1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
11

15. Cinematic tutorials and action-movie camera shots mixed with gameplay and some of the features that have made _____ stand th

e test of time
a) Uncharted 2
b) The last of us
c) Skylanders
d) League of Legends
Computers and Technology
1 answer:
Salsk061 [2.6K]3 years ago
7 0
It’s C: The last of us
You might be interested in
You would make a color in a graphic ____ if you wanted to remove part of a graphic or see text or colors behind a graphic.
defon
<span>The answer should be "translucent" ... </span>
6 0
4 years ago
Describe one reason you would import data into a database.
AURORKA [14]
<span>You typically import data for the following reasons: You want to merge two databases by copying all the objects in one database to another. [ When you import, you can copy all the tables, queries, forms, reports, macros, and modules, along with table relationships, to another database in a single operation. You need to create some tables that are similar to tables that exist in another</span>
6 0
4 years ago
Read 2 more answers
What law is someone punished for accessing a computer without permission?
podryga [215]
It depends the case. This is usually a computer crime. Many times depends on the state and that law that they have. It varies for punishment depending on how severely the crime was; meaning that there could potentially be jail time.
3 0
3 years ago
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
Prokaryotes are __________________ and include ________________________.
cluponka [151]
Prokaryotes are unicellular, bacteria and archaea
4 0
3 years ago
Other questions:
  • Assume that x is a char variable that has been declared and already given a value. Write an expression whose value is true if an
    8·1 answer
  • SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and
    12·1 answer
  • Fill in the blanks.
    6·2 answers
  • Which educational qualification would help a candidate get a job as a computer systems engineer? a.certificate
    6·1 answer
  • In Excel, ____ is/are used to place worksheet, column, and row titles on a worksheet.
    11·1 answer
  • Which of the following could be true of two diffrent speicies that have competitieve realtionship in the same ecosytem?
    10·1 answer
  • To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
    13·1 answer
  • 3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, proces
    13·1 answer
  • Why does coinbase keep sending me verification codes
    7·1 answer
  • When working with a spreadsheet, data analysts can use the _____ function to locate specific characters in a string.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!