1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
10

What is a DreamScape? Explain and give example (if you want)

Computers and Technology
1 answer:
balu736 [363]3 years ago
7 0
The most accurate answer is

A͙ ͙D͙r͙e͙a͙m͙S͙c͙a͙p͙e͙ ͙e͙n͙a͙b͙l͙e͙s͙ ͙y͙o͙u͙r͙ ͙c͙o͙m͙p͙u͙t͙e͙r͙ ͙t͙o͙ ͙a͙n͙a͙l͙y͙z͙e͙ ͙y͙o͙u͙r͙ ͙d͙r͙e͙a͙m͙s͙ ͙f͙o͙r͙ ͙h͙i͙d͙d͙e͙n͙ ͙m͙e͙a͙n͙i͙n͙g͙s͙.͙

For an example:
I had a dream I was singing on the show "The Four". What made the dream crazier was that when I woke up. I found that I had fallen asleep at school and had been singing in class. I sure hope I can get all the videos my friends took of me before they get posted on Instagram. 

Glad to help :)
You might be interested in
Write a function called printBackwards() that will work with a C string. The function will print any C string backwards. You don
yaroslaw [1]

Answer:

void printBackwards(char s[])

{

   int n=strlen(s)-1;//finding the last index of the string..

   for(int i=n;i>=0;i--)//loop to print the string backwards..

   {

       printf("%c",s[i]);//printing the character of the string..

   }

}

Output:-

abcdefg

gfedcba

Explanation:

I have used strlen function that will be used after including the string.h header file.It returns the length of the string.After finding the last index I have iterated over the c string in reverse order and printing the character of the string one by one.

8 0
3 years ago
When troubleshooting firewalls, you should never attempt to repeat the problem because you could do more damage. T/F
Zinaida [17]

Answer:

TRUE

Explanation:

the given statement is correct hence TRUE

troubleshooting is problem solving often applied to repair failed product .

Firewall is used for network security for the computer is monitors and controls the incoming and outgoing network traffic.

Basically what Firewall do is it create barrier between trusted networks and not trusted network.

8 0
3 years ago
In order to do a binary search on an array Group of answer choices you must first do a sequential search to be sure the element
Arisa [49]

Answer:

the array must first be sorted.

Explanation:

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements.

Binary search applies the principles of divide and conquer.

In order to do a binary search on an array, the array must first be sorted in an ascending order.

5 0
3 years ago
Kevin gets a call from a user who is trying to install a new piece of software. The user doesn’t have administrative rights, so
lyudmila [28]

Answer:

use Remote Desktop

Explanation:

8 0
3 years ago
How can i promote netiquette??​
Kay [80]

Answer: Neh - tuh - ket

Explanation:

The above answer is the phonetical pronunciation of the word Netiquette which is an amalgamation of the words, Net and Etiquette and as the term implies, refers to the behavior on the internet that is socially acceptable and good so that other people are not made to feel uncomfortable.

3 0
3 years ago
Other questions:
  • Write a program that calls fork(). Before calling fork(), have the main process access a variable (e.g., x) and set its value to
    5·1 answer
  • Face book requires you to change your password regularly<br> a. TRUE<br> b. FALSE
    14·1 answer
  • After a suspected identity fraud case has been resolved, you should:
    10·2 answers
  • python An instance variable named counter of type int An instance variable named limit of type int. A constructor that takes two
    15·1 answer
  • PLZ ANSWER THESE QUESTIONS FOR 30 POINTS AND BRAINLIEST!
    9·1 answer
  • What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?
    14·1 answer
  • What is keylogging attack?
    13·2 answers
  • While developing a network application, a programmer adds functionally that allows her to access the running program without aut
    14·1 answer
  • Hannah wants to write a book about how scientists and society interact, and she has generated ideas for chapters. Which chapter
    13·1 answer
  • How many atoms of oxygen in 4 molecules of HN03​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!