1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gemiola [76]
3 years ago
5

Which type of movement lets the player control an object's movement?

Computers and Technology
1 answer:
Levart [38]3 years ago
7 0
X and y imposed axis
You might be interested in
. List four different ways automation can be used in testing?
hichkok12 [17]

Answer:

Automation testing can be used for:

<u>Input-output test :</u> If the main function of your software is to transform input data into output data you can configure a new test by providing a new input/output pair, then the test will check to see if the output matches with the expected values.

<u>Unit test :</u> This test is a script to check the return values of a specific code by initializing it and calling his methods. This is a part of a test-driven development process.

<u>Integration test :</u> This test is a code level script that does a complete check process involving multiple objects. For example, you might make a test for “buy a product” which checks to see if the database is updated, if the data is correct of the person is correct, and if the person placing the order gets the right confirmation email.

<u>Smoke Tests:</u> This test is executed immediately after implementation on production to ensure that the application is still functioning.

6 0
3 years ago
Which of the following best meets the requirements of a strong password?
Hoochie [10]

Answer:

having a capital and lower case letters and a special characters and numbers.

Explanation:

it should be hard but easy enough to remember and no one will know

6 0
3 years ago
Read 2 more answers
Contemporary Information Systems are interfacing with customers andsuppliers using:A. Electronic commerceB. CRMC. SCMD. all of t
ch4aika [34]

Answer:

D. all of the above

Explanation:

Contemporary Information Systems are interfacing with customers andsuppliers using, electronic commerce, CRM, and SCM.

7 0
3 years ago
Troy, an aspiring screenwriter, aspires to work with a famous director known for his philanthropic work. Troy gets an appointmen
kicyunya [14]

Troy should include a short overview of the story that his video will tell and why he wants to tell it (or what the video will be about and why). It should also include the target audience, and where the video will be published.

7 0
3 years ago
Describe the steps involved in data mining or data analytics when viewed as a process of knowledge discovery.
Aleksandr [31]

Answer:

1. Data Cleaning

2. Data Integration

3. Data Selection

4. Data transformation

5. Data Mining

6. Pattern Evaluation

7. Knowledge presentation

Explanation:

The steps involved in data mining or data analytics when viewed as a process of knowledge discovery includes the following:

Step 1. Data cleaning: this involves the elimination of inconsistent data.

Step 2. Data integration: this involves the combination of data from multiple sources.

Step 3. Data selection: this is the step where significant data for task examination are gathered from the database.

Step 4. Data transformation: this the step in which the data are modified for mining by conducting the aggregate operation.

Step 5. Data mining: this step involves the extraction of data patterns through specific techniques.

Step 6. Pattern evaluation: this step involves the identification of patterns that depict knowledge based on measures.

Step 7. Knowledge presentation: this is the step in which visualization and knowledge representation methods are utilized to illustrate mined knowledge to users.

6 0
3 years ago
Other questions:
  • The numbers on the bottom of a typical check represent all of the following EXCEPT?
    12·2 answers
  • The _______________ layer of the TCP/IP protocol suite is responsible for making sure that what leaves one end of the network ar
    9·1 answer
  • Dfd symbols are referenced by using all ____ letters for the symbol name.
    9·1 answer
  • One random part of Chess is whether the white side or the black side moves first? A. True B. False
    10·2 answers
  • Jane sold many notebooks at her school fair and earned a good amount of cash. To keep a record, she entered all the cash values
    10·1 answer
  • A device that protects electronic equipment from an increase in power, but not a decrease or outage is a ___.
    12·1 answer
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • Describe how being a global citizen in the world of advanced technology can be beneficial to your success in meeting your person
    13·1 answer
  • 1. Discuss the pros and cons of human-computer interaction technology?
    6·1 answer
  • Anyone knows the answer for 6.1.4 Happy Birthday! codehs
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!