1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
5

Discuss 2D gameplay and how new platforms such as cell phones are taking advantages of this renewed market

Computers and Technology
1 answer:
ankoles [38]3 years ago
8 0
2D games are games that are made in the second dimension. These games are can be any type of game from platforms like Mario or adventure games like Terraria.  These games are big in the mobile games market because they are simple due to them only having 2 dimensions. This makes it easy for the players because you either have to use a "joystick" to move the characters like in Terraria or push a button to do a certain action.<span />
You might be interested in
friend wanted us to decode this message ----- .---- ----- ----- .---- ----- ----- .---- / ----- .---- .---- .---- ----- .---- .-
hodyreva [135]

Answer:

01001001?01110111?01100001?01111001?00100000?01101001?01101011?01100101?01101100?01100001?01111001?00100000?01110101?01101110?01100001?01101100?01100001?01111001?00101110

3 0
3 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission media." Explain why
Romashka [77]

Answer:

He is wrong, it is the communication endpoint.

4 0
4 years ago
Read 2 more answers
What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
vodomira [7]

Answer:

A lookaside buffer translation (TLB) is a memory cache that reduces the time it takes to access a user memory place. TLB includes the most lately used page table entries.

TLB is used to overcome the issue of sizes at the time of paging. Page Table Entry (PTE) is used for framing the memory ,but it uses two references one for finding  the frame number and the other for the address specified by frame number.

<u>Formula for finding effective memory access time-</u>

Effective Memory Access Time = (TLB access_time+Memory Access Time)*hit ratio + (TLB access_time+2*Memory Access Time)*(miss ratio)

Given in question,

Hit ratio = 0.90

Memory Access Time = 150ns

TLB access time= 5ns

Effective Memory Access Time = (TLB access_time+Memory Access Time)*hit ratio + (TLB access_time+2*Memory Access Time)*(miss ratio)

                            =(5+150) * 0.90 + (5+2*150)*(1-0.90)

                             =155 * 0.90 + (305*0.1)

                             =139.5 + 30.5

                             = 170ns

8 0
3 years ago
A local area network is: a large central network that connects other networks in a distance spanning exactly 5 miles. a group of
igomit [66]

The correct answer is a group of personal computers located in the same general area and connected by a common cable.

8 0
3 years ago
Other questions:
  • Search engines enable you to
    13·2 answers
  • Assume you had a .csv file with data already populated that you wanted to use for a mail merge. Which button would you press to
    8·1 answer
  • In 125 words describe the steps to active listening.
    6·1 answer
  • 3. By eliminating data redundancy, you're enforcing data A. validation. B. integrity. C. consistency. D. accuracy.
    14·2 answers
  • Excel recognizes an entry as a value if it is a number or it begins with ____
    8·1 answer
  • if you play creative destruction and if u have a mic and if u play it 24/7 and would like to form a team tell me your name or yo
    7·1 answer
  • Which of the following is true about radio waves? They have short wavelengths. They have high energies. They reveal hot gases. T
    10·2 answers
  • What is the function of the following shape? display result to user get input from user make a decision process information
    7·1 answer
  • Lisa is developing a Web application using a framework and wants to include interactive elements using JavaScript. She decides t
    10·1 answer
  • Write a for loop to print all the even numbers from 200 to 300.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!