1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Iteru [2.4K]
3 years ago
5

What do people in japan use to make anime

Computers and Technology
1 answer:
lions [1.4K]3 years ago
8 0

software programming like adobe flash.

You might be interested in
Which type of application architecture has a logic tier
LuckyWell [14K]

Answer:

hi

Explanation:

7 0
3 years ago
Read 2 more answers
Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of ________ computing operations
Pavlova-9 [17]

Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of <u>fog</u>  computing operations.

The correct option is C.

<h3>What is computing operations?</h3>

An action that is taken in computing to complete a certain task is referred to as an operation. The five fundamental categories of computer operations are input, processing, output, storing, and control. The five major functional components of a computer system each carry out one or more computer activities.

<h3>What are the basic computing operations?</h3>

Arithmetic and logical operations are the two primary sorts of work that CPUs carry out. In contrast to logical operations, which compare two numbers, arithmetic operations involve basic math concepts like addition and subtraction.

<h3>What is  fog  computing operations?</h3>

Both 5G and fog computing

Fog computing refers to a type of computer architecture in which a network of nodes continuously collects data from Internet of Things (IoT) devices. These nodes have millisecond response times and process data in real-time as it comes in. Every so often, the nodes communicate to the cloud analytical summary data.

To know more about computing operations visit:

brainly.com/question/18095291

#SPJ4

I understand that the question you are looking for is:

Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of ________ computing operations.

A) OpenStack

B) cloud

C) fog

D) RFID

8 0
2 years ago
Write a program that asks the user for three strings. Then, print out whether the first string concatenated to the second string
ipn [44]

Answer:

import java.util.Scanner;

public class num5 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter The First String");

       String str1 = in.next();

       System.out.println("Enter The Second String");

       String str2 = in.next();

       System.out.println("Enter The Third String");

       String str3 = in.next();

       String oneAndTwo = str1+str2;

       if(str3.equals(oneAndTwo)){

           System.out.println(str1+" + "+str2+" is equal to "+str3+"!");

       }

       else

           System.out.println(str1+" + "+str2+" is not equal to "+str3+"!");

   }

}

Explanation:

  • Implemented in Using Java Programming Language
  • Import Scanner Class to prompt and receive users' input
  • Create three string variables and store the three values entered by the user (str1, str2 and str3)
  • Concatenate str1 and str2 using the + operator and assign to a new variable
  • Use the if statement with Java's .equals() method to check for equality of the new string with the third string
  • Print the appropriate message if the equal or not
8 0
3 years ago
With what software tool can you see the applications
Zigmanuir [339]

Answer:

The Microsoft Windows Task Manager.

6 0
3 years ago
What specific parameter will allow you to base a recursion policy on the subnet address of the clients?
Nookie1986 [14]

Answer:

Client subnet

Explanation:

Client subnet is a mechanism for recursive resolvers that helps to send partial client IP address information to authoritative DNS name servers. It is a group of IP subnets and it is identified by a name.

It is with the aid of client subnet that you base recursion policy on the subnet address of the clients.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Collins and quillian explained the results of priming experiments by introducing the concept of _____ into their network model.
    12·1 answer
  • Some personal computer manufacturers provide a hard disk configuration that connects multiple smaller disks into a single unit t
    6·1 answer
  • What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwh
    12·1 answer
  • Fill in the code to complete the following function for computing a Fibonacci number. public static int fib(int index) { if (ind
    6·1 answer
  • Using this tool to help you to visualize your slides and develop your content
    13·1 answer
  • Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characte
    5·1 answer
  • See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will pri
    6·1 answer
  • porfavor no es una pregunta dificil, nisiquiera es de una tarea, hace poco mi computador windows 10 no recibia el sonido de mis
    9·1 answer
  • What are the effects of information systems in the management of corona ?
    5·1 answer
  • In C++ please (read the image below for instructions)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!