1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
8

Which consol was dominant in the US market between 1993 and 1998

Computers and Technology
1 answer:
Illusion [34]3 years ago
8 0

i believe the Nintendo 64

You might be interested in
Which type of hacker represents the highest risk to your computer?
Deffense [45]

Answer:

The hacker which represents the highest risk to my computer is the Script Kiddie.

Explanation:

A Script Kiddie cannot make their own programs.

They hack by using existing codes, scripts, web shells etc to access a work station, mutilate webpages etc.

The difference between a Hacker and a Script Kiddie is that a hacker does not need another person's code. They are skilled at writing their own codes which are can be very potent. This level of skill can be difficult to attain except for very bright minds.

The script kid needs very little knowledge of scripts and they are well on their way to causing damage.

Cheers!

4 0
2 years ago
Which tables and fields would you access to determine which book titles have been purchased by a customer and when the order shi
enyata [817]

Answer:

To determine which book titles have been purchased by a customer and when the order shipped the following tables and fields would be used.

Table:      

  • CUSTOMERS

Fields

  • Customerno

Table

  • ORDERS

Fields:

  • Orderno
  • Shipdate
  • Customerno

Table:

  • ORDERITEMS

Fields:

  • Orderno

Table:

  • BOOKS

Fields

  • isbn
  • title

BOOKS table contains field like title of the books, so this will help in finding which book titles have been purchased.

CUSTOMERS table keeps information about customers that purchasing an ordering the books. The customerno uniquely identifies each customer so that the order information can be found using the customerno of a specific customer.

ORDERITEMS keeps information about orders via orderno

ORDERS table will keep track about the shipment of orders. Orderno identifies each order, shipdate will help determine when an order is shipped.

7 0
3 years ago
Assume you have a packet with data payload of 1024 bytes. The packet header is 6 bytes. Assume there is no other overhead. The c
Sveta_85 [38]

Answer:

PER= 0.824

Explanation:

Total bytes = 1024+6

=1030 bytes

=1030*8 bits

= 8240 bits

BER = 0.0001

Packet Level Error (PER) = 8240*0.0001

= 0.824

7 0
3 years ago
The auto recover function in a word is available to especially if you experience powerful failure explain what happens to your d
Komok [63]

Answer:

When the document is not saved before the application is closed, The word application assumes that the file is not important, so does not save a recovery file, but to recover the file open the application and go to the recently opened file, do not edit the file, go to the bottom of the document and click on recovery or use the CTRL-Z shortcut key.

Explanation:

Microsoft word is a word processing application used to make and edit word documents. The recovery option in the word application is an essential tool in Word that prevents a permanent loss of documents in production and can be used to retrieve saved and unsaved documents.

7 0
2 years ago
What is the name of the image window area that allows you to determine if a line is truly horizontal or vertical
kherson [118]
The answer is ruler. thank you
4 0
2 years ago
Read 2 more answers
Other questions:
  • In order to achieve a win-win solution, all parties involved should negotiate a solution. True or False ?
    13·2 answers
  • An email message form includes all of the following main areas except
    11·2 answers
  • Using a cell phone while operating a motor vehicle is considered distraction because
    8·1 answer
  • Identify a factor that is unlikely to influence the length of time people wait in the lunch line.
    8·2 answers
  • In ________ for final fields and methods the value is assignedlater but in ______ you assign the value during declaration.
    15·1 answer
  • A look to different section of the same page is known as_____.
    7·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • A(n) Blank______ database management system allows users to create, read, update, and delete data in a relational database. Mult
    9·1 answer
  • In python please:
    8·1 answer
  • 9
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!