1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lynna [10]
4 years ago
7

What effect does screen resolution have on how graphics are displayed?

Computers and Technology
1 answer:
posledela4 years ago
7 0
The clearer the resolution screen is it is better seen through the graphics. Say you have a bad computer screen, well your graphics are going to be bad. The better and higher quality it is will be the better you can see your images.
You might be interested in
I have been trying for 2 days to make an account, but it says registration cannot be completed at this time. It is extremely ann
Lady_Fox [76]

Answer: Ok what kind account are you trying to make if you need a account i can make one for you here is my hangout email . So i can give you the info to the account i made for you.

6 0
3 years ago
Read 2 more answers
Write a C++ program that prompt the user to enter three points (x1, y1), (x2, y2), (x3,y3) of a triangle and
My name is Ann [436]

Answer:

#include<iostream>

using namespace std;

int main(){

   int x1,x2,x3;

   int y1,y2,y3;

   cout<<"Enter the value of first point(x1,y1): ";

   cin>>x1>>y1;

   cout<<"\nEnter the value of second point(x2,y2): ";

   cin>>x2>>y2;

   cout<<"\nEnter the value of third point(x3,y3): ";

   cin>>x3>>y3;

   

}

Explanation:

first include the library iostream for use the input/output commands

then, write the main function. within the main function declare the variable which store the value of points.

after that, use the 'cout' for output. It has the function which print the value or message on the screen.

and 'cin' is used to store the value in the variable.

So, in the above code cout ask for enter the value of point and after enter value by user, cin store in the variables.

Note: you have to enter two value with space or by enter.

5 0
3 years ago
Whats difference between DCE AND DTE serial interface
harina [27]

DCE stands for data circuit-terminating, data communications, or data carrier equipment - this is a modem or more generally, a line adapter.

DTE stands for data terminal equipment which generally is a terminal or a computer.

Basically, these two are the different ends of a serial line.

7 0
3 years ago
Designations at the end of file names such as .docx and .html are called
Amanda [17]

Answer:

Designations at the end of file names such as .docx and .html are called. File extensions.

Explanation:

7 0
3 years ago
The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capt
lys-0071 [83]

Answer:

Some of the new technologies developed to handle the big data are as follows:

1. In-memory Databases

2. Blockchain

3. NoSQL Databases

4. Edge Computing

5. Streaming Analytics.

6. Artificial Intelligence

Explanation:

Some of the new technologies developed to handle the big data are explained as follows:

1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.

2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.

3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.

4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.

5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.

6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.

8 0
3 years ago
Other questions:
  • How auto insurance companies manage risk?
    12·1 answer
  • you just bought a new hard drive for your computer, you plan to use this secondary hard drive to store all school work files. on
    13·1 answer
  • What are the three types of event logs generated by windows 2003 and vista systems?
    12·1 answer
  • Ellen's laptop has a built-in 802.11n-capable wireless NIC. The wireless NIC worked perfectly yesterday when she loaned it to he
    12·1 answer
  • Write a function named "list_concat" that takes a list of strings as a parameter and returns the concatenation of all the values
    13·1 answer
  • Use the drop-down menus to complete the statements about printing Contacts. When printing a single contact, go to File and then
    15·1 answer
  • Why Prithvi Narayan Shah are appointed the person favoured by the people at Kazi
    8·1 answer
  • Which of the following characterizes how an enabled security program might react to a new program installation on a computer sys
    7·2 answers
  • What is a leased line​
    12·2 answers
  • A ____ risk assessment evaluates threats to and vulnerabilities of the network.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!