1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
9

What your favorite video game? (Put your user if you wanna play!)

Computers and Technology
2 answers:
Dvinal [7]3 years ago
6 0

Answer:

TRAILMAKERS PS4 but will be PS5 when comes out

Explanation:

my user is Tow4cardinals

Lapatulllka [165]3 years ago
3 0

fortnight! i don't want to play right now

You might be interested in
The possibility of devices outliving a manufacturer, leaving them without long-term support against vulnerabilities is a possibl
Dafna11 [192]

Answer: Security (updating of software and hardware)

Explanation:

Internet of Things is one of the latest inventions in technology wherein smart objects and devices can connect to the internet and also share information within that space.

One of the several challenges of the Internet of Things is Security. Because of the introduction of the Internet, there is a vulnerability to hacking. Upgrades, therefore ought to be regularly provided so as to prevent hackers from recognizing patterns and hacking into them. So when the device outlives the manufacturer, there would be no one to provide regular updates thus making the device vulnerable.

8 0
4 years ago
Convert each of the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t
asambeis [7]

011110 is the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement.

c)011110

<u>Explanation:</u>

Converting 10 base signed number as two complements. In computer signed is maintain in registered.

But computer needs all values in bits. In hardware it is considered as on or off methods. ASCII values are converted into bits and executed by CPU.

All values which been entered in computer are taken respective ASCII values and converted to bits. Normally sign symbol are maintained as registered flag which can be know if end user knows assembly programming languages.

Assembly language by which direct interacted with machine languages and faster in executions.

7 0
3 years ago
A systems engineer is managing a server cluster. A memory fault has occurred in one of the active servers; the cluster software
NeX [460]

In the case above, The system engineer has witnessed a Failover.

<h3>What is the use of Server cluster?</h3>

This is known to be a tool that makes a website to be able to run smoothly and it gives little glitches and a better user experience.

Therefore, In the case above, The system engineer has witnessed a Failover.

See full question below

A systems engineer is managing a server cluster. A memory fault has occurred in one of the active servers; the cluster software has caused another server in the cluster to become active. The system engineer has witnessed a:

a. Pairing

b. Failover

c. Load balance

d. Synchronization

Learn more about  cluster software from

brainly.com/question/2749543

#SPJ1

7 0
2 years ago
Which writing format is also beneficial to public speaking? a. Five paragraph essay c. Conventions b. Prose d. None of these
garri49 [273]
convention writing is beneficial to public speaking because writing conventions such as spelling,punctuation,capitalization and grammar help make a student content clear and understandable audience can finish reading without having to stop to try to figure out what was actually intended,the value of learning these writing becomes clear.<span />
4 0
3 years ago
Read 2 more answers
Discuss any five barries of integrating ict tools in education​
yawa3891 [41]

Answer:

lack of computer, lack of quality software, lack of time, lack of technical programs and lack of teachers

3 0
3 years ago
Other questions:
  • Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
    15·1 answer
  • Jenna updated her status on a social network regarding her upcoming vacation. What information should Jenna not provide when upd
    14·2 answers
  • When mehtod X calls method Y , method Y called methhod Z, and method Z calles method X, this is called
    9·1 answer
  • If an additional term relates to payment, quality, quantity, price, time, and place of delivery, the CISG considers the added te
    12·1 answer
  • A python package used in text analysis and natural language processing. True or False
    10·1 answer
  • Helpppppppp!!!!!!!! Some program menus are the same in every program you open. Under the File menu, all of the following are the
    15·2 answers
  • A professional photographer working for a top newspaper would like control over the quality and editing
    14·2 answers
  • 1.The ___________ method adds a new element onto the end of the array.
    5·1 answer
  • 1 Which of the following could work as bits for a binary system?
    9·1 answer
  • A department store maintains data on customers, products, and purchase records in three tables: customer, product, and purchase.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!