1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
3 years ago
5

One subtask in the game is to roll the dice. explain why is roll the dice an abstraction.

Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
4 0

Answer:

A game is built from a combination of sub-tasks in order to provide the best experience to the user and make sure that the interface is comprises of only the results of the ongoing sub-tasks to provide a higher degree of data abstraction.

Data abstraction refers to the process of representing the essential information without including the background details. Rolling a dice is preferred to be a sub-task so that the user only gets to know about the result of the roll and does not have to wait for or anticipate the result. Moreover, a game may consist of n number of sub-tasks so it is not a good idea to include them in the main framework and are preferred to be abstracted.

You might be interested in
Http://www.alegrium.com/sgi/2/eibder
Flura [38]

Answer:

so what is this uhhhhhhhhhh

7 0
2 years ago
Persons who have been given access to an installation can be counted on to be of no threat. true or false? (antiterrorism scenar
aliya0001 [1]
<span>The statement that "Persons who have been given access to an installation can be counted on to be of no threat" is false. If they are not honest enough, they could become the dangerous staff the company could ever had because he or she has access to everything, files, information, etc. That is why, in selecting a person to be trusted with such responsibility, he or she undergoes an intensive training.</span>
4 0
3 years ago
Find the propagation delay for a signal traversing the in a metropolitan area through 200 km, at the speed of light in cable (2.
Ede4ka [16]

Answer:

t= 8.7*10⁻⁴ sec.

Explanation:

If the signal were able to traverse this distance at an infinite speed, the propagation delay would be zero.

As this is not possible, (the maximum speed of interactions in the universe is equal to the speed of light), there will be a finite propagation delay.

Assuming that the signal propagates at a constant speed, which is equal to 2.3*10⁸ m/s (due to the characteristics of the cable, it is not the same as if it were propagating in vaccum, at 3.0*10⁸ m/s), the time taken to the signal to traverse the 200 km, which is equal to the propagation delay, can be found applying the average velocity definition:

v = \frac{(xf-xo)}{(t-to)}

If we choose x₀ = 0 and t₀ =0, and replace v= 2.3*10⁸ m/s, and xf=2*10⁵ m, we can solve for t:

t =\frac{xf}{v}  =\frac{2e5 m}{2.3e8 m/s} =8.7e-4 sec.

⇒ t = 8.7*10⁻⁴ sec.

4 0
3 years ago
Which of the following are responsibilities of information security management? Defining the protection required for systems and
Talja [164]

Answer:

all of them are responsibilities

Explanation:

4 0
2 years ago
A​ client-server application that requires nothing more than a browser is called​ ________.
goblinko [34]
Hello  <span>Tacobell5401</span>

 Answer: A​ client-server application that requires nothing more than a browser is called​  thin-client application


Hope this helps
-Chris
3 0
3 years ago
Read 2 more answers
Other questions:
  • Ben would like to let everyone in the class know about the topic his group is researching.
    14·1 answer
  • What is pressure?
    7·2 answers
  • The number of bits used to store color information about each pixel is called ____.
    13·1 answer
  • Paulene is using this table in Word,and she started with the cursor in the box that read “Flavor”. she then hits Alt+End,The the
    7·1 answer
  • The ____ dialog box in windows vista appears each time a user attempts to perform an action that can be done only with administr
    12·1 answer
  • A technician is training a new hire on sealing an RJ-45 connector to the end of an Ethernet cable. Which tool is the technician
    12·1 answer
  • What keyword do we use when instantiating an object _________________
    15·1 answer
  • The most effective technique of malware propagation among the following list
    7·1 answer
  • Channel logging tokens can be set to all but:________. a. Relaxed b. Strict c. Both versions d. None
    10·1 answer
  • Please help I need help with web technology I forgot to post the question in the last one. here it is tho.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!