1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
11

Which of the following refers to a technology with a three-dimensional computer simulation in which a person actively and physic

ally participates? A. Wireless fidelity*B. Virtual realityC. Augmented realityD. Agile methodology
Computers and Technology
1 answer:
weqwewe [10]3 years ago
7 0

Answer:

B. Virtual reality

Explanation:

In a virtual reality context, the visual and auditory senses of the user are fed by data (images, sounds) from the computer using a goggle and earphones.  That allows the person to be totally cut off her real physical environment and be totally immersed into the world (reality) managed by the computer.

Not to be confused with<u> augmented reality</u>, where the physical reality and perception of it aren't changed... but an additional layer of information is added on top of it.  Like pointing your phone camera to a building and getting information about the building displayed on your phone.

You might be interested in
If a form-based code is administered, then what does the administration section of the code specifically set forth?
Mamont248 [21]

Answer:

Form-based codes have a description of what uses a building or a place is permitted but focus on the physical character of construction, particularly how they relate to the public realm shared by everybody. More and more people across the country and around our world have seen form-based codes as a more effective and efficient method to accomplish what they want, protect what they care about and escape what they do not want.

Explanation:

In the 1980s a group of architects and designers were trying to construct an alternative to traditional zoning, focusing less on use and more on size, construction speed, the shape of public spaces and the connections between buildings. Throughout this time the Duany Plater-Zyberk & company was planned to create a new community based on traditional neighborhood design concepts, Seaside, Florida, which originally developed an earlier modern type code to direct the development of the new community. The entire municipal code of Seaside was graphically illustrated on one poster as a radical deviation from traditional zoning.

6 0
3 years ago
PLZ HELP WILL MARK BRANLIEST Jargon is:
77julia77 [94]

Answer:C language that include terms that only a select

Explanation:

It’s the right one

7 0
3 years ago
Rick is pursuing an undergraduate degree in electronics engineering. He aspires to be a robotics software engineer. Which topic
weeeeeb [17]

Options:

A.  database programming

B.  Embedded C

C.  testing software

D.  ABET

Answer:

<u>B.  Embedded C</u>

Explanation:

<em>Remember,</em> many robotic systems  make use of embedded systems, and one important programming language used is the C (Embedded C) Programming language.

Hence, since many hardware components can be programmed using C, it would therefore be necessary for Rick to be aware of Embedded C.

4 0
3 years ago
_ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manne
ddd [48]

Answer:

"Grid computing" is the correct answer for the above question.

Explanation:

  • Grid computing is a process in which many computers are participating to solve a single problem. This type of process is distributed multiple computers to perform a different type of task.
  • If there is large problem and if many computers solve that problem, then that problem is solved easily within a few minutes.
  • This is because many computers are working for that problem.
  • The above question asked about that process in which many computers are working to solve a single problem. This processor is known as "Grid Computing".
8 0
3 years ago
What is the output of the following code fragment? int i = 1; int sum = 0; while (i &lt;= 11) { sum = sum + i; i++; } System.out
valentina_108 [34]

Answer:

The value of sum is 66

Explanation:

i = 1

sum = 0

while (i <= 11) {  

sum = sum + i;

i++;  

}

i = 1

  • sum = sum + i
  • sum = 0 + 1
  • sum = 1

i = 2

  • sum = sum + i
  • sum = 1 + 2
  • sum = 3

i = 3

  • sum = sum + i
  • sum = 3 + 3
  • sum = 6

i = 4

  • sum = sum + i
  • sum = 6 + 4
  • sum = 10

i = 5

  • sum = sum + i
  • sum = 10 + 5
  • sum = 15

i = 6

  • sum = sum + i
  • sum = 15 + 6
  • sum = 21

i = 7

  • sum = sum + i
  • sum = 21 + 7
  • sum = 28

i = 8

  • sum = sum + i
  • sum = 28 + 8
  • sum = 36

i = 9

  • sum = sum + i
  • sum = 36 + 9
  • sum = 45

i = 10

  • sum = sum + i
  • sum = 45 + 10
  • sum = 55

i = 11

  • sum = sum + i
  • sum = 55 + 11
  • sum = 66

i = 12 --> does not comply with the condition "i < = 11", the while loop is over

7 0
3 years ago
Other questions:
  • When a relationship is established between two or more arrays by using the same subscript to relate entries between the arrays,
    14·2 answers
  • For a typically large organization how many dns servers should you install
    5·1 answer
  • The computer mouse is used to
    7·1 answer
  • Consider the following statements: #include #include class Temporary { private: string description; double first; double second;
    9·1 answer
  • python Write a program that will take a file named Celsius.dat that contains a list of temperatures in Celsius (one per line), a
    9·1 answer
  • If you want to transfer information transform STM to LTM, it is essential that you make the information ______________________.
    9·1 answer
  • Anyone 13 i a boy 13 pan
    12·2 answers
  • The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and
    10·1 answer
  • One benefit of taking notes in class is that the student
    9·1 answer
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!