1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
5

Why are video games interesting?

Computers and Technology
1 answer:
TiliK225 [7]3 years ago
5 0
Because there fun and helps boys get together or to get ur mind off of stuff
You might be interested in
_________ are the special effects that you see when one slide changes to another in slide show view​
lisabon 2012 [21]

Answer:

Transition effects

Explanation:

Transition effects are the special effects you see when one slide changes to another in slide show view.

8 0
3 years ago
Producers must understand the marginal benefit of making an additional unit which shows the ...
yan [13]

Producers must understand the marginal benefit of making an additional unit which shows the possible gain. Marginal benefit is used in business and economics as a measurement of the change in benefits over the change in quantity. Possible gain is one example of benefit.  This measurement provides the relevant measurement of benefits at a specific level of production and consumption.

8 0
3 years ago
Read 2 more answers
In summary, McKibben argues that the inhabitable planet is shrinking because (select all that apply):
Artist 52 [7]

MCKibben argues that the inhabitable planet is shrinking because:

  • Consistently higher temperatures will likely make certain areas uninhabitable
  • Desertification will reduce the amount of harvestable land
  • Coastlines are being lost to sea level rise.

<h3>What is Shrinking?</h3>

This is the process in which an object or place becomes smaller as a result of various activities.

The most suitable options which explains why the planet is shrinking is as a result of a reduction in the areas in which humans can live as a result of the factors mentioned above.

Read more about Planet here brainly.com/question/11157969

7 0
2 years ago
Convert the following numbers. (Please show all steps; no marks will be awarded if no steps are shown) [1.5 x 4 = 6 marks]
katen-ka-za [31]

Answer:

i. 10210212

ii. 100 101 001 in BASE 2

iii. 46.4631

iv. 12.453125

Explanation:

i. Converting to base 10 we get

=  10 x 162 + 13 x 161 + 9 x 160 = 2777

Converting to base 10 we get  =

2777/3 = 925 with remainder 2

925/3 = 308 with remainder 1

308/3 = 102 with remainder 2

102/3 = 34 with remainder 0

34/3 = 11 with remainder 1

11/3 = 3 with remainder 2

3/3 = 1 with remainder 0

1/3 = 0 with remainder 1

Hence the Answer is 10210212

ii. = Octal is taken in pair of 3 bits , Writing binary of each number in 3 bits we get  = 100 101 001 in BASE 2

iii. = 1 x 52 + 2 x 51 + 3 x 50 + 3 x 5-1   = 38.6 in decimal

Converting to Octal we get

38 /8 = 4 with remainder 6

4 /8 = 0 with remainder 4

.6 x 8 =  4.8

.8 x 8 = 6.4

46.4631

iv. = 1x 81 + 4 x 80 + 3 x 8-1 + 5 x 8-2   = 12.453125

Check here for Free courses about IT and Management www.eacademy.lk

4 0
3 years ago
Which of these can be used as a smartphone with the power of a laptop?
sashaice [31]
I would go with A) Tablet because that's basically a bigger phone and mobile cmp combined, its not D) because that's a synonym for a smartphone and not C) because paper and pencil is not like a smartphone, and not B) because that's like reading online books.
4 0
3 years ago
Read 2 more answers
Other questions:
  • . Gathering information with your eyes is called __________.
    6·1 answer
  • If an ARQ algorithm is running over a 40-km point-to-point fiber optic link then:
    12·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • for what reason do some security professionals consider insiders more dangerous than outside intruders?
    8·1 answer
  • Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
    10·1 answer
  • What happens when two computers use the same IP address?
    15·1 answer
  • Cryptcat is a Linux distribution that includes hundreds of security and hacking tools, including Nessus and Metasploit. It can p
    11·1 answer
  • Someone talk to me please........
    5·2 answers
  • Answer to this problem
    11·1 answer
  • Example of language processor software
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!