1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tpy6a [65]
3 years ago
11

Gta! ! ! !!aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Computers and Technology
2 answers:
kirza4 [7]3 years ago
6 0

it is a GTA dress

yup??

ya

its nice

but

i

like

free

fire

much

gta

is

also

osm .....

son4ous [18]3 years ago
3 0

Answer:

noice

Explanation:

You might be interested in
Ray owns a gaming cafe where users can play video games on computers. These games involve rich graphics and need high processing
tankabanditka [31]

Answer:

thick

Explanation:

i took the test and got it right

6 0
2 years ago
Please help <br> what do data communications transmit data through?
I am Lyosha [343]

Answer:There are two methods used to transmit data between digital devices: serial transmission and parallel transmission. Serial data transmission sends data bits one after another over a single channel. Parallel data transmission sends multiple data bits at the same time over multiple channels.

Explanation:

5 0
3 years ago
When recording a song on her laptop, Sarah noticed a slight delay in what she could hear on her headphone and what she was recor
PolarNik [594]

Answer:

latency

Explanation:

We could have latency if we want to record with a computer, and then we try to hear that record with the headphone.

This is an audio card's characteristic, this is a time between the input, in this case, Sarah recording, and the output Sarah's headphone.

The computer needs time to process the signal, and for that there is latency, but this depends on more of the operative system and the CPU in your computer than the audio card.

6 0
3 years ago
The first operating systems, in the 1950s, were designed for _____.
Leya [2.2K]

They were designed for batch processing.

Explanation

In the beginning, around the 1940s, electronic computers were built without Operating systems. These computers could not do basic calculations, read and write data, or run programs. Setbacks such as these led to the development of operating systems.

The first one was introduced in the early to mid-1950, and it relied on the batch processing systems to facilitate submission of data into groups. Rather than processing tasks individually, this system processed tasks in batches. Upon the completion of a job, the batch would head over to the OS’s software. The software would then dump the state of the active task and open the next one. This helped reduce operator intervention and time wastage.

Learn more:

  • How does operating systems work when passing parameters to kernel. brainly.com/question/6062548

#LearnwithBrainly

7 0
3 years ago
Windows stores files on a hard drive in 512-byte blocks called
Tanzania [10]
Hey 

l think what u are thinking of is a disk
5 0
3 years ago
Other questions:
  • Sahil is making a graphic novel in which the villain plans to reduce the rate at which energy is released from the Sun. The vill
    7·2 answers
  • The Huntington Boys and Girls Club is conducting a fundraiser by selling chili dinners to go. The price is $7 for an adult meal
    8·1 answer
  • Can you clone apps form your PC and to other PC?<br>Yes or No
    13·2 answers
  • A wide variety of apps are available to customize devices, which category of app does word processing software falls into?
    10·1 answer
  • In the layers toolbar, which layer will appear in front of your game
    9·1 answer
  • write the program or pseudocode algorithm that computes the product and average of three integers and display the results​
    7·1 answer
  • Please answer immediately!!!
    6·1 answer
  • The game often becomes stuck on landscape mode when tilting the device during gameplay, which cuts off some peripheral text. A w
    8·1 answer
  • 0111101101010110101110110001001011101001011101101010101010110101
    14·1 answer
  • What technique is most commonly associated with the use of malicious flash drives by penetration testers
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!