1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
14

Which major milestones started off the progression that led to the modern computers we play games on now? What do you think affe

cted the popularity of PC vs console gaming in the late 80s and early 90s?
Computers and Technology
1 answer:
MariettaO [177]3 years ago
7 0

Answer:

Explanation:

i dont fing know google it

You might be interested in
What process identifies and grants access to a user who is trying to access a system? A. Credibility
xeze [42]

Answer:

Option C is the correct answer for the above question

Explanation:

Authentication is used to grant a person to use the system so that no other person can hack the data of the system. It is done by some unique id which is provided to the user of that system. When any person wants to use the system he needs to use that a unique id and sometimes password and some other information to use the system.

The above question asked about the process through which the user of the system grants access to use the system only. So the process is Authentication. hence Option C is correct because it states about the process Authentication while the other is not because--

  • Option a states Credibility which is not the process to enter the system.
  • Option b states Authorization which is used if the system gives access to the user, not the user can take on its own.
  • Option d states Honesty which is not the process to enter the system.
8 0
3 years ago
What is Activation code for wwe 2k20 ​
Arte-miy333 [17]
Shouldn’t you get that in your email when you sign up.
5 0
3 years ago
Read 2 more answers
What does gif stand for in computer terms?
SSSSS [86.1K]
<span>GIF stands for Graphics Interchange Format</span> which was released by CompuServe in 1987. The Graphics in GIF is why some people argue against it's originally intended pronunciation as "jif" (like the peanut butter) 
4 0
3 years ago
Write a program using integers user_num and x as input, and output user_num divided by x three times.Ex: If the input is:20002Th
HACTEHA [7]

Answer:

Following are the code to the given question:

user_num = int(input())#defining a variable user_num that takes input from user-end

x = int(input())#defining a variable x that takes input from user-end

for j in range(3):#defining for loop that divides the value three times

   user_num = user_num // x#dividing the value and store integer part

   print(user_num)#print value

Output:

2000

2

1000

500

250

Explanation:

In the above-given program code two-variable "user_num and x" is declared that inputs the value from the user-end and define a for loop that uses the "j" variable with the range method.

In the loop, it divides the "user_num" value with the "x" value and holds the integer part in the "user_num" variable, and prints its value.  

5 0
3 years ago
Which is a difference between the systems development life cycle (SDLC) and extreme programming (XP)?
Wittaler [7]

Answer:

the correct answer is "B"

Explanation:

the Systems development life cycle (SDLC) is a complete development process for a new product without giving any chance for alteration or improvement, Whereas,

extreme programming (XP) uses a software programme that is coded to allow for alteration. the product is continously modify until its meet customers satisfaction.

SDLC is seen as and archaic method of product development while XP is a new technology used by most company.

therefore, the SDLC models develops an entire system at once, where as XP uses incremental steps to improves an information system quality.

6 0
3 years ago
Other questions:
  • Write a program FindDuplicate.java that reads n integer arguments from the command line into an integer array of length n, where
    11·1 answer
  • What are three responsibilities of an operating system? please answer quick!!!
    9·1 answer
  • Which types of computers are used by large businesses
    10·1 answer
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • Given a class called Measure that has the methods and data as specified, choose the correct code to satisfy the requirements of
    13·1 answer
  • Determine the factors using computer failures and defects​
    8·1 answer
  • What is htc one mseven​
    11·1 answer
  • Where to store <br> ammunition
    5·1 answer
  • Which package is required for shadow passwords to be enabled?.
    15·1 answer
  • Which of the following is the system of rules and structure governing
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!