1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
3 years ago
14

1.Characters archetypes are typical characters that represent universal patterns of human or human roles. (True or false)

Computers and Technology
1 answer:
alisha [4.7K]3 years ago
6 0

Answer:

  1. True
  2. role playing ( c )
  3. false
  4. survival game ( a )
  5. True
  6. false

Explanation:

Real time strategy games is a sub genre of strategy games whereby the game doesn't progress in turns as seen in turn based strategy games which is also a sub genre of strategy games.

A survival game is sub genre of action games which involves players finding themselves in an environment not very friendly and requires them to complete some tasks and also stay alive as long as possible by making skilled jumps,avoiding obstacles completing the task as well.

3D games are three dimensional games and this makes it able to blend with several sub types of camera views.

You might be interested in
Huffman trees use the _________ of each character to work out their encoding. A) Frequency B) Order in ASCll
Maurinko [17]
I think the answer is C but I could be wrong
5 0
3 years ago
2.Use loops to create a 4X6 matrix in which the value of each element is two times its row number minus three times its column n
DiKsa [7]

Answer:

for(i=0; i<4; i++)

{

      for(j=0;j<6;j++)

      {

               A[ i ][ j ] = 2* i - 3*j;

      }

}

Explanation:

In this loop for each i = 0,1,2,3 we fill the the corresponding column values. and then move to next i value i.e. row.

3 0
3 years ago
Which access control principle limits a user's access to the specific information required to perform the currently assigned tas
Svetradugi [14.3K]

Answer:

The answer is "Need-To-Know Access Control Principle"

Explanation:

There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.

The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".

I hope this answer helps.

4 0
3 years ago
Assume that two classes 'Temperature' and 'Sensor' have been defined. 'Temperature' has a constructor that accepts a double para
Black_prince [1.1K]

Answer:

The answer for the following question is given as:

public static Temperature create(Sensor ob)

{

return new Temperature(ob.getReading());

}

Explanation:

In this we have create a static method of  Temperature class which accept a 'Sensor' object and  return the new 'Temperature' object that calls the 'getReading()' function This function returns the sensor's current reading.

7 0
4 years ago
Place the steps in order for inserting an index in a document.
tester [92]

Answer:

Steps to insert an index in a document

Explanation:

  1. open the document
  2. click on the <u>references</u> tab either above or below the document
  3. click the <u>mark entry</u> button
  4. select a word or group of words for the index
  5. click on the <u>mark entry</u> dialogue box
  6. format the page numbers in your index
  7. format the text for your index entry
  8. click <u>mark</u>
  9. click <u>mark all</u>
7 0
3 years ago
Read 2 more answers
Other questions:
  • Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
    13·1 answer
  • A word or line of a paragraph at the top of a page hanging indent is called ______
    8·1 answer
  • If you want to import text into a DTP application that was first created in a word processing program, what must you do?
    9·2 answers
  • Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
    11·2 answers
  • Enlist the various data analysis methods for study of Infrasonic waves, Seismic waves, Earthquake prone areas and how AI can be
    15·1 answer
  • write the algorithm, flowchart and BASIC program to calculate the area of the rectangle length 50m and width 30m.​
    8·1 answer
  • If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta
    8·1 answer
  • Ryan is working on a document with many secotions. For each section,he wantes to have the title bolded,underlined,an blue. Which
    9·2 answers
  • How would a person giving a persuasive speech use projection to make a key point?
    9·2 answers
  • You saved a file on drive C go your computer. You want to find and open the file. Which of the following programs will you use t
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!