1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
13

Which is the best video game antagonist?

Computers and Technology
2 answers:
dimaraw [331]3 years ago
6 0

Answer:

mario Martinez was making a use of the surge how he might help him out side

Mario.

Doss [256]3 years ago
5 0
Link, I need more letters so I am doing this
You might be interested in
Which describes the safest way to sit at a desk while typing on the computer?
Anna35 [415]

Answer:

Keep the knees and hips at 90-degree angles and the wrists straight.

Explanation:

From computer ergonomics, sitting at a desk and typing can affect the back, cause discomfort and sometimes injury. To protect the back, always sit with the knee and hips positioned at 90 degree while keeping the wrist straight and also position the equipment appropriately to always suite this posture.  

7 0
3 years ago
5.2
Ray Of Light [21]

Answer:

In order to reduce the risk of accidents on the roads.

Explanation:

The special equipment is used when  testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.

8 0
3 years ago
How do you properly turn off a computer?
Ugo [173]

Answer:

with the power button or do the sleep or shut down

and by the type of computer

Explanation:

sry if its wrong

have a good day:)

-XxMissNobodyxX

7 0
2 years ago
Read 2 more answers
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
A disk has 4000 cylinders, each with 8 tracks of 512 blocks. A seek takes 1 msec per cylinder moved. If no attempt is made to pu
shutvik [7]

Answer:

The answer is below

Explanation:

a)

If the blocks of a file are not put together, that is for nonadjacent block of files to each other, the time (t) taken to read a 100 block file is:

t = (average seek + rotational latency + transfer time) * 100 block

Average seek = 5 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec

t = (5 + 10 + 0.02) * 100 = 1502 msec

b)

If the blocks of a file are put together, that is for adjacent block of files to each other, the time (t) taken to read a 100 block file is:

t = (seek time * mean interblock distance + rotational latency + transfer time) * 100 block

seek time = 100 microsec = 0.1 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec, mean interblock distance = 2 cylinders

t = (0.1*2 + 10 + 0.02) * 100 = 1022 msec

3 0
3 years ago
Other questions:
  • Whoevr answers this will be marked brainliest
    12·1 answer
  • Which term is used to describe a computer-based method of communication in which users can type and view informal messages sent
    8·1 answer
  • When you start to type =av, what feature displays a list of functions and defined names?
    11·1 answer
  • What is the Explicit Dependencies Principle? Explain why explicit dependencies are better than implicit dependencies.
    6·1 answer
  • which of the following is the term used for a set of programs that acts as an interface between the applications that are runnin
    7·1 answer
  • How is DATA sent across a Network?
    7·1 answer
  • A store that has both an e-commerce site as well as a physical store (building) is known as:
    8·1 answer
  • Date Class Constructor – assigns fields to appropriate formal parameter – using the setters so error checking will occur. The co
    6·1 answer
  • The conversion rate is the percentage of what? A. Customers who received cold calls B. Sales leads who reached the interest stag
    13·1 answer
  • 1- Identify the face expressions is considered....
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!