1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KiRa [710]
3 years ago
12

Which Game Is Better & Favorite For You?

Computers and Technology
2 answers:
Black_prince [1.1K]3 years ago
8 0
Minecraft I really enjoy playing
sleet_krkn [62]3 years ago
3 0

Answer:

Minecraft

Explanation:

Mincraft is better for me bc multiplayer with my peeps, I can have battles with them, common convo topic, build funny stuffs

and I agree I dont like fortnite either

You might be interested in
Ethernet ensures that _____ on a shared network never interfere with each other and become unreadable.
Dmitry [639]

Answer:

Signals.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Ethernet ensures that signals on a shared network never interfere with each other and become unreadable through the use of encapsulation and standard encryption protocols.

In Computer Networking, encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).

The TCP/IP model comprises of four (4) layers;

1. Application layer: this is the fourth layer of the TCP/IP model. Here, the data unit is encapsulated into segments and sent to the transport layer.

2. Transport layer (layer 3): it receives the segment and encapsulates it into packets and sends to the internet layer.

3. Internet layer (layer 2): packets are encapsulated into frames.

4. Network layer (layer 1): frames are then converted into bits and sent across the network (LAN).

Hence, the data unit encapsulated inside a packet is known as segment, which is typically referred to as packet segmentation.

Additionally, these data, segments, packets, frames and bits transmitted across various layers are known as protocol data units (PDUs).

8 0
3 years ago
What is the transfer rate of DDR memory?
hoa [83]

DDR memory is 64-bit so that means that it is 64

5 0
3 years ago
For a list to be binary search-able, we need the following thing to be true, because... a. The list must be sorted, because chec
rusak2 [61]

Answer:

The answer is option A.

Explanation:

Negative numbers can be found by binary search, this makes option B incorrect.

Unsorted and randomized lists are also not things that support a binary search, options C and D are incorrect.

Binary search uses a technique where the middle element of the list is located and used to determine whether the search should be done within the lower indexed part of the list or the higher. So for a list to be binary search-able, it should be sorted and not randomized.

The answer is A.

I hope this helps.

7 0
3 years ago
For what purpose do the hackers create the zombies army?
enyata [817]

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

5 0
3 years ago
Mbr and guid advantages and disadvantages
photoshop1234 [79]

Answer:

GPT does not have limitations in terms of the number of partitions. While you can have only 4 primary partitions in MBR, you can have up to 128 partitions in Windows using the GPT partition layout. GPT partition and boot data are more secure than MBR. MBR stores data in one place only.

Explanation:

I took the test

8 0
3 years ago
Other questions:
  • 4. What is a pentaprism? What job does it do in the camera?
    9·2 answers
  • Where can you check effective access on a shared folder? answer?
    11·1 answer
  • What are the coordinates of the origin point? (Select the best answer.)
    10·1 answer
  • Computers that are close to one another are connected to form a LAN
    7·1 answer
  • The website of an international human rights organization stores a large database of information and provides search functionali
    5·1 answer
  • What’s your fave tv show?
    14·2 answers
  • Fill in the blanks in the SQL statement below that will list the invoice number, invoice total and credit which is the total sum
    14·1 answer
  • Question 8 (True/False Worth 3 points)
    15·1 answer
  • Design a program takes as input, X, an unsorted list of numbers, and returns the sorted list of numbers in X. The program must b
    12·1 answer
  • In the year, , the American Department of Defense put a military research network, called ARPANET online.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!