Discuss your favorite video games and why you like them. What types of features make a game fun to play? Why are they features effective?

Answers

Answer 1

Answer:

My favorite video games are Rainbow Six Seige and For Honor

Explanation:

I like RSS because it keeps me etertained for a long time compared to other games where I get bored of them quickly and also because when you play with friends it's even more fun. I enjoy For Honor because it's like an olden days kinda game which for some reason is fun. : ) The features in both games are very realistic and that's what I like about them because when you have your headset on and you really in the zone it can sometimes feel like your in the game

Answer 2

Answer:

I like all of the games no favorite

Explanation:


Related Questions

It is important to know the terms of use of any website because why

Answers

They may be selling your information. For example have you ever seen a icon that said accept cookies.. that is a type of term you must agree on to enter certain websites.
They could sell your information or HAC you

What is the correct command to shuffle the following list? import random people= ["Peter", "Paul", "Mary', 'Jane'] O shuffle (people) Opeople.shuffle() random.shuffle (people) random.shufflelist(people)​

Answers

Answer:

import random

people = ["Peter", "Paul", "Mary", "Jane"]

random.shuffle(people)

Explanation:

If a machine cycle is 2 nanoseconds , how many machine cycles occur each second?

Answers

Answer: 5 × 10^8 cycles per second

Explanation:

First and foremost, we should note that 1 nanosecond = 1 × 10^-9 seconds

We are told that the machine cycle is 2 nanoseconds.

The number of machine cycles that occur each second will them be calculated as:

1 = 2 × 10^-9

= 5 × 10^8 cycles per second

The number of machine cycles that occur each second is 5 × 10^8 cycles per second.

if the relationship between AGENT and CUSTOMER were implemented in a hierarchical model, what would hierarchical structure look like?

Answers

If the relationship between AGENT and CUSTOMER were implemented in a hierarchical model, the hierarchical structure could look like the following:

Level 1: Company or Organization

At the top level of the hierarchy would be the company or organization that the AGENT represents. This could be a financial services firm, insurance company, or any other type of organization that provides products or services to customers.

Level 2: Department or Business Unit

At the second level of the hierarchy would be the department or business unit within the organization that the AGENT is a part of. This could include the sales department, customer service department, or any other department that interacts directly with customers.

Level 3: AGENT

At the third level of the hierarchy would be the AGENT who interacts directly with the CUSTOMER. This could be a sales representative, account manager, or any other type of agent who is responsible for managing the relationship with the customer.

Level 4: CUSTOMER

At the bottom level of the hierarchy would be the CUSTOMER who interacts with the AGENT. Each AGENT would be responsible for managing a group of customers, and each customer would be assigned to a specific AGENT.

The hierarchical model would be useful for organizing and managing large numbers of customers within an organization, allowing for clear lines of communication and accountability at each level of the hierarchy. However, it is important to note that not all relationships between AGENT and CUSTOMER may fit into a hierarchical model, and other types of organizational structures may be more appropriate in certain situations.

Which computer is faster?
Which computer has more storage space?
Read the scenario, and then use the drop-down
menus to select the correct term for each
description or sentence.
Mrs. P is shopping online for a new laptop.
Computer A has the following features: 1.7 GHz
processor, 4 GB RAM, and 64 GB of internal
storage.
Which computer has more â ætemporaryâ€
memory?
For a faster laptop with good RAM and storage,
which computer should Mrs. P get?
DONE
Computer B has a 2.2 GHz processor, 8 GB RAM,
and 750 GB of internal storage.

Answers

Answer:

Mrs P should buy Computer B.

Explanation:

She should buy it bcos the bigger the RAM the faster the computer.

Mrs P should buy computer b because it has a greater ram.

it is the process of combining the main document with the data source so that letters to different recipients can be sent​

Answers

The mail merge is  the process of combining the main document with the data source so that letters to different recipients can be sent​.

Why is mail merge important?

Mail merge allows you to produce a batch of customised documents for each recipient.

A standard letter, for example, might be customized to address each recipient by name.

The document is linked to a data source, such as a list, spreadsheet, or database.

Note that Mail merge was invented in the 1980s, specifically in 1984, by Jerome Perkel and Mark Perkins at Raytheon Corporation.

Learn more about mail merge at:

https://brainly.com/question/20904639

#SPJ1

You decide that you want to run multiple operating systems on a single machine which of these will you need?

firmware

multitasker

hypervisor

0S switcher

Answers

Answer:

Hyer-V = Hypervisor

Explanation:

Hyper visor because their job is to mostly multi Task work

what are the main social and cultural impacts of lot?

Answers

Internet of Things refers to the connected devices and the technology that enables communication between the devices and between them and the cloud.

What are the main social and cultural impacts of IoT?Social impacts : Reduced waste, costs, and difficulties are promised benefits of the Internet of Things (IoT). As a result, it helps to increase productivity and enables us to live a more joyful, eco-friendly, and productive life.The Internet of Things (IoT) is also having a physical impact on society. Students will have access to the most recent materials and data thanks to IoT, which will free them from reliance on outmoded textbooks.Cultural impacts: IoT can build connection networks that change how people interact. The Internet of Things is working to keep us healthier and provide better healthcare.From wearable devices that incorporate medical equipment to smart sensors that provide real-time data on illnesses and remote monitoring of vital body processes ,the cultural role of IoT is tremendous.

To learn more about Internet of Things , refer:

https://brainly.com/question/29240985

#SPJ1

how can the various templates that are available for new word documents to be accessed?
A opening up an instance of word
B pressing CTRL+N with word open
C clicking file to enter backstage view
D all of the above​

Answers

Answer:

ITS D ALL OF THE ABOVE.

Explanation:

HOPE THIS HELPS?

The various templates that are available for new word documents can be accessed by opening up an instance of word, pressing CTRL+N with word open and clicking file to enter backstage view. The correct option is D.

What is template?

Pre-made designs and documents that can be customized are referred to as design templates.

Templates are frequently designed to meet specific standards or specifications in order to be consistent across users and mediums.

A template is a document format that you can use to create your own. The templates available for new Word documents can be accessed by clicking File and then New.

Here you will find all of the templates available for use as well as the option to search for templates online that can be downloaded.

To access the various templates available for new Word documents, open a new instance of Word, press CTRL+N with Word open, and then click file to enter backstage view.

Thus, the correct option is D.

For more details regarding templates, visit:

https://brainly.com/question/13566912

#SPJ5

Question providede in the document please use my provided codes!!

Answers

Answer:

become successful in your Photo to the best of all time favorite

what is 111111111x0 PLS HELP

Answers

Answer: 0

Explanation:

Answer:

111111111

Explanation:

Choose a database application with which you are familiar. Design a schema
and show a sample database for that application, using the notation of Fig-
ures 1.2 and 2.1. What types of additional information and constraints
would you like to represent in the schema? Think of several users of your
database, and design a view for each.
Think of different users for the database shown in Figure 1.2. What types of
applications would each user need? To which user category would each
belong, and what type of interface would each need?
If you were designing a Web-based system to make airline reservations and se
airline tickets, which DBMS architecture would you choose from Section 2.5
Why? Why would the other architectures not be a good choice?
Consider Figure 2.1. In addition to constraints relating the values of col-
umns in one table to columns in another table, there are also constraints that
impose restrictions on values in a column or a combination of columns
within a table. One such constraint dictates that a column or a group of col-
umns must be unique across all rows in the table. For example, in the
STUDENT table, the Student number column must be unique (to prevent two
different students from having the same Student number). Identify the col-
umn or the group of columns in the other tables that must be unique across
all rows in the table.

Answers

The organization of data into tables with the proper attributes, visualization of the relationships between tables and columns, and imposition of restrictions like data types are all accomplished via a schema.

What is meant by schema design?

The design of a database schema establishes how to split data into distinct entities, how to link structured entities together, and how to apply constraints to the data. In order to provide programmers and analysts with a logical understanding of the data, designers construct database schemas.

A schema places restrictions such data types and indicates how tables and columns relate to one another. It also arranges data into tables with the proper attributes. For example, a well-designed schema in a data warehouse frees up the analyst's workflow from cleaning and other preprocessing.

Logical, physical, and view schemas are the three different types of schemas.

The database's logical level design is described by the logical schema.Physical Schema: This term refers to the physical design of the database.View Schema: This specifies the database's design down to the level of the view.

To learn more about schema design refer to:

https://brainly.com/question/13014061

#SPJ1

In most cases, the word "software" is interchangeable with the word

Answers

Answer:

In most cases, the word "software" is interchangeable with the word "program"

Explanation:

The terms software and program are used interchangeably as they often refer to the same thing in daily usage.

What is an online payment gateway?​

Answers

Answer:

it is the key component of the electronic payment processing system, or through which type of payment you are giving through.

Explanation:

brainiliest

Write any kind of loop to prove that a number is a palindrome number. A palindrome number is a number that we can read forward and backward and the result of reading both ways is the same: e.g 147741 is a palindrome number.  
Write me a code program C, please

Answers

The program is based on the given question that checks whether a given number is a palindrome:

The Program

#include <stdio.h>

int isPalindrome(int num) {

   int reverse = 0, temp = num;

   while (temp > 0) {

       reverse = reverse * 10 + temp % 10;

       temp /= 10;

   }

   return (num == reverse);

}

int main() {

   int number;

   printf("Enter a number: ");

   scanf("%d", &number);

   if (isPalindrome(number))

       printf("%d is a palindrome number.\n", number);

   else

       printf("%d is not a palindrome number.\n", number);

   return 0;

}

This program's isPalindrome function checks if an input integer is a palindrome number by using a while loop to continuously extract the last digit and build the reversed number. If reversed number = original number, function returns 1 (true); else function returns 0 (false). The main function prompts input, checks for palindrome status, and displays the result.

Read more about programs here

https://brainly.com/question/26134656
#SPJ1

PHP Create a for loop that initialize with the variable $i = 10 The loop outputs $i as long as $i is greater than 1 using for loop Use echo statement to output $i Make sure to use operator based on the desired condition mentioned (increment $i++ / decrement $i–) Make sure each line of code ends with a semi colon i.e ;

Answers

Answer:

The PHP code is as follows

<?php

for ($i = 10; $i>1; $i--)

{

echo $i.' ';

}

?>

Explanation:

The code is self explanatory and doesn't require comments before it can easily understood.

The program starts with a php opening tag <?php

And it ends with the closing tag ?>

The interpretation of the question is to print integer values from 10 to 1

To do this, an iteration is needed.

The above program makes use of a for loop iteration.

Analysis;

for ( -> This shows that it is a for loop iteration

$i = 10; -> Iterating variable $i is initialized to 10 (that is; printing will start at 10)

$i>1; -> Iteration is valid while $i is greater than 1 (e.g. 2,3,4...10)

$i-- -> For every Iteration, decrease $i by 1

) -> End of Iterating condition

echo $i.' '; -> This line prints the valid values of $i. In this case, the values of $i is from 10 and stops at 2

The output is as follows

10 9 8 7 6 5 4 3 2

Hi!
i want to ask how to create this matrix A=[-4 2 1;2 -4 1;1 2 -4] using only eye ones and zeros .Thanks in advance!!

Answers

The matrix A=[-4 2 1;2 -4 1;1 2 -4] can be created by using the following code in Matlab/Octave:

A = -4*eye(3) + 2*(eye(3,3) - eye(3)) + (eye(3,3) - 2*eye(3))

Here, eye(3) creates an identity matrix of size 3x3 with ones on the diagonal and zeros elsewhere.

eye(3,3) - eye(3) creates a matrix of size 3x3 with ones on the off-diagonal and zeros on the diagonal.

eye(3,3) - 2*eye(3) creates a matrix of size 3x3 with -1 on the off-diagonal and zeros on the diagonal.

The code above uses the properties of the identity matrix and the properties of matrix addition and scalar multiplication to create the desired matrix A.

You can also create the matrix A by using following code:

A = [-4 2 1; 2 -4 1; 1 2 -4]

It is not necessary to create the matrix A using only ones and zeroes but this is one of the way to create this matrix.

QUESTION 16
Leif is designing a website for his employer. Which of the f
alt text?
a. A photo of the team members
O b. The company logo
O c. The page title
d. A graphical icon

Answers

Leif is designing a website for his employer. The elements on the home page that will NOT require alt text is option  C) The page title

What is the designing  about?

Alt text could be a content portrayal that can be included to pictures and other non-textual elements on a webpage. Its reason is to supply a printed elective to the visual substance, making it available to clients who are outwardly disabled or have other inabilities that affect their ability to see images.

The company symbol could be a visual component that's regularly as of now went with by content, such as the title of the company. In this manner, alt content may not be essential for the symbol.

Learn more about designing   from

https://brainly.com/question/2604531

#SPJ1

See text below

Leif is designing a website for his employer.Which of the following elements on the home page will NOT require alt text?

A) The company logo

B) A photo of the team members

C) The page title

D) A graphical icon

How do technologies such as virtual machines and containers help improve
operational efficient?

Answers

Answer:

Through the distribution of energy usage across various sites, virtual machines and containers help to improve operational efficiency. A single server can accommodate numerous applications, negating the need for additional servers and the resulting increase in hardware and energy consumption.

Hope this helps! :)

Type the correct answer in the box Spell all words correctly.
Jenny has entered data about models of laptops from company A and company B in a worksheet. She enters model numbers of laptops from company
A along with their details in different columns of the worksheet. Similarly, she enters details of all the laptop models from company B, Which option will
help Jenny view the data for company A and company B in two separate sections after printing?
The BLANK option will help her view the data for company A and company B in two separate sections after printing.

Answers

The option that will help Jenny view the data for company A and company B in two separate sections after printing is option A: Page Break View

The Split option will help her view the data for company A and company B in two separate sections after printing.

What does "page break" mean?

To conclude a page without adding more text, use page breaks. Put a page break after the graduation date on the title page, for instance, to ensure that the title page of your thesis or dissertation is distinct from the signature page.

Therefore, in the context of the above, Jenny can find the split option under the tab and the way to go about it is by: Select the Split command by clicking the View tab on the Ribbon. There will be several panes in the workbook. Using the scroll bars, you can navigate across each pane separately and compare various workbook portions.

Learn more about Page Break View from

https://brainly.com/question/6886781
#SPJ1

See full question below

Jenny has entered data about models of laptops from company A and company B in a worksheet. She enters model numbers of laptops from company A along with their details in different columns of the worksheet. Similarly, she enters details of all the laptop models from company B, Which option will help Jenny view the data for company A and company B in two separate sections after printing?

answer choices

Page Break View

Normal View

Margins View

Page Layout View

You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this executable file MOST likely run on?

Answers

Since you have found a file named FunAppx86.exe on your hard drive, the systems that this executable file MOST likely run on is Both 32-bit and 64-bit systems.

What does 32- and 64-Bit Mean?

When it comes to computers, the processing capability differential between a 32-bit and a 64-bit is everything. 64-bit processors are newer, quicker, and more secure than 32-bit processors, which are older, slower, and less secure.

Therefore, A computer file that contains an encoded sequence of instructions that the system can directly execute when the user clicks the file icon," is the definition of an executable file.

Learn more about executable file from

https://brainly.com/question/28146265
#SPJ1


simple machines reduce the amount of work necessary to perform a task.
true or false?

Answers

True.

Simple machines are devices that are used to make work easier. They can reduce the amount of force, or effort, required to perform a task by increasing the distance over which the force is applied, or by changing the direction of the force. Examples of simple machines include levers, pulleys, wheels and axles, inclined planes, wedges, and screws. By using simple machines, the amount of work required to perform a task can be reduced.

Code to be written in R language:

The Fibonacci numbers is a sequence of numbers {Fn} defined by the following recursive relationship:

Fn= Fn−1 + Fn−2, n > 3
with F1 = F2 = 1.

Write the code to determine the smallest n such
that Fn is larger than 5,000,000 (five million). Report the value of that Fn.

Answers

Here is the R code to determine the smallest n such that the Fibonacci number is larger than 5,000,000:

fib <- function(n) {

 if (n <= 2) {

   return(1)

 } else {

   return(fib(n - 1) + fib(n - 2))

 }

}

n <- 3

while (fib(n) <= 5000000) {

 n <- n + 1

}

fib_n <- fib(n)

cat("The smallest n such that Fibonacci number is larger than 5,000,000 is", n, "and the value of that Fibonacci number is", fib_n, "\n")

The output of this code will be:

The smallest n such that Fibonacci number is larger than 5,000,000 is 35 and the value of that Fibonacci number is 9227465.

Learn more about R language here: https://brainly.com/question/14522662

#SPJ1

The UDP protocol provides reliable, connectionless service.
a) true
b) false

Answers

It’s false bc the connectionless service was not reliable

i want code to put in code vision avr for conurrent controling LED lamp and cath-7 segment(without button)
the simulation in proteus should be like that we have one atmega and a led and 7 seg ground and res with one port of 7 seg in connected to micro and one port of led should be connect to micro.

Answers

Code for Concurrent Controlling of LED Lamp and Cath-7 Segment (without button)

-------------------------------------------------------------------------------------------------------------

To control a LED lamp and Cath-7 segment concurrently without using any button, we can use Code Vision AVR software. Here is the code for the same:

```

#include <mega16.h>

#include <delay.h>

void main()

{

   DDRB = 0xFF; // Set all pins of PORTB as output

   DDRC = 0xFF; // Set all pins of PORTC as output

   while(1)

   {

       // Turn on LED lamp

       PORTB.0 = 1;

       delay_ms(500);

       PORTB.0 = 0;

       delay_ms(500);

       // Display digits on Cath-7 segment

       PORTC = 0x3F; // Display 0

       delay_ms(1000);

       PORTC = 0x06; // Display 1

       delay_ms(1000);

       PORTC = 0x5B; // Display 2

       delay_ms(1000);

       PORTC = 0x4F; // Display 3

       delay_ms(1000);

       PORTC = 0x66; // Display 4

       delay_ms(1000);

       PORTC = 0x6D; // Display 5

       delay_ms(1000);

       PORTC = 0x7D; // Display 6

       delay_ms(1000);

       PORTC = 0x07; // Display 7

       delay_ms(1000);

       PORTC = 0x7F; // Display 8

       delay_ms(1000);

       PORTC = 0x6F; // Display 9

       delay_ms(1000);

   }

}

```

Once you have written the code, you can simulate it in Proteus. Here are the steps to simulate the circuit:

1. Open Proteus and create a new project.

2. Search for "ATmega16" in the components library and add it to the project.

3. Add a LED and Cath-7 segment to the project by searching for them in the components library.

4. Connect the LED to any PIN of PORTB and Cath-7 segment to any PIN of PORTC.

5. Now, double-click on the ATmega16 chip and upload the code to it.

6. Finally, run the simulation and you should see the LED lamp and Cath-7 segment displaying digits concurrently.

Hope this helps!

Match the different aspects of the marketing information systems to the scenarios that portray them.
1. Marketing intelligence system
2. Internal reporting system
3. Marketing model
4. Marketing research system

A. includes number of orders received, stock holdings, and sales invoices
B. MIS collects, regulates, and analyzes data for marketing plan
C. gathers information such as demographic data
D. includes time series, sales model, and linear programming

Answers

Answer:

1. Marketing intelligence system - C

2. Internal reporting system - A

3. Marketing model - D

4. Marketing research system - B

Explanation:

Research and discuss web navigation.
Include discussion of web site navigation design patterns.
Please, use your own words.

Answers

Answer:

Answered below

Explanation:

Web navigation is the pattern in which information can be accessed through the navigation of a network of resources on the web. A good web navigation design enhances usability and ease of finding information, and as a result, improves user experience.

In hierarchical web navigation, the website navigation is structured in a general to specific order.

Global navigation shows all the main sections of the website such as home, about, contacts etc.

Local navigation provides links within the pages of the website where users can navigate to other related pages of the website.

Design uses styles such as navigation bar, drop-down menu, site map and fly-out menu to create user interfaces that enhance navigation.

Explain IPv6 and what it is used for Page 2: Suggest methods for protecting a network

Answers

IPv6 is a new version of the Internet Protocol that is designed to replace the current IP address (IPv4). It provides more efficient routing for data packets and is capable of handling more devices. To protect a network, one should use Firewalls, Anti-Virus Software, and Encryption.

What is IP?
It is a set of rules that define how data is transmitted over the internet. IP is the backbone of the internet and is responsible for enabling communication between different devices. It allows data to be sent from one computer to another, regardless of the two computers’ physical locations. It is the most important protocol for the World Wide Web and is used to connect computers to one another.

To know more about IP
https://brainly.com/question/21864346
#SPJ1

As the complexity of a network increases, the possibility of security breaches decreases. is this true or false

Answers

As the complexity of a network increases, the possibility of security breaches decreases is a false statement.

What is the complexity of a network?

Network complexity is known to be a term that connote the series of nodes and alternative paths that is said to often exist inside of a computer network.

A network is seen to be complex due to the nature of its functions as it is known to be often multipurpose in nature.

It is one that is seen as the different kinds  of communication media, communications equipment, as well as the protocols, hardware and software applications that can be located in the network.

Therefore, As the complexity of a network increases, the possibility of security breaches decreases is a false statement.

Learn more about security breaches from

https://brainly.com/question/24956493
#SPJ1

In Task 2, you worked with Sleuth Kit and Autopsy which rely on the Linux Web service called Apache IIS Nginx Cherokee

Answers

Sleuth Kit and Autopsy are digital forensics tools that can be used on multiple platforms, including Linux, Windows, and macOS. They do not rely on any web service such as Apache, IIS, Nginx or Cherokee.

What exactly is digital forensics?

Digital forensics is the application of scientific methods and techniques to identify, collect, analyze, and preserve electronic data in a way that is admissible as evidence in a court of law.

It is used to investigate digital devices and networks to uncover evidence of crimes such as fraud, theft, cyberbullying, and cyberstalking.

The goal is to reconstruct digital events, determine the sequence of activities, and recover evidence that can be used in legal proceedings.

To learn more about digital forensics, visit: https://brainly.com/question/26694391

#SPJ1

Other Questions
Explain one method by which antispyware eliminates spyware. On what is the geological time scale based? A: changes in climate and historical recordsB: geological and biological eventsC: geological eventsD: evolutionary events A question asks: How many hours per week do you watch television? The respondent can answer in minutes and/or hours. What would be the best numerical summary of data from 300 participants? A. Mean, standard deviation, and range B. Median, IQR, and range C. Number and percent of total for each response option D. A or B depending on the distribution of the sample E. B and C whats the area of the shaded region place the boxes in the correct location this Math problem 15 points What is GDP also known as? what concentration of cu2 is needed to have a concentration of cu(cn)42- equal to 2.0 10-5 m in a solution with a [cn] of 9.3 10-4 m? kf of cu(cn)42- = 1.0 1025 Solve -8 + 4 < 36.. _-4 Lee y escoge la opcin con la forma correcta del verbo en subjuntivo para completar la frase. Read and choose the option with the correct form of the subjunctive of the verb to complete the sentence.Yo ser astronauta y explorar otros planetas con otros cientficos y colegas tan pronto como ________ mis estudios. acabe acababa acabara acabar summary of better that tw show sara swan miller Jorge bought 8 pounds of ground beef for $3.29 a pound. About how much did he pay altogether? variance is the: Select one: a. sales manager. b. purchasing manager. c. production supervisor. d. head of the human resources department. e. finance manager. how many fourths in 1/4 Question 3 options: lily is building a picture frame. the larger rectangle represents the frame. the smaller rectangle represents the picture. the shaded area represents the 2-inch border around the picture. what is the area of the border, or the shaded region, of this figure in square inches? 11, 14, 17, ...Find the 42nd term. Find an equation of variation in which y varies jointly as x and z, and y= 48 when x = 8 and z=6 How does the development of ancient China under the Shang dynasty compare with that of ancient Egypt?COME ON I NEED HELP!!!!! I HAVE BEEN STUCK WITH THIS QUESTON! Translate the following situations into one-variable equations with variables on both sides. 1) A local zoo has two large snakes. The anaconda is currently 5.23 meters long and grows 1.27 meters every month. The python is 4.76 meters long and grows 2.04 meters per month. How many months (m) does the zookeeper need to wait for the two snakes to be the same length? a. Write the question or problem statement for the situation. Which group of nineteenth century immigrants received the most efficient processing in _____________, a person exhibits persistently harmful thoughts, feelings, and actions.