1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
11

1. Which of the following is required to create a computer simulation?

Computers and Technology
1 answer:
Sonbull [250]3 years ago
6 0
1. Data
2. Input
3. Experimentation
4. Calculates Physics
5. You owe me.
6. Do your work next time.
7. You will never be able to enjoy a nice pipe and gin and use an app like this like a trivia game if you don't force yourself to completely understand your work.
8. I sound like your dad.
9. I am right.
You might be interested in
Which of the following is a difference between a centralized communication network and a decentralized communication network? a.
Crazy boy [7]

Option D is the answer.

Option A is rejected because in centralized communication notwork there is no free flow of communication in all directions ( all direction means between all the groups or layers of the network).

Option B is not the answer because centralized and decentralized networks has nothing to do with the size of organizations.

Option C is rejected because decision making process depends on the hard work and technical skills of groups of an organization about a field but not by the network discipline.

Option D is selected because in centralized network the information or decision making power is primarily limited to the upper level or higher members of organization and as mentioned decentralized decides on the basis of decision of all the groups or levels of the network.

5 0
3 years ago
What is the mid-square method?
Rom4ik [11]

Explanation:

Mid-Square Method:-In this method some it takes some digits from the square of a number.This number is a random number.This number can be used as a key for hashing.

This technique is mostly used in hashing so decrease the collision in hash maps.

This method has  a limitation that when we square a large number it may go out of range of integer so we have handle those cases.

8 0
3 years ago
There’s No Difference In Security If You Use A Public PC Or Your Own Computer.
Andreas93 [3]
False because if you use public someone else could be using it as a a trap to get your information and with your own if you no how to use it well you will be safe


3 0
4 years ago
Define 'formatting'<br>​
Fiesta28 [93]

Answer:

Formatting refers to the appearance or presentation of your essay.

Explanation:

Most essays contain at least four different kinds of text: headings, ordinary paragraphs, quotations and bibliographic references.

8 0
3 years ago
Read 2 more answers
The software that requests mail delivery from the mail server to an Internet device is known as mail ____ software.
OleMash [197]

The software that requests mail delivery from the mail server to an Internet device is known as mail client software.

Explanation:

Mail client software is a form of communication in which electronic messages are created and transferred between two or multiple devices connected to a network series or stream.

8 0
3 years ago
Other questions:
  • Professional photography is a competitive job field. <br> true <br> false
    12·2 answers
  • Print person1's kids, apply the IncNumKids() function, and print again, outputting text as below. End each line with a newline.
    12·1 answer
  • Sensitive security information can be shared with whom
    13·2 answers
  • You can use the windows ________ to check on a nonresponsive program
    12·1 answer
  • You are part of an Information Systems project team. Your job is to ensure that the technology and vendor suggested for use in t
    12·1 answer
  • Write and application that reads five integers from the user and determines and prints the largest and the smallest integers. Us
    7·1 answer
  • List 5 uses of computer​
    9·1 answer
  • E) Point out the errors( if any) and correct them:-
    14·1 answer
  • Describe the uses of computer in different fileds? please help me ​
    14·1 answer
  • Which XXX and YYY correctly output the smallest values? Vector user Vals contains integers (which may be positive or negative).
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!