1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
3 years ago
9

explain how a computer screen and the eye interact to produce the variety of colors that we see from the 3 colors that are actua

lly displayed on the screen ?
Computers and Technology
1 answer:
Dima020 [189]3 years ago
5 0

Answer:

Each pixel of light coming from your computer is made up of a combination of Red, Blue and Green light of different intensities. As this pixel of light is so small your eye only "sees" the combination of those 3 pixels as the intended colour. (as opposed to just red, green and blue light) (This is also known as additive colour mixing)

You might be interested in
What is the newest iphone?
OlgaM077 [116]

xR max is the newest iPhone out right now

7 0
3 years ago
Read 2 more answers
How do you add a comment box to a multiple choice question in survey monkey?
Sunny_sXe [5.5K]

Answer:

(Hope this helps can I pls have brainlist (crown) ☺️)

Explanation:

1.Drag and drop Comment Box into your survey from the BUILDER section.

2.Enter question text.

3.Configure any additional options.

4.Click Save.

4 0
3 years ago
Using MARS/MIPS
slega [8]

Answer:

Explanation:

MIPS program which increments from 0 to 15 and display results in Decimal on the console

In this program the user defined procedures print_int and print_eot were used to print the integer values and new line characters(\n) respectively.the mechanisam of the loop is explaine in the comment section of the program.

     addi $s0, $0, 0

     addi $s1, $0, 15

print_int:

              li $v0, 1                # system call to print integer

              syscall                

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s1<$s0

beq $s0, $0, end

end:

MIPS progam to increment from 0 to 15 and display results in Hexadecimal on the console

this program is slightly differed from the previous program in this program the system call issued in print_int is implemented with a system call that prints numbers in hex.

addi $s0, $0, 15

     addi $s1, $0, 0

print_int:

   li      $v0,34                  # syscall number for "print hex"

   syscall                         # issue the syscall

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s0>$s1

beq $s0, $0, end

end:

5 0
3 years ago
Google Project Fi customers can set up their phones as a mobile Wi-Fi router and allow their laptops or tablets to surf the Inte
mart [117]

Answer: Tethering

Explanation:

 The wireless tethering is one of the process in which the one person sharing their phone's data, information or file to the another mobile devices over the internet by using the various types of wireless devices such as Bluetooth, Wifi and the universal serial bus cable (USB).

According to the given question, the google project consumers setting up their phones with the WIFI routers and they allow their devices such as tablets, laptops for the purpose of surfing data by using the internet connection.

Therefore, this process is known as the wireless tethering.    

7 0
3 years ago
The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos
cestrela7 [59]

Answer:

A. Helps prevent a system from being fingerprinted by port scans.

B. Can restrict a computer from receiving network traffic.

D. Stop a process or application from launching.

Explanation:

The "host-based firewall" is an important type of<em> firewall software </em>that is being installed into a computer/device in order to allow it to control the network traffic. This enables the host to protect itself from any malware or viruses that may attack. It, primarily, provides a customized protection. Thus, it is more commonly used by <em>small businesses</em> or<em> individual people</em>.

Host-based firewalls allows "packet filtering." This controls the network access which makes it hard for attackers because of the little information that it provides. So, this explains option A. This then prevents a system from being fingerprinted by port scans.

Host-based firewalls can protect the device from unwanted network traffic, so this explains option B. This then restricts the computer from receiving the network traffic.

It can disable programs that are malicious, thereby stopping the launching of those programs. This explains option D.

7 0
3 years ago
Other questions:
  • The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
    6·1 answer
  • Brian needs to assign a macro to a button on the ribbon. Where should he go to achieve this goal?
    13·2 answers
  • A statement describing both the requirements that must be met by a product or process amd the ways in which satisfaction of the
    8·2 answers
  • You are an interior decorator, confronted with a dark living room. To lighten the room up, you have n candles and want to build
    12·1 answer
  • Clusters always occur in multiples of what? <br> A.)10 <br> B.)5<br> C.)2 <br> D.)100
    10·2 answers
  • How do you get the computer to stop opening randomly
    15·2 answers
  • ) how many bits are used for host number on the child network (subnet) , b) how many usable addresses can exist on this child ne
    9·1 answer
  • True or False? PPOs differ from HMOs because they do not accept capitation risk and enrollees who are willing to pay higher cost
    10·1 answer
  • I need to change the subject before they get onto me. I am only revealing info today if you are a friend.
    5·1 answer
  • What OC level is primarily used as a regional isp backbone, and occasionally by very large hospitals, universities, or other maj
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!