1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
3 years ago
13

What are some useful applications of video games?

Computers and Technology
1 answer:
vekshin13 years ago
8 0

Answer:

Steam, Origin, Uplay and epic games

Explanation:

You might be interested in
Select the correct answer.
Kobotan [32]
I think that it's OD
7 0
3 years ago
What do you click on to minimize all open windows? the Show Desktop icon the Start menu the system tray the taskbar
SOVA2 [1]

Answer:

The answer to this question can be given as "The show desktop icon".

Explanation:

To minimize all open windows we use to click on the Show Desktop icon. When we click on this desktop icon it automatically minimize all the open windows that are open on the computer screen. And all the option are not correct that can be described as:

The Start menu is part of the Microsoft windows. Start menu offers a central launching point for system programs and executing other tasks.

The system tray is part of the Window. It is on the Taskbar. It contains miniature icons for easy access to system functions.

That's why the correct answer is "The show desktop icon".

7 0
4 years ago
Read 2 more answers
Explain briely what this statement mean.<br>"A byte is equivalent to a character"<br>​
dedylja [7]

To put it briefly, a byte is equivalent to a <em>character</em> in that it encodes a single character, being this in the form of a<u> letter, number, or symbol.</u>

A byte is the smallest unit of storage memory on any modern computer. This byte is commonly made up of<u> eight bits</u>, a combination of binary digits used to represent data. The hierarchy of computer memory is as follows:

  • 1 byte
  • 1 kilobyte
  • 1 megabyte
  • 1 gigabyte
  • 1 terabyte

The statement "<em>A byte is equivalent to a character</em>" is quite literal in its meaning given that through the use of the bits that comprise it, a byte is used to represent and store the data for a single character of text, being that a <u>letter, number or at times a symbol.</u>

<u />

To learn more:

brainly.com/question/13188094?referrer=searchResults

3 0
3 years ago
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
How to help it automation with python professional certificate?
arlik [135]

Answer:

Following are the answer to this question:

Explanation:

As we know, that Python is based on Oop's language, it allows programmers to decide, whether method or classes satisfy the requirements.  

  • It's an obvious benefit, in which the system tests the functions, and prevent adverse effects, and clear the syntaxes, which makes them readable for such methods.
  • All the framework uses the python language, that will be used to overcome most every coding task like Mobile apps, desktop apps, data analyses, scripting, automation of tasks, etc.
3 0
3 years ago
Other questions:
  • Which is the lowest Complexity"
    15·1 answer
  • Deterime the minimum number of multiplication operations needed to compute the following. Show the order of the computations.
    10·1 answer
  • For example, sumDigits(234) returns 9 (= 2 + 3 + 4). (Hint: Use the % operator to extract digits and the / operator to remove th
    15·1 answer
  • List and describe four communication tools that are currently popular.
    9·1 answer
  • Consider the following class: public class Dog { private String name; private String breed; public String getName() { return nam
    11·1 answer
  • Late at night, some traffic signals change patterns and become _____.
    9·2 answers
  • As you are talking to your colleague over the phone, the sound of an airplane flying low drowns out part of your conversation. I
    11·1 answer
  • ACME Corp. is developing a software program that can run on mobile devices so that customers can interact with the firm, view pr
    13·1 answer
  • when you enter a formula in a cell the result of the calculation displays in a cell. how do views of formula after entering it?
    9·2 answers
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!