1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
2 years ago
10

How does Mixed Reality expand on Augmented Reality?

Computers and Technology
1 answer:
taurus [48]2 years ago
3 0

Mixed Reality expand on Augmented Reality option d: by enabling real-time interaction between real and virtual objects.

<h3>How does mixed reality expand on augmented reality?</h3>

Mixed reality is known to be one that is made up of both augmented reality and that of augmented virtuality.

Note that Mixed reality is one that acts so as to make an environment with interactive kinds of digital objects. Augmented reality needs a screen to be able to experience the augmented experience. Mixed reality is said to be experienced via the a headset.

Hence, Mixed Reality expand on Augmented Reality option d: by enabling real-time interaction between real and virtual objects.

Learn more about Augmented Reality from

brainly.com/question/9054673

#SPJ1

You might be interested in
Complete the following sentences by choosing the best answer from the drop-down menus.
aleksandrvk [35]

Answer:

b. Application software

Explanation:

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

Examples:

Microsoft Office Word, Excel, Powerpoint

i think i did that right:)

7 0
2 years ago
Which of these are examples of skills?
UNO [17]

Answer: D. D:Associate's degree in IT, experience in customer service and confident​

Explanation:

Skills are referred to as the talent that a person needs so as to do a particular job. For us to succeed in every facets of life, having a skill is of immense benefit.

A skill is referred to as the personal qualities, abilities and knowledge, that has been developed by a person. The option that answers the question will be D:Associate's degree in IT, experience in customer service and confident​

5 0
2 years ago
Read 2 more answers
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
How does tracking changes relate to sharing a workbook in Excel?
ElenaW [278]

Answer:When you highlight changes as you work, Excel outlines any revisions (such as changes, insertions, and deletions) with a highlighting color. On the Review tab, click Track Changes, and then click Highlight Changes. Select the Track changes while editing. This also shares your workbook check box.

Explanation:

8 0
2 years ago
After a suspected identity fraud case has been resolved, you should: AContinue to monitor your credit reports and accounts. BKee
AysviL [449]
The answer is C. Both A and B because in the case of identity fraud it would make sense to monitor both
4 0
2 years ago
Read 2 more answers
Other questions:
  • A _______ record is responsible for resolving an ip to a domain name.
    9·1 answer
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    7·1 answer
  • Your instructor has asked you to perform some research regarding a computer OS capability of distinguishing spoken words. What i
    14·1 answer
  • ____ is the only automated disk-to-disk tool that allows you to copy data to a slightly smaller target drive than the original s
    5·1 answer
  • An overall indication of the dependability of data may be obtained by examining the ________, credibility, reputation, and _____
    15·2 answers
  • What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryp
    10·1 answer
  • Safety glasses should be worn in which of the following situations?
    5·1 answer
  • Next, Leah wants to add a content slide that allows her to insert a table.
    8·2 answers
  • Can someone let me join your kingdom if anybody knows this game and plays it as well. ​
    13·1 answer
  • All cells in row 2 through 5 are referred as 2:5 true or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!