1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
2 years ago
10

Critical Thinking Questions

Computers and Technology
2 answers:
Pani-rosa [81]2 years ago
8 0

Answer:

Explanation:

1) Assassins Creed Valhalla. The developers (ubisoft?) is canadian i think. The culture of ACV is of the vikings. Some advantages would be many people could learn about viking culture but some concerns is since it may not be the developers culture some information could be wrong and many people could be misinformed

2) personally i would put them in the order of Asteroid, Pac Man, then modern warfare.

this is all i really know sorry

but i hope this helps <3

kap26 [50]2 years ago
7 0

Answer:Assassins Creed Valhalla. The developers (ubisoft?) is canadian i think. The culture of ACV is of the vikings. Some advantages would be many people could learn about viking culture but some concerns is since it may not be the developers culture some information could be wrong and many people could be misinformed

Explanation:

You might be interested in
Given the following function definition, what modifications need to be made to the search function so that it finds all occurren
svet-max [94.6K]

Answer:

D. have function return the whole array

Explanation:

the given function only return first occurrence of target. In order to get all occurrences of target we have to change condition in while loop to check whole array even if first occurrence of target found and plus add another parameter of type array that will store different  indexes of occurrence of target and return that array

8 0
3 years ago
Which statement is true about biometrics as an authentication method?​
Irina-Kira [14]

The statement is true about biometrics as an authentication method in options b and c.

<h3>What is Biometrics?</h3>

Biometrics is the measurement worried in measuring behavior or physiological traits of the human being. It is used for verifying the identification of a specific man or woman. It is probably operated in modes, particularly authentication and enrollment.

The complete question is :

Which of the following are true in biometric systems?

  1. a. For authentication application, a user template is compared against a single template stored in the database.
  2. b. For verification/identification application, a user template is compared against all the templates stored in the database.
  3. c. Multimodal biometrics is used to improve accuracy.
  4. d. None of these.

In the first mode, the facts is used and proven to test who the man or woman is. The second mode is obtaining the man or woman's facts and storing it in a database. Usually, multi-version biometrics are used for enhancing popularity accuracy.

Read more about the authentication :

brainly.com/question/25689052

#SPJ1

3 0
2 years ago
When you use the ip address of the web server, the correct site is displayed?
jekas [21]
No. Using the address will get you either the default site, or the first site declared. Web servers can host VirtualHosts, and rely on the site name to know which VirtualHost to serve. TMI, it's called name based virtual host, as opposed to the machine having many addresses then address based virtual hosts can be created.
6 0
3 years ago
What may happen if a large number of computer users are attempting to access a web site at the same time that you are
Nitella [24]
It will most likely begin to crash and eventually just freeze , i'm guessing  
6 0
3 years ago
Read 2 more answers
What is printed when the following code has been executed?
serg [7]
Hey it is 15 hope this helps
3 0
3 years ago
Other questions:
  • After you enter the details for the first selected recipient in the New Address List dialog box, click _______ to add another re
    11·2 answers
  • In databases and database-related software, which choice is not a Boolean operator?
    7·2 answers
  • Using 2 bytes, how many different characters can Unicode represent?
    14·1 answer
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable nIncompletes that cont
    6·1 answer
  • Which of the following is not a key way that a LAN shares
    15·1 answer
  • Ethical design refers to...
    13·1 answer
  • What is the purpose of a Post Mortem Review? (5 points)
    5·1 answer
  • Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 ​n ​​ and that executing an implementation o
    14·1 answer
  • Imagine that you just received a summer job working for a computer repair shop one of your first task is to take apart a compute
    14·1 answer
  • Can i have help for a ggogle class room
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!