1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeyben [28]
3 years ago
14

What is the effect of persistence of game worlds in social video games?

Computers and Technology
2 answers:
stich3 [128]3 years ago
5 0

Answer:

D.) players can log out of a game and come back without losing any progress

allsm [11]3 years ago
3 0
I would say A based off my own gaming experience. Because in only in some games you can save your game. Same with participating in events. I can always collaborate with others with others in all the games I play.
You might be interested in
What instructions would a computer have the hardest time completing correctly
irakobra [83]

The instructions which a computer would have the <u>hardest time</u> completing correctly are <u>complex instructions</u>.

<h3>What is an instruction?</h3>

An instruction can be defined as a set of executable codes that are written and developed to instruct the central processing unit (CPU) of a computer system on how to perform a specific task and proffer solutions to a particular problem.

This ultimately implies that, it is a segment of executable codes which contain steps that are to be executed by the central processing unit (CPU) of a computer system.

In Computer programming, the instructions which a computer would have the <u>hardest time</u> completing correctly are <u>complex instructions</u>.

Read more on instructions here: brainly.com/question/26324021

7 0
2 years ago
You are utilizing BitLocker Drive Encryption, and are attempting to update Windows Server 2016. What must be done so that the up
solmaris [256]

Answer:

Disable BitLocker Drive Encryption and then re-enable it after completing the update

Explanation:

The BitLocker Drive Encryption  is a full volume encryption feature included with Microsoft Windows operating systems  starting with Windows Vista.  Its function is to  protect data by providing encryption. To carry out a successful update on your operating system, you must disable this encryption service and re-enable when completed.

3 0
3 years ago
Consider the following C code fragment:
wlad13 [49]

Answer:

10

Explanation:

Pointer arithmetic is tricky. The address is incremented by the sizeof the pointed element. A short is 2 bytes.

So adding 10 adds 20 bytes to the starting address of arr[].

In the expression, you're adding 10-6 = 4 to the start of the array, so you're pointing at the fifth element, arr[4] which is 10.

8 0
3 years ago
Write a program that prints the following 45 pairs of numbers:
sattari [20]

Answer:

  • Code is in JAVA language. As there is no user input the logic is straightforward.
  • Below is the code along with a detailed explanation of the logic.
  • The class name is Print main save as file as the main class.

Explanation:

Program:-

public class Main{

public static void main(String args[]){

/* There are two for loops...

* First for loop runs from i=1 to i=9

* Second for loop runs from j=1 to j=i.

*

*/

for(int i=1;i<=9;i++){

for(int j=1;j<=i;j++){ // j loop runs from j=1 to j=i

/*Prints I and j next to each other*/

System.out.println(i+""+j);

}//for loop of j ends here

}// for loop of I ends here

}

}

6 0
3 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
3 years ago
Other questions:
  • Which option is referred to by the Animals tag?
    5·1 answer
  • When numbers are changed in cells that are involved in formula is the formulas are automatically
    14·1 answer
  • Basic rule for java languague
    13·2 answers
  • Antivirus software uses ________ to search for known viruses.
    9·1 answer
  • When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again?
    11·1 answer
  • Consider a channel that can lose packets but has a maximum delay that is known. Modify Protocol rdt2.1 to include sender timeout
    11·1 answer
  • What does the binary odometer show about representing large numbers?
    8·1 answer
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • Write a user input program that simulates a game of a rolling pair of dice. You can create/simulate rolling one die by choosing
    10·1 answer
  • Which type of programming language translates one line of code at a time and then executes it before moving to the next line?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!