1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
6

What programs and outher things could i use to start a youtube gameing chanel

Computers and Technology
1 answer:
Julli [10]3 years ago
4 0
Try icthio.com I use that and its free.Good luck,!
You might be interested in
Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
mel-nik [20]

Answer:

a. The cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office

Explanation:

When a cell phone user begins to make a call, it is picked up by the cell tower located in the cell in which the cell phone is located and that belongs to the user's wireless provider. The next step in this process is that the cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office.

8 0
3 years ago
Discuss operations of vectors in computer graphics?
Allushta [10]

Answer:

  In the computer graphics, the vectors are basically used to compose various type of components. In the computer graphics it is basically known as vector graphics and it is composed of various types of components.

The operation of the vector in the computer vector is that it is basically used to create the digital images by the use of mathematical statement and command.

It is used to place the lines and the shape in the two- dimension and three- dimension spaces. IN the computer graphics, vectors are also used to represent the particular direction of the various objects.

6 0
3 years ago
The following code would include _______.
julia-pushkina [17]

Answer:

Option d is the correct answer for the above question

Explanation:

  • The above question asked about the result of the above question code, which has the query of two tables and their primary key is matched in the where class.
  • The Customer_T table has a primary key "CustomerID" and the Order_T has a foreign key "Customer_ID" and that both are matched in the where clause.
  • So the above query fetches that result in which the records match both the table. Hence Option d is the correct answer for the above question while the other is not because another option is not to get by the result of the above query.
8 0
3 years ago
If you think a query is misspelled, which of the following should you do? Select all that apply.
Alik [6]

Answer:

The answer is: letter C, For obviously misspelled queries, base the utility rating on user intent.

Explanation:

The question above is related to the job of a "Search Quality Rater." There are several guidelines which the rater needs to consider in evaluating users' queries. One of these is the "User's Intent." T<u>his refers to the goal of the user. </u>A user will type something in the search engine because he is trying to look for something.

In the event that the user "obviously" misspelled queries, the rate should be based on his intent. It should never be based on why the query was misspelled or how it was spelled. So, no matter what the query looks like, you should assume that the user is, indeed, searching for something.

Rating the query will depend upon <u>how relevant or useful it is and whether it is off topic. </u>

4 0
3 years ago
Read 2 more answers
Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of
avanturin [10]

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

6 0
3 years ago
Other questions:
  • George, a user, has contacted you to complain that his issue has not been resolved. He has already contacted your department twi
    9·1 answer
  • ¿Es especial que mi cumpleaños sea el día de San Valentín?<br><br> si o no
    11·2 answers
  • Which image shows organic shapes? <br> A. image 1 <br> B. image 2 <br> C. image 3 <br> D. image 4
    14·2 answers
  • A(n) ________ is a specific type of computer program that manages all programs on a computer.
    8·1 answer
  • Debug the following program.
    5·1 answer
  • Que es un vlog? Cual es la diferencia entre vloc y papgina web? ​
    7·1 answer
  • Question 1 of 10
    15·1 answer
  • Choose all items that represent examples of good website accessibility.
    8·2 answers
  • What does it mean to clear a setting in a dialog box?
    14·1 answer
  • Provide the user with a menu for the following 10 algorithms. Then ask which algorithm the user decides she/he wants to use. Fin
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!