1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
10

What is a DreamScape? Explain and give example (if you want)

Computers and Technology
1 answer:
balu736 [363]3 years ago
7 0
The most accurate answer is

A͙ ͙D͙r͙e͙a͙m͙S͙c͙a͙p͙e͙ ͙e͙n͙a͙b͙l͙e͙s͙ ͙y͙o͙u͙r͙ ͙c͙o͙m͙p͙u͙t͙e͙r͙ ͙t͙o͙ ͙a͙n͙a͙l͙y͙z͙e͙ ͙y͙o͙u͙r͙ ͙d͙r͙e͙a͙m͙s͙ ͙f͙o͙r͙ ͙h͙i͙d͙d͙e͙n͙ ͙m͙e͙a͙n͙i͙n͙g͙s͙.͙

For an example:
I had a dream I was singing on the show "The Four". What made the dream crazier was that when I woke up. I found that I had fallen asleep at school and had been singing in class. I sure hope I can get all the videos my friends took of me before they get posted on Instagram. 

Glad to help :)
You might be interested in
Type which type of interference we will install after installing operating system​
pentagon [3]

Answer:

There are different kinds of operating systems: such as Windows, Linux and Mac OS

There are also different versions of these operating systems, e.g. Windows 7, 8 and 10

Operating systems can be used with different user interfaces (UI): text user interfaces (TUI) and graphical user interfaces (GUI) as examples

Graphical user interfaces have many similarities in different operating systems: such as the start menu, desktop etc.

When you can recognize the typical parts of each operating system’s user interface, you will mostly be able to use both Windows and Linux as well as e.g. Mac OS.

THE ROLE OF OPERATING SYSTEM IN THE COMPUTER

An operating system (OS) is a set of programs which ensures the interoperability of the hardware and software in your computer. The operating system enables, among other things,

the identification and activation of devices connected to the computer,

the installation and use of programs, and

the handling of files.

8 0
3 years ago
JAVA- If you have an int as the actual parameters, will it change to fit the parameters if it requires a double, or will the cod
ivann1987 [24]

If you have only 1 method that is not overloaded, then you will not be able to call it with inappropriate parameter types, that is, if the initial type of the parameter is int, then it will not be able to get the double, float, and other values, because of this an error will occur.

For this, method overloading is created.

Method overloading is when you create methods with the same name, but only the content and parameters of the methods are/can-be completely different.

6 0
3 years ago
When was the idea of the cloud first developed?<br><br> 2000s<br> 1990s<br> 1960s<br> 1980s
kondaur [170]

Answer:I would say 1980 is the answer or The answer is B 1980.

5 0
3 years ago
List 2 negative impacts of cybersecurity.<br><br><br><br>Answer and I will give you brainiliest ​
Nitella [24]

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

5 0
3 years ago
Suppose you draw two cards from a standard deck of 52 playing cards. What is the probability that they are both sixes? Keep at l
GaryK [48]

Answer:

0.00452

Explanation:

There are 4 sixes in a deck. So the chance that the first card you draw is a six, is 4/52. Then there are only 3 sixes left and 51 cards. So the chance that the second one is also a six is 3/51.

The combined chance is the multiplication, i.e., 4/52 * 3/51 = 0.00452

7 0
3 years ago
Other questions:
  • you were discussing software privacy with a friend were surprised to learn how software privacy can impact your life everyday. w
    10·1 answer
  • ​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
    10·1 answer
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • A network monitor records the following information while recording a network connection.
    9·1 answer
  • Select the correct answer.
    5·2 answers
  • What is the purpose of the operating system's processor management function?
    14·1 answer
  • They are correct? thank you!
    6·2 answers
  • A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
    7·1 answer
  • Which area of government regulations do the Fair Credit and Reporting Act
    8·2 answers
  • The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resen
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!