1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
3 years ago
7

if you play creative destruction and if u have a mic and if u play it 24/7 and would like to form a team tell me your name or yo

ur ID number
Computers and Technology
1 answer:
kipiarov [429]3 years ago
8 0

i dont know that game but ill see if i like it and if i do ill send u my ID number ok


You might be interested in
When a user attempts to visit an internet-based web server, what is the default action of the windows firewall?
Kamila [148]
Google chrome and internet explore
7 0
2 years ago
Which of the following types of memory is used to load programs and transfer files during your work sessions? A. D-ROM B. RAM C.
hammer [34]
I believe the answer is B-Ram <span />
4 0
3 years ago
Read 2 more answers
Using C++, complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2
victus00 [196]

Answer:

#include <iostream>

using namespace std;

void PrintPopcornTime(int bagOunces) {

   if(bagOunces < 2)

       cout << "Too small" << endl;

   else if(bagOunces > 10)

       cout << "Too large" << endl;

   else

       cout << 6 * bagOunces <<" seconds" << endl;

}

int main()

{

   int userOunces;

   cin >> userOunces;

   PrintPopcornTime(userOunces);

   return 0;

}

Explanation:

Inside the function PrintPopcornTime, check the parameter bagOunces using if structure. Depending on the value of bagOunces, print the required information.

Inside the main, ask the user for the userOunces. Call the PrintPopcornTime function with the userOunces.

3 0
3 years ago
Describe the benefits of having an operational data warehouse (DWH), and the challenges of operating a DWH repository.
kvasek [131]

Answer:

The benefits of having the operational data ware-house are as follows:

  • The single operational warehouse typically support various tactical and the strategical decisions.  
  • It is subject oriented,volatile and integrated data warehousing in the system.
  • The warehousing mainly allow the system to process the large complex data in more efficient manner.
  • The operational warehouse are basically implemented for many business purposes.

The challenges of the operational warehouse repository are as follows:

  • In the operational data warehouse there is large number of user expectations.
  • The cost is the main challenge while designing the operational data warehousing as, it required efficient system in low cost.
  • Choosing the efficient and correct type of the warehouse is the big challenge.

5 0
3 years ago
Cha’relle works as an editor at a publishing house. She got her position after interviewing another editor and following that ed
yuradex [85]

She used her communication skills meaning the verbal method.

Explanation:

Because she has a natural ability to talk and communicate well with others, offering them insight on any issues they may have or anything they may be lacking or struggling with. She's a natural born healer and giver.

4 0
3 years ago
Other questions:
  • Walter’s health insurance premium increased by 22 percent this year. Now he pays $488 every month for health insurance. What was
    10·1 answer
  • What computer has best software
    5·1 answer
  • A(n) ________ variable is declared inside a module and cannot be accessed by statements that are outside the module.
    13·1 answer
  • If you see ##### in a cell, you should
    10·1 answer
  • Which of the following is NOT essential for individuals to have to build their own web page?
    9·1 answer
  • As the operations manager for a supermarket chain, Mai needs to find a telecommunications technology that: enables managers in r
    9·1 answer
  • _____ is an example of a locally installed email client.
    5·2 answers
  • Could someone give an example or tell me what all of these mean? (For internet source citing) Evaluation: • Domain Name: • Autho
    7·1 answer
  • What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
    9·1 answer
  • Pls help me im confused prob more on the way
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!