1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry_Shevchenko [17]
3 years ago
11

Which theory uses game playing to understand the development of self?

Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
8 0
Mead's role-playing theory <span>uses game playing to understand the development of self.
</span><span>According this theory game is one of the three activities through which the self is developed, The other two are language and </span>play.  Through these activities people interact with other people and<span>  develop self-images.</span>
You might be interested in
Write a pseudocode to read 10 integer numbers and find the largest number, you need to use loop in your answer.
Sophie [7]
  1. # Algorithm to find the number of integers greater than 10 in a list
  2. list = read(list of integers)
  3. n = len(list)
  4. count = 0
  5. For i = 1 to n
  6.    If list[i] > 10:
  7.        count = count + 1
  8.    Endif
  9. End
  10. Return count
<h3>Explanation:</h3>

Then the length of the list is stored in a variable n. A variable count to store the number of integers more significant than 10 is initialized to 0.

  • Then, a for-loop is used to iterate over the list. A for-loop is used in this case because every element of the inventory needs to be checked for a value greater than 10.
  • In each iteration of the for-loop, the value at the index of the list is checked. If the value is greater than 10, then the counter variable count is incremented by 1.
  • The iterations continue till the for-loop ends. At this point, the variable count will be the number of integers greater than 10.
  • Note that in case the list does not have any number greater than 10, then the count variable will be 0.

To learn more about it, refer

to brainly.com/question/25311149

#SPJ4

3 0
2 years ago
Does any one have 2 reasons it would be a good idea to have a glow in the dark TV.
snow_lady [41]
1. be able to see function keys and input and output ports on the back
2. never lose your tv in the dark
5 0
4 years ago
What is a lease? AA contract outlining the terms of a mortgage. BA contract outlining the terms under which a landlord agrees to
Lesechka [4]

B. A contract outlining the terms under which a landlord agrees to rent property to a tenant.   
A lease is where you arrange to use someone else's property, generally in exchange for money. The ownership of the property remains with the other entity. So with that in mind, let's look at the options.  
A. A contract outlining the terms of a mortgage.  
* This is a contract arranging for the transfer of ownership of property from one entity to another. So this is not a lease and is a bad choice.  
B. A contract outlining the terms under which a landlord agrees to rent property to a tenant.  
* This does meet the definition of a lease. You rent and therefore use someone else's property, but the ownership of the property remains with the landlord. So this is the correct choice.  
C. A loan from a bank used to rent a home. 
 * This does not meet the definition of a lease and is therefore a bad choice. 
 D. A loan from a bank used to buy a house. 
* This also does not meet the definition of a lease and is therefore a bad choice.
5 0
3 years ago
What is output if the user enters -5?
7nadin3 [17]

Answer:

The left

Explanation:

6 0
3 years ago
Read 2 more answers
__________ is a protocol used by e-mail clients to download e-mails to your computer.
arlik [135]
POP is a protocol used by e-mail clients to download e-mails to your computer. The correct option among all the options that are given in the question is the last option or option "d". The full form of POP is Post Office Protocol. After the email has been downloaded, the email gets erased from the server automatically.
7 0
4 years ago
Other questions:
  • Are there protections for people in terms of what data can be collected by different sites?
    10·1 answer
  • How to see if your computer has bluetooth?
    6·1 answer
  • For this lab, youhave to write a programnamedseriesFunction.cthat prompts user to enter two values, x and n. Then it would use a
    11·1 answer
  • Which of the following is not a compilation error? Group of answer choices a. Placing a semicolon at the end of the first line o
    13·1 answer
  • When specifying keywords to conduct an internet search, which of the following parts of speech will be the most useful??
    6·1 answer
  • Which of the following actions has no impact on your credit score
    9·1 answer
  • suspect that several users are attempting to install unauthorized software. Upon researching, you discover that the attempts wer
    12·1 answer
  • Oliver is working for a team that uses object-oriented concepts to design software. Which language would they use to develop thi
    10·1 answer
  • Which component of the computer keeps the operating system when the computer is running​
    10·1 answer
  • Which of the following is one of the tools used by a Python IDE that helps prevent syntax errors?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!