1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bond [772]
3 years ago
6

Dave has to create animations for a game. Which tool can Dave use?

Computers and Technology
1 answer:
Shtirlitz [24]3 years ago
8 0
What are your answer choices?
You might be interested in
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
4 years ago
In this lab, you complete a C++ program that swaps values stored in three int variables and determines maximum and minimum value
Sergio039 [100]

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

int first = 0,second = 0,third = 0;//defining integer variable  

int temp; //defining integer variable

const string SENTINEL = "done"; // defining a string variable as constant  

string repeat;// defining a string variable  

bool notDone = true; //defining bool variable

cout << "Enter first number: ";//print message

cin >> first;//input value

cout << "Enter second number: ";//print message

cin >> second;//input value

cout << "Enter third number: ";//print message

cin >> third;//input value

while(notDone == true)//defining a loop to check the value  

{

if(first > second)//use if to compare first and second value

{

int temp = first;//defining temp to hold first value

first = second;//holding second value in first variable

second = temp;//holding temp value in second variable

}

if(second > third)//use if to compare second and third value

{

int temp = second;//defining temp to hold second value

second = third;//holding second value in third variable

third = temp;//holding temp value in third variable

}

cout << "Smallest: " << first << endl;//print smallest value

cout << "Next smallest: " << second << endl;//print Next smallest value

cout << "Largest: " << third << endl;////print Largest value

cout << "Enter any letter to continue or done to quit: ";//print message

cin >> repeat;//holding string value

if (repeat == SENTINEL)

{

notDone = false;//holding bool value

}  

else //else block

{

cout << "Enter first number: ";//print message

cin >> first;//input value

cout << "Enter second number: ";//print message

cin >> second;//input value

cout << "Enter third number: ";//print message

cin >> third;//input value

}

return 0;

}

}

Output:

Please find the attached file.

Explanation:

  • Inside the main method Four integer variable "first, second, third, and temp" is declared in which first three variable is used for input value and temp is used to compare value.
  • In thew next step, two string variable "SENTINEL and repeat" is declared in which "SENTINEL" is constant and a bool variable "notDone" is declared.
  • After input the value from the user-end a loop is declared that compare and swap value and print its value.

6 0
3 years ago
What are the four levels of access rights?
Svet_ta [14]

Explanation:

Currently, there are four primary types of access control models: mandatory access control (MAC), role-based access control (RBAC), discretionary access control (DAC), and rule-based access control (RBAC). Each model

5 0
3 years ago
The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. I
Talja [164]

Answer:

The correct answer to the following question will be "Instruction set architecture".

Explanation:

The Instruction Series Design is a component of the system that is accessible to the compiler and the programmer. It is also the distinction between hardware and software. We will describe in detail the set of instructions used in most of the microprocessors that are used today.

The processor ISA can be represented using 5 categories, these are as follows:

  • The RAM Running Memory.
  • Amount of clear operating names.
  • Location of operands.
  • Operations
  • Size and type of the operand.

Therefore, Instruction set architecture is the right answer.

4 0
3 years ago
Most internet connections use what transmission
Orlov [11]
Most internet connections use full-duplex transmissions. (Please give brainliest answer :) :D )
7 0
3 years ago
Read 2 more answers
Other questions:
  • 3.
    13·1 answer
  • Many computers today use _____ which is a coding scheme using at least 16 bits to represent a character.
    10·1 answer
  • How to make logo black and white in paint?
    14·1 answer
  • Design a hierarchy c hart or flowchart for a program that calculates the current balance in a savin gs account. The program must
    8·1 answer
  • A key physical design element is the ____, which describes how users interact with a computer system
    11·1 answer
  • How was the addition of an improvement over early web design?
    11·1 answer
  • Add Try/Catch error checking To make sure that the user enters valid values in your program. To catch negative values passed to
    9·1 answer
  • Need help asap please
    15·1 answer
  • Modern helps to convert analog signal into digital and vice verse. true of false​
    12·1 answer
  • Which of these can be a problem for people with accessibility issues? Select 4 options.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!