1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
5

Why are video games interesting?

Computers and Technology
1 answer:
TiliK225 [7]3 years ago
5 0
Because there fun and helps boys get together or to get ur mind off of stuff
You might be interested in
A Linux-based OS is called a _____.
solong [7]
It is called kernel
7 0
3 years ago
In which direction streams can send data?
Schach [20]

Answer: streams can send data in only one direction either input or output.

Explanation:

An application must have two network streams in order to send and receive data.

for example if we want to send data from A to B we must have one stream similarly in order to receive data from B to A we must have another network stream.

3 0
4 years ago
What type of malicious computer programs present themselves as useful computer programs or applications?
erastova [34]

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

5 0
3 years ago
Read 2 more answers
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
The function below takes two numeric parameters. The first parameter specifies the number of hours a person worked and the secon
Triss [41]

Answer:

def calculate_pay(total_worked_hours, rate_per_hour):

   if total_worked_hours > 40:

       return (40 * rate_per_hour) + ((total_worked_hours - 40) * 2 * rate_per_hour)

   else:

       return total_worked_hours * rate_per_hour

Explanation:

  • Create the calculate_pay function that takes 2 parameters.
  • Inside the function check whether the total_worked_hours is greater than 40 and then return the pay by calculating with the help of formula for work over 40 hours.
  • Otherwise return the pay by multiplying the total_worked_hours with rate_per_hour.
6 0
4 years ago
Other questions:
  • Define a function print total inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: The
    12·1 answer
  • Name format Many documents use a specific format for a person's name. Write a program whose input is: firstName middleName lastN
    14·2 answers
  • Write a function file that accepts the values of r, a and n as arguments and uses a for loop to return the sum of the first n te
    9·1 answer
  • A broadband router is used to do which of the following? run the programs on a computer locate lost files on a computer manage a
    6·1 answer
  • Universal Container sales reps can modify fields on an opportunity until it is closed. Only the sales operations team can modify
    13·1 answer
  • The Spanning Tree Protocol operates at the Network layer of the OSI model.
    13·1 answer
  • In recent years, the amount of time people spend using electronic devices has sharply increased. What are the benefits and downs
    7·1 answer
  • ......... mi2hej<br><br>ejid8eo19o1b2bxhxjxjdnneejk2929nr
    5·2 answers
  • Explain the importance of technology in at least 100 words
    11·1 answer
  • Discuss the core technologies and provide examples of where they exist in society. Discuss how the core technologies are part of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!