failure in Network layer crashes the application

b. A failure in Network layer affects transport layer

c. A failure in Network layer affects Data Link layer

d. A failure in Network layer affects entire communication

e. A failure in Network layer stops the device from working entirely​

Answers

C is the best answer

The statement which is correct from the given answer choices is:

C. A failure in Network layer affects Data Link layer

According to the given question, we are asked to show which of the statement about the network layer is most represented accurately.

As a result of this, we can see that a network layer is a part of the OSI model which is in charge of receiving and forwarding service requests from the sender to the receiving host in a network.

With  this in mind, if the network layer fails, then there would also be a failure in the data link layer.

Therefore, the correct answer is option C

Read more here:

https://brainly.com/question/21298343

Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol. If all the stations whose addresses are prime numbers suddenly become ready at once, how many bit slots are needed to resolve the contention

Answers

Answer:

11 bit slot will be needed

Explanation:

The number of prime numbers between 1 through 16

= 2, 3 , 5, 7, 11 and 13

hence we can say 6 stations are to use the shared channel

Given that all the stations are ready simultaneously

The number of bit slots that will be needed to handle the contention will be 11 bits :

slot 1 : 2, 3, 5 , 7, 11 , 13

slot 2 : 2,3, 5, 7

slot 3 : 2, 3

slot 4 : 2 .   slot 5 : 3 .  slot 6 : 5,7.   slot 7 : 5 .   slot 8 : 7.  slot 9: 11,13.  

slot 10 : 11.   slot 11 : 13

(2) What are the limitations of portable computer? ​

Answers

Answer:

Most portable computer are not upgradable and they have a lower specification than most desktop systems

What will the declaration below do to its target?

animation-direction: reverse;
The animation steps will play backward.
The animation steps will play forward, then backward.
The animation steps will play forward.
The animation steps will play backward, then forward.

Answers

The animation steps will play forward then backward

A network consists of 75 workstations and three servers. The workstations are currently connected to the network with 100 Mbps switches, and the servers have 1000 Mbps connections. Describe two network problems that can be solved by replacing the workstations' 100 Mbps switches and NICs with 1000 Mbps switches and NICs. What potential problems can this upgrade cause

Answers

Answer:

A)  i) starvation  ii) flow control

B) Network congestion

Explanation:

A) Network problems that can be addressed / solved

By replacing the workstations 100 Mbps switches with 1000 Mbps switches the problem of

Starvation;  been faced by the servers due to the delay in sending data to be processed by the servers from the workstations will be resolved .

Flow control : The huge difference in the speeds of the workstations and servers causes a network buffer which leads to packet loss therefore when the workstations 100 Mbps switch is replaced with 1000 Mbps switch this network problem will be resolved

b) The potential problem that can be encountered is Network Congestion

Which of the following tools helps ensure your document will open in older versions of word

Answers

Answer:

Compatibility Check

Explanation:

Select File > Info.

In the Inspect Document section, select Check for Issues > Check Compatibility.

Click Select versions to show. A check mark that appears next to the name of the mode that the document is in.

what is polymerization1​

Answers

Answer:

Polymerization, any process in which relatively small molecules, called monomers, combine chemically to produce a very large chainlike or network molecule, called a polymer. The monomer molecules may be all alike, or they may represent two, three, or more different compounds.

please give me brainliest~❤︎ت︎

g Consider a disk queue with requests for I/O to blocks on cylinders 95, 120, 41, 122, 15, 142, 65, 167. The Shortest Seek Time First (SSTF) scheduling algorithm is used. The head is initially at cylinder number 100. The cylinders are numbered from 0 (center of disk) to 199 (edge of disk). a) List the requests in the order in which they will be serviced. b) What is the total head movement (in number of cylinders) incurred while servicing these requests

Answers

Answer:

follows are the solution to the given question:

Explanation:

Please find the image file for the SSTF scheduling algorithm.

Following are the requested order:

[tex]Request \ \ order :\\\\95\\120\\122\\142\\167\\65\\ 41\\15[/tex]

Calculating the Total Head Movement:

[tex]= (100-95) + (120-95) + (122-120) + (142-122) + (167-142) + (167-65) + (65-41) + (41-15)\\\\= 5 + 25 + 2 + 20 + 25 + 102 + 24 + 26\\\\= 229[/tex]

To launch the mail merge help dialog box, what option should you select using the Microsoft word office assistant?​

Answers

Answer:

Complete setup.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) for each entry in the list at once and send to all individuals in a database query or table.

Hence, Mail Merge is a Microsoft Word feature that avails users the ability to insert fields from a Microsoft Access database into multiple copies of a Word document.

Some of the options available in the Write & Insert Fields group of Mail Merge are;

I. Highlight Merge Fields.

II. Address Block.

III. Greeting Line.

Generally, when a user wants to launch the Mail Merge help dialog box, the option he or she should select using the Microsoft word office assistant is complete setup.

Additionally, the sequential steps of what occurs during the mail merge process are;

1. You should create the main document

2. Next, you connect to a data source

3. You should highlight or specify which records to include in the mail.

4. You should insert merge fields.

5. Lastly, preview, print, or email the document.

i cant tell if tubbo is a bee or a goat
or could he be human in the smp

Answers

Answer:

Tubbo is a goat or ram on the Dream SMP.

Explanation:

Since Jschlatt was his father and he's a ram, Tubbo is a ram.

Answer:

yes, the first person`s answer is correct! On the dsmp, Tubbo is a goat, since is father was one as well. The only place he is a bee is the osmp, or Origins smp. when Tubbo first joined the dsmp, he was known for his obsession with bees, which carried into his reputation entirely.

:]

What are the objects in object-oriented programming language?

Answers

Answer:

An object is an abstract data type with the addition of polymorphism and inheritance. Rather than structure programs as code and data, an object-oriented system integrates the two using the concept of an "object". An object has state (data) and behavior (code). Objects can correspond to things found in the real world.

hope it helps ya mate.

8. (a) Write the following statements in ASCII
A = 4.5 x B
X = 75/Y

Answers

Answer:

Explanation:

A=4.5*B

65=4.5*66

65=297

1000001=11011001

10000011=110110011(after adding even parity bit)

X=75/Y

89=75/90

10011001=1001011/1011010

100110011=10010111/10110101(after adding even parity bit)

Write a program that will create an array of random numbers and output the values. Then output the values in the array backwards. SPECIFICATIONS: File name: ArrayBackwards.java Your program must make use of at least one method other than main()to receive full credit (methods can have a return type of void). Suggestion: create and populate the array in the main() method. Make a method for Step 3 below and send in the array as a parameter. Make another method for Step 4 and send in the array as a parameter.

Answers

Answer:

The program is as follows:

import java.util.*;

public class Main{

public static void backward(int [] Rndarray, int lnt){

    System.out.print("Reversed: ");

    for(int itm = lnt-1;itm>=0;itm--){

        System.out.print(Rndarray[itm]+" ");     } }

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 int lnt = input.nextInt();

 Random rd = new Random();

 int [] Rndarray = new int[lnt];

 for (int itm = 0; itm < lnt; itm++) {

        Rndarray[itm] = rd.nextInt();

        System.out.print(Rndarray[itm]+" ");

     }

     System.out.println();

 backward(Rndarray,lnt); }}

Explanation:

This defines the backward() method

public static void backward(int [] Rndarray, int lnt){

This prints string "Reversed"

    System.out.print("Reversed: ");

This iterates through the array

    for(int itm = lnt-1;itm>=0;itm--){

Each element is then printed, backwards

        System.out.print(Rndarray[itm]+" ");     } }

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This gets the array length

int  n = input.nextInt();

This creates a Random object

Random rd = new Random();

This declares the array

 int [] Rndarray = new int[lnt];

This iterates through the array for input

 for (int itm = 0; itm < lnt; itm++) {

This generates a random number for each array element

        Rndarray[itm] = rd.nextInt();

This prints the generates number

        System.out.print(Rndarray[itm]+" ");

     }

This prints a new line

     System.out.println();

This passes the array and the length to backward() method

 backward(Rndarray,lnt); }}

difference between a lesson plan and scheme of work​

Answers

SORRY BUT THERE IS No difference at all

It is about that list of topics to be taught and learned for a specific period or programme, while scheme of work is drawn from the syllabus and broken into pieces to be taken on a termly basis. The lesson plan is a further breaking down of work to be done. ... Yet teachers are the key to effective learning

All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not been initialized properly Dereferencing a null pointer Dereferencing a pointer that has not been assigned to point to a specific address Dereferencing a variable that is not a pointer

Answers

Answer: Dereferencing a variable that is not a pointer

Explanation:

The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.

Some of the reasons for a fatal execution-time error include:

• Dereferencing a pointer that has not been initialized properly

• Dereferencing a null pointer

• Dereferencing a pointer that has not been assigned to point to a specific address.

It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.

Blockchain technology provides what main benefits for the SUber dApp? The ability to link disparate users The ability to connect users with providers The ability to communicate with other smart devices the ability to communicate with other users

Answers

Answer: The ability to communicate with other users

Explanation:

Blockchain technology refers to a structure which help in the storage of transactional records of people in databases, which is referred to as the chain. It is connected in a network by peer-to-peer nodes.

One main benefit of the Blockchain technology for the SUber dApp is that it gives one the ability to communicate with other users.

what is the value of 2020/20×20​

Answers

Answer:.5.05

Explanation:...maths

Answer:

5.05

Explanation:

2020/400= 5.05

HOPE IT HELPED AND GOOD LUCK!!

what is a web browser​

Answers

Answer:

web browser

Explanation:

.........;)

Which term refers to a cloud-native, streamlined technology for hosting cloud-based applications, where a server runs for short bursts only when needed by an application or service

Answers

Answer:

Serverless computing.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

The three (3) main characteristics of cloud computing are;

I. Measured service: it allows cloud service providers to monitor and measure the level of service used by various clients with respect to subscriptions.

II. Resource pooling: this allows cloud service providers to serve multiple customers or clients with services that are scalable and provisional.

III. Elasticity: this is the ability of the cloud computing service to be flexible and adaptive to the traffic or requests from the end users.

Serverless computing is a term which refers to a cloud-native and streamlined technology that is designed typically for hosting cloud-based applications, in which a server operates for short bursts only when needed by an application or service. Serverless computing is used for the allocation of machine resources on demand.

Consider the following sequence of page references: 1 2 3 3 4 4 1 4 1 3 4. Determine how many page faults will occur with LRU(Least Recently Used) for each of the following algorithms, assuming there are only 2 physical page frames and that both are initially empty.

Answers

Answer:

7 page faults

Explanation:

I have created a small Java program that can be seen in the attached picture below. This Java program uses an LRU algorithm in order to find the number of page faults within an array of page references from the references given in the question. Using these references, and the java program we can see that there are a total of 7 page faults. This can be seen in the output highlighted by red in the picture below.

Which of these is true of blackhat and whitehat hackers?

Answers

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

Answer:

c is the answer i hope help you

Because travel distance, cost of living, and other factors vary among the three regions, the annual cost of having a salesperson is $5000 in the east, $11000 in the Midwest, and $7000 in the west. The company has 700000 budgeted for expenses. To ensure nationwide exposure for its product, the company has decided that each region must have at least 10 salespeople. The company wants to know how many salespeople to allocate to each region to maximize the total number of products sold. What type of integer programming model it is

Answers

Answer:

Pure integer programming model

Explanation:

To know the type of integer model, we simply check the expected variable and/or value of the model.

From the question, we understand that the end result is to determine the number of salespeople that will be allocated to the east, midwest and west region.

The number of salespeople is discrete i.e. it is an integer (whole number). Since the result is purely integer, the type of model is Pure integer programming model

Implement a class Rectangle. Provide a constructor to construct a rectangle with a given width and height, member functions get_perimeter and get_area that compute the perimeter and area, and a member function void resize(double factor) that resizes the rectangle by multiplying the width and height by the given factor. (Page EX9-3).

Answers

Answer:

//class declaration

public class Rectangle{

   

   //declare the instance variables - width and height

   double width;

   double height;

   

   

   //the constructor

  public Rectangle(double width, double height){

       

       //initialize the width of the rectangle

       this.width = width;

       

       //initialize the height of the rectangle

      this.height = height;

       

   }

   

   

   //method get_perimeter to compute the perimeter of the rectangle

   public double get_perimeter(){

       

       //compute the perimeter

       //by using the formula 2(width + height)

      double perimeter = 2*(this.width + this.height);

       

       //return the perimeter

       return perimeter;

   }

   

   //method get_area to compute the area of the rectangle

   public double get_area(){

       

       //compute the area

       //by multiplying the width and height of the rectangle

       double area = this.width * this.height;

       

       //return the area

      return area;

   }

   

   

   //method resize to resize the rectangle

   public void resize(double factor){

       

       //resize the width of the rectangle

       //by multiplying the width by the factor

       this.width = this.width * factor;

       

       //resize the height of the rectangle

       //by multiplying the height by the factor

      this.height = this.height * factor;

     

   }

   

}  //end of class declaration

Explanation:

The code above has been written in Java. In contains comments explaining every part of the program.

Create a class called Circle, which has (i) an attribute radius, (ii) a method that returns the current radius of a circle object, (iii) a method that allows the user to reset the radius of a circle, (iv) a method that calculates the area of the circle, and (v) a constructor that takes a number as parameter input and assign the number as the initial value of radius.

Answers

Answer:

Explanation:

The following class is written in Java. I created the entire Circle class with each of the methods and constructor as requested. I also created a tester class to create a circle object and call some of the methods. The output can be seen in the attached picture below for the tester class.

class Circle {

   double radius;

   public Circle(double radius) {

       this.radius = radius;

   }

   public double getRadius() {

       return radius;

   }

   public void resetRadius() {

       radius = 0;

   }

   public double calculateArea() {

       double square = Math.pow((Math.PI * radius), 2);

       return square;

   }

}

Which best describes the condition under which the Unicode output is the same as plain text?

when the text contains no punctuation

when the text contains only characters that are part of Unicode

when the text contains only characters that are part of ASCII

when the text contains no numbers

Answers

Answer:

the answer is c

Explanation:

when the text contains only characters that are part of ASCII- on edge

HAGS

Answer:

when the text contains only characters that are part of ASCII

Explanation:

write a program that takes as input a number of kilometers and prints the corresponding number of nautical miles.

Answers

Answer:

try this

Explanation:

km = float(input('Kilometers: '))

nm = (km * 5400) / 10000

print('%0.4f km = %0.4f Nautical Miles' %(km,nm))

If the user enters any operator symbol other than , -, *, or /, then an UnknownOperatorException is thrown and the user is allowed to reenter that line of input. Define the class UnknownOperatorException as a subclass of the Exception class. Your program should also handle NumberFormatException if the user enters non-numeric data for the operand.

Answers

Answer:

Explanation:

The following code is written in Java. It creates the UnknownOperatorException class and catches it if the user enters something other than the valid operators. If so it continues asking the user for a new input. Once a valid operator is entered, it exits the function and prints the operator.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       char symbol = askForOperand();

       System.out.println("Operand: " + symbol);

   }

   public static char askForOperand() {

       Scanner in = new Scanner(System.in);

       try {

           System.out.println("Enter operator symbol: ");

           char symbol = in.nextLine().charAt(0);

           if ((symbol != '-') && (symbol != '*') && (symbol != '/')) {

               System.out.println(symbol);

               throw new UnknownOperatorException();

           } else {

               return symbol;

           }

       } catch (NumberFormatException | UnknownOperatorException e) {

           System.out.println("Not a valid operand");

           char symbol = askForOperand();

           return symbol;

       }

   }

}

class UnknownOperatorException extends Exception {

   public UnknownOperatorException() {

       System.out.println("Unknown Operator");

   }

}

Select the correct answer.
What is the advantage of using transparencies?
O A. They support better image quality than online presentations.
O B. They are helpful when creating non-linear presentations.
OC. They allow the presenter to jot down points on the slide.
OD. They are better suited to creating handouts.
Reset
Next

Answers

Answer:

They are better suited to creating handouts

PLEASE HELP ASAP!!

This command allows you to duplicate text from one part of a document while keeping the original text.

Cut
Copy
Format
Paste

Answers

The answer to your question is= Copy

Answer: CTRL + C or copy and paste

Explanation: to copy and paste highlight text by dragging mouse or clicking on touchpad and holding over selected text, if not on a computer but on a touch screen device ( ex: Phone, iPad etc) hold down until it is blue use the tear drops from the top and bottom to highlight the text you need. Then hold down the blue area until options come up stop holding and select copy and then go to where you want to put the text and hold down again and select paste. If on computer drag cursor over text while holding down on left click or holding down on touchpad, it will highlight light blue then left click or click on the touchpad with both fingers and repeat the process of copying and pasting as said before.

Hope this helps! :)

Other Questions
porque los animales tienen un esqueleto diferente -biologia 1 .Find the decimal expansion of 7/8 PLEASE HELP (NO GOO GLE PLEASE) 20 POINTSHow does the global Proletariat achieve communism? Please help!!! DUE SOON!!YOU WILL GET 25 POINTS! Please answer this ASAP. I really need it and please explain your answerNo links please which factors are considered when deciding how much of something to produce? g a 144 g metal bar requires 2500 J to change its temperature from 23.5 to 100 degree C what is the specific heat of the metal HELP ASAP PLEASE 3 extra points if you get it right How to find resultant of all vectors? What does p equal in the following sentence: The product of 1/4 and P is negative 2? P = 4P = -4P = 8P = -8 A common thread or repeated idea in a piece of writing A capacitor has plates of area 5.25 * 10 ^ - 5 * m ^ 2 which are separated by 3.14 * 10 ^ - 6 * m . What is its capacitance? Find the vertex of the quadratic function. x-36=f(x) Tsunamis are very long waves in the ocean, sometimes hundreds of miles long. They usually start suddenly as normal waves. Then they change to big waves very quickly. Once this change occurs, tsunami waves travel at great speed. They move across the ocean with little energy loss. Right before they hit land, the water will draw back from the coast. The water may pull back for many hundreds of feet. People who are unaware of the danger may be drawn by this strange site. Then the tsunami will hits. Tsunami's can remove sand from beaches, tear trees from the ground, and destroy whole towns. Tsunamis can be tremendously powerful.Problem and SolutionOrder of ImportanceCompare and ContrastChronological OrderSequence / Process Writing Let h = 3 What is the value of (27 = h)5? Read the sentence.The tectonic plates slammed into each other, pushing one on top of the other and creating a ridge.Which word has the strongest connotative meaning?platesridgetopslammed pls someone actually translate this story to EnglishI'm giving brainlist to the correct answer A bag contains 5 green marbles, 7 yellow marbles, 4 blue marbles, 6 pink marbles, and 3 purple marbles. If two marbles are chosen without replacement, find the probability of choosing a yellow marble, then another yellow marble. Give your answer as a fraction in simplest form. solve the given inequality 11x-20 A group of students are surveyed about which movie they prefer.movie a :14movie b : 9movie c : 5movie d : 3 What is the probability that a student prefers Movie A?