1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Orlov [11]
3 years ago
8

Which of these features will future games incorporate?

Computers and Technology
2 answers:
podryga [215]3 years ago
8 0

Answer:

tactical AI and lighting

Explanation:

One of these features is tactical AI. For example, in recent Maddens, if is different facing the Baltimore Ravens, a run-heavy offense, then facing a pass happy offense like the New York Jets. This is a example of tactical AI that did not use to be present in previous iterations of the game and there are now. Other games are expected to follow the same model.

Other of these features is better lightinng. For example, MLB The Show has progressive lighting. That is, a game may start during the day and finish at night. In the past, the game could start at like 3 pm and go for 20 innings, lasting 7 hours, and still finish with day lighting.

So the correct answer is:

tactical AI and lighting

omeli [17]3 years ago
6 0
Tactical ai and lighting
You might be interested in
____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve
pav-90 [236]

Answer:

Correct Answer is (d) Information sensitivity policy

Explanation:

Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.

However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.

However, only information sensitivity policy is used for classifying and securing organization information to the outside world.

The intention of information sensitivity policy:

The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.

7 0
3 years ago
If a person is proactive, they do NOT have to be defensive.<br> True<br> False
Thepotemich [5.8K]
The answer is true for this question
6 0
3 years ago
Read 2 more answers
The smallest unit of time in music called?
zmey [24]

Answer:

Ready to help ☺️

Explanation:

A <em>tatum</em> is a feature of music that has been defined as<u> the smallest time interval</u> between notes in a rhythmic phrase.

7 0
3 years ago
Read 2 more answers
Which of the following is NOT a name of one of the central features of Facebook? Timeline Activity Log Graph Search Daily News
Thepotemich [5.8K]
I think it's Graph Search because there isn't any graphs in Facebook. That is my opinion. I don't use social media.
4 0
3 years ago
1. Write a telephone lookup program. Read a data set of 1, 000 names and telephone numbers from a file that contains the numbers
Fed [463]

Answer:

Kindly note that, you're to replace "at" with shift 2 as the brainly text editor can't take the symbol

Explanation:

PhoneLookup.java

import java.io.FileReader;

import java.io.IOException;

import java.util.Scanner;

public class PhoneLookup

{

  public static void main(String[] args) throws IOException

  {

     Scanner in = new Scanner(System.in);

     System.out.println("Enter the name of the phonebook file: ");

     String fileName = in.nextLine();

     LookupTable table = new LookupTable();

     FileReader reader = new FileReader(fileName);

     table.read(new Scanner(reader));

   

     boolean more = true;

     while (more)

     {

        System.out.println("Lookup N)ame, P)hone number, Q)uit?");

        String cmd = in.nextLine();

       

        if (cmd.equalsIgnoreCase("Q"))

           more = false;

        else if (cmd.equalsIgnoreCase("N"))

        {

           System.out.println("Enter name:");

           String n = in.nextLine();

           System.out.println("Phone number: " + table.lookup(n));

        }

        else if (cmd.equalsIgnoreCase("P"))

        {

           System.out.println("Enter phone number:");

           String n = in.nextLine();

           System.out.println("Name: " + table.reverseLookup(n));

        }

     }

  }

}

LookupTable.java

import java.util.ArrayList;

import java.util.Collections;

import java.util.Scanner;

/**

  A table for lookups and reverse lookups

*/

public class LookupTable

{

  private ArrayList<Item> people;

  /**

     Constructs a LookupTable object.

  */

  public LookupTable()

  {

      people = new ArrayList<Item>();

  }

  /**

     Reads key/value pairs.

     "at"param in the scanner for reading the input

  */

  public void read(Scanner in)

  {

     while(in.hasNext()){

         String name = in.nextLine();

         String number = in.nextLine();

         people.add(new Item(name, number));

     }

  }

  /**

     Looks up an item in the table.

     "at"param k the key to find

     "at"return the value with the given key, or null if no

     such item was found.

  */

  public String lookup(String k)

  {

     String output = null;

     for(Item item: people){

         if(k.equals(item.getName())){

             output = item.getNumber();

         }

     }

     return output;

  }

  /**

     Looks up an item in the table.

     "at"param v the value to find

     "at"return the key with the given value, or null if no

     such item was found.

  */

  public String reverseLookup(String v)

  {

      String output = null;

         for(Item item: people){

             if(v.equals(item.getNumber())){

                 output = item.getName();

             }

         }

         return output;

  }

}

Item.java

public class Item {

  private String name, number;

 

  public Item(String aName, String aNumber){

      name = aName;

      number = aNumber;

  }

 

  public String getName(){

      return name;

  }

 

  public String getNumber(){

      return number;

  }

}

input.txt

Abbott, Amy

408-924-1669

Abeyta, Ric

408-924-2185

Abrams, Arthur

408-924-6120

Abriam-Yago, Kathy

408-924-3159

Accardo, Dan

408-924-2236

Acevedo, Elvira

408-924-5200

Acevedo, Gloria

408-924-6556

Achtenhagen, Stephen

408-924-3522

Kindly check the attached output image below.

3 0
3 years ago
Other questions:
  • String word = “Awesome”;
    9·2 answers
  • "Suppose that instead of always selecting the first activity to finish, we instead select the last activity to start that is com
    14·1 answer
  • Ray has to type an invoice using the QWERTY keyboard. Along with letters and numbers, he also has to insert the dollar sign. Whi
    13·1 answer
  • The part of the computer that contains the brain, or the central processing unit, also knows as the
    5·1 answer
  • Describe the major research, discoveries, or impact Timothy Berners-Lee has made on the scientific community. 100 points for ans
    6·1 answer
  • Hackers who gain control over several computers can organize them into a client-server network known as a(n) __________ . This n
    7·1 answer
  • What percent of the internet is the deep web?
    14·1 answer
  • How much does a dodge tomohawk cost for a used one?
    7·1 answer
  • I live in Alabama and I’m ab to leave to go on a 3 week trip to France and I’m wondering how I can get LTE for my IPhone 6s Plus
    15·2 answers
  • Help me pls!!! last question
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!