1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
3 years ago
5

Is farming simulator a good game?

Computers and Technology
2 answers:
kenny6666 [7]3 years ago
5 0
It's amazing honestly :P
zheka24 [161]3 years ago
4 0
Yes it's a really great game
You might be interested in
_ effects determine how slide elements disappear
kupik [55]
<span>Exit effects determine how slide elements disappear. </span>
6 0
3 years ago
Which item was key to how Microsoft got its start in the 1970s? a. artificial intelligence b. vacuum tubes c. Altair 8800 d. UNI
tigry1 [53]

Answer:

A??

Explanation:

6 0
3 years ago
Hi! This is python coding. Please don't take advantage, actually, answer!
Greeley [361]

Answer:

Try and do number = 7

If that does not work then I dont know what to tell you.

Explanation:

8 0
3 years ago
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
List four useful spreadsheet functions and explain what they do.
Helen [10]

Answer:

SUM, AVERAGE, MAX,MIN

Explanation:

Sum: The SUM function is categorized under Excel Math and Trigonometry functions. ... The function will sum up cells that are supplied as multiple arguments. It is the most popular and widely used function in Excel. SUM helps users perform a quick summation of specified cells in MS Excel.

Average: The AVERAGE function in Excel does exactly what you think it should. It computes the mathematical average of a set of numbers. In other words, it adds up a set of numbers and then divides the sum by how many numbers are being averaged.

Max: he MAX function will count numbers but ignore empty cells, text, the logical values TRUE and FALSE, and text values. In financial analysis, MAX can be useful in calculating the highest score, the fastest time, the highest expense or revenue amount, etc.

Min: will return the minimum value in a given list of arguments. From a given set of numeric values, it will return the smallest value. Unlike the MINA function, the MIN function ignores numbers, text, and logical values TRUE and FALSE and text values. In financial modeling.

8 0
3 years ago
Other questions:
  • To add text to a blank slide layout, _____.
    8·2 answers
  • Noticing his reduced performance at work, Dan enrolled himself for training sessions offered by the company and saw his producti
    13·1 answer
  • Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Whic
    8·2 answers
  • A _____ is a harmful program that resides in the active memory of a computer and duplicates itself. Select one: a. scareware b.
    7·1 answer
  • A computer processes data using only 1s and 0s true or false?
    9·2 answers
  • Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct
    15·1 answer
  • . An access specifier is one of three keywords:
    14·1 answer
  • ¿Que es la energía? (una sola respuesta es la correcta)
    11·1 answer
  • Write a qbasic program to design any simple software with output ​
    5·1 answer
  • What does altgr mean on a keyboard.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!