1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
11

1. Which of the following is required to create a computer simulation?

Computers and Technology
1 answer:
Sonbull [250]3 years ago
6 0
1. Data
2. Input
3. Experimentation
4. Calculates Physics
5. You owe me.
6. Do your work next time.
7. You will never be able to enjoy a nice pipe and gin and use an app like this like a trivia game if you don't force yourself to completely understand your work.
8. I sound like your dad.
9. I am right.
You might be interested in
Robin has four copies of her midterm paper saved to a single folder on her
podryga [215]

Answer:

d

Explanation:

i took the test

6 0
3 years ago
A _______ is a host that runs software to provide information, such as web content, to other hosts.
kolezko [41]

Answer:

The correct answer to the following question will be "Server".

Explanation:

  • Any device with a network connection is a host, but only hosts which accept other device connections (climates) are Servers.
  • All servers were hosts, but the servers aren't all hosts.
  • Each host network is a node, however not all network nodes are a host. Networking hardware such as modems, hubs, and network switches are not necessarily network addresses allocated (except for administrative purposes sometimes).
8 0
4 years ago
A software program installed without the user's knowledge and designed to alter the way a computer operates or to cause harm to
RSB [31]

Answer:

The correct answer for the given question is "Computer virus"

Explanation:

A computer virus is a software program that is installed automatically without user's knowledge and designed to duplicate itself .The main purpose of computer virus is to harm the computer system.

Some of the points regarding computer virus

1.The computer virus contain malicious software Which harm the computer system.

2.It damage the  computer computer system in such away that sometimes users will unable to access some certain functionality of computer system.

5 0
3 years ago
Write an algorithm and draw a flowchart to count the digits present in the given integer. ​
saul85 [17]

Answer:

The algorithm is as follows:

Input number  

count = 0

while(number not equal 0)

   number = number / 10

   count = count + 1

end

Print count

Explanation:

This gets input for the integer number

 Input number  

This initializes count of digits to 0

count = 0

The following loop is repeated while number is not 0

while(number not equal 0)

This performs integer division of the number by 10; the resulting division is saved in variable number

   number = number / 10

The count variable is incremented by 1

   count = count + 1

The loop ends here

end

This prints the count of integers

Print count

<em>See attachment for flowchart</em>

8 0
3 years ago
True or False: You cannot restore a deleted file on a volume protected by the Recycle Bin. Select one: a. False b. True
artcher [175]

Answer:

The answer is false

Explanation:

When you delete a file imagine you are erasing the path there. The file still will exist until it is wrote over. If you wish to retrive it many programs can do it for you.

5 0
4 years ago
Other questions:
  • Convert the following binary numbers to decimal numbers. (Show your work) a. 110110 b. 100111 c. 101101
    6·1 answer
  • 1. What does a transistor do?
    6·1 answer
  • Which one is a correct answer
    12·2 answers
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • What feature, new to Windows Server 2012, provides the ability to find identical sets of data on a SAN-based storage array and r
    13·1 answer
  • Create a function named CountVowels() that takes one parameter name epsilon
    10·1 answer
  • Which is a concept of the CIA of Computer Security
    7·1 answer
  • Which of the following does NOT describe the characteristics of cyberbullying?
    15·2 answers
  • Why is color important for all objects drawn ?​
    5·1 answer
  • Databases containing the research, writing and studies conducted by Academic
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!