1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
3 years ago
10

Ivan wants to have code in a game that will make it possible to change the speed of a swimmer in the game. Which of these does I

van need?
A.
a Boolean value

B.
output

C.
a variable

D.
a database
Computers and Technology
1 answer:
grin007 [14]3 years ago
8 0
A) a Boolean value, because you can have two possible values which is intended to represent the two truth values of logic.
You might be interested in
As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she
WINSTONCH [101]

Answer:

D. Her computer is a DHCP client.

Explanation:

Since in the question it is mentioned that IP address is different as compared in the previous week also the user did not make any changes with respect to the TCP/IP configuration and the system is working well

So this situation represents that the user computer is a client of DHCP as it deals with the client-server protocol in which it automatically generates the IP i.e Internet protocol along with the IP address

Hence, the correct option is d.

4 0
4 years ago
Robert’s computer is not working properly. It has become too slow to respond to programs. What can he do to maintain his compute
ozzi

Answer: Utility Software

Explanation:

Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.

3 0
3 years ago
List one way to convey professionalism to the reader of a document.
Ray Of Light [21]
Abstain from contractions like “couldn’t” or “should’ve” and use “could not” or “should have” instead
4 0
3 years ago
How is scale depicted on a flat video screen?
tatiyna

Answer:

aakaksjeiwienjskiaoque ieiba

Explanation:

*!\$_&×&×&$_$_!,!,,Ω,Ω

fr tho . I actually have no idea

6 0
3 years ago
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
Other questions:
  • Write a copy assignment operator for CarCounter that assigns objToCopy.carCount to the new objects's carCount, then returns *thi
    15·1 answer
  • Can someone show me a image of this completed I will mark brainliest!!! It's typing.com
    11·1 answer
  • When you select Insert and click on a shape the mouse pointer turns into a/an
    12·2 answers
  • While performing Before Operations PMCS, you notice the front right tire appears slightly underinflated. What is the proper acti
    11·1 answer
  • Name the steps to insert a cover page.
    14·1 answer
  • En su cuaderno o carpeta de trabajo realice la conversión del sistema de numeración binario a octal según este ejemplo de manera
    13·1 answer
  • System.out.print();
    10·1 answer
  • What are 3 software programs for mobile computing?
    10·1 answer
  • Factoring is the revers of​
    14·1 answer
  • A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!