1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
3 years ago
5

One subtask in the game is to roll the dice. explain why is roll the dice an abstraction.

Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
4 0

Answer:

A game is built from a combination of sub-tasks in order to provide the best experience to the user and make sure that the interface is comprises of only the results of the ongoing sub-tasks to provide a higher degree of data abstraction.

Data abstraction refers to the process of representing the essential information without including the background details. Rolling a dice is preferred to be a sub-task so that the user only gets to know about the result of the roll and does not have to wait for or anticipate the result. Moreover, a game may consist of n number of sub-tasks so it is not a good idea to include them in the main framework and are preferred to be abstracted.

You might be interested in
PREDATION AND EVOLUTION
choli [55]

Answer:

Yes, it is correct. God is great. He gives pain but gives the ointment as well to get rid of it. God gives tougher challenges, but God also gives the guts to tackle them and win them. The story of adaptation, ad predator also goes like this. God gives spines to sea urchins to survive, and it gives the birds stronger beaks to break shells. Similarly, he gives programmers awesome brains to solve the toughest problems.

Explanation:

Please check the answer.

3 0
3 years ago
Microsoft Edge offers a pane where you can access favorite webpages, open webpages saved to your Reading list, and view the hist
shutvik [7]

Answer:

Hub      

Explanation:

A Hub is a networking tool linking of the different devices or other networking devices.In comparison to router or other a Hub has not routing tables or the guidance where it will sends the information and transmits the data in the network in the respective link.

The hub is used in the Microsoft Edge that provides a panel where we can access favorite web pages. The hub is also used in the  history of the previously visited web pages .

7 0
3 years ago
What should you install in a server room that will save space by allowing you to control multiple servers with a single mouse, k
Nata [24]

Answer:

a KVM switch

Explanation:

KVM switch is devise used for handling or connecting different server at any time by using single mouse, monitor and keyboard. it is like an interface used to connect different server at any given time.

different type of KVM switch are

1) USB based KVm

2) Emulated USB type KVM

3) DDM USB type KVM

4) semi -DDM KVM

7 0
3 years ago
When you code a column list in an INSERT statement, you can omit columns with default values and columns that allow ____________
stiks02 [169]

Answer:

NULL is the correct answer of this question.

Explanation:

The insert statement is used for inserting a column list into the database this statement is an under Data Manipulation language.When we insert any column into the database there is always a null value stored.

  • Insert statement is used to insert the data into the database .
  • To insert data following syntax is used:-

         insert into tablename (column data type).

  • When we insert any data into the database the default value is stored is bull.
6 0
3 years ago
32.043 in expanded form
Andre45 [30]

What does expanding a number really mean? When we expand a number, we are showing the value of each digit in that number. For example, the number 521 has a total of 500 + 20 + 1. This number has been written in its expanded form by showing the value of each digit.

In the case of a decimal number above 32.043, we will write each number according to its place value. This will be done by multiplying each digit by its place value and then adding them together. In this case, 32.043 in its expanded form will be;

(3×10) + (2×1) + (0× 1/1000) + (4×1/100) + (3×1/10)

(30)+ (2) + (0.0) + (0.04) + (0.003)


7 0
3 years ago
Read 2 more answers
Other questions:
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
    5·1 answer
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
  • Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for l
    9·1 answer
  • Paul wants to store addresses and phone numbers for clients. Paul wants to use this information to send form letters. Paul shoul
    5·1 answer
  • 1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this
    5·1 answer
  • This is for C++: Using a nested for loop output the following pattern to the screen:
    12·1 answer
  • A(n) _____ exists when there are functional dependencies such that XY is functionally dependent on WZ, X is functionally depende
    14·2 answers
  • The procedure by which a process's state is saved before being swapped out of the cpu, then us restored to the state when the pr
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!