1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
3 years ago
10

Do you think Mortal Combat is cool?

Computers and Technology
2 answers:
Sergeu [11.5K]3 years ago
3 0

Answer:

yes

Explanation:

aleksandrvk [35]3 years ago
3 0

Answer:

yes

Explanation:

You might be interested in
10) ________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above
Cerrena [4.2K]

There are different kinds of applications.  Control objects control the flow of the application.

<h3>What works the flow of control in a program?</h3>

In computer, control flow or flow of control is known to be a type of an order function calls, instructions, and statements.

They are known to be used in the execution or in an evaluation when a specific program is running. Note that a lot of programming languages have the control flow statements, that helps to know the section of code is run in a program at any given time.

Learn more about application from

brainly.com/question/23275071

7 0
2 years ago
Computers have drastically changed society over the last 20 years. How have computers affected communication in the business wor
iren2701 [21]

<u>Drastic change of over society Computers:</u>

In society computer has drastically changed and it has been used to for varies purpose to do analysis or storing data, as decisions making tools. Purpose computer been found is to do huge calculation. “Compute” word has been derived to computer. Computer later stage it diverted is purpose from calculation to information store device.

Computers have heavy effect the communication in normal word and business world. Especially social media took over the control of computers. In today’s world four type of ethical issue are known in computer mainstream in the workplace they are.

1. Crime (computer)

2. failure of responsibility in the computer.

3. Protection of software records and documents etc.

4. End user  data protection and privacy.

99% of computers are protected with firewalls and antivirus. But still hackers can hack the computer and steal the data.

5 0
3 years ago
In the Budget Details sheet, if you wish to autofill with the formula, you must use a ______ reference for the LY Spend Total ce
ahrayia [7]

Answer:

The answer is A.Absolute reference.

Explanation:

Absolute reference is a cell reference whose location remains constant when the formula is copied.

8 0
3 years ago
For each of the following SQL queries, for each relation involved,list the attributes that must be examined to compute the answe
Vlada [557]

Answer:

1. E.eid ,E.hobby, E.sal, E.did

2.E.eid , E.sal, E.hobby ,E.did , D.did, D.floor ,D.dname , D.budget.

3.E.eid , E.sal, E.hobby ,E.did , D.did, D.floor ,D.dname , D.budget.

4.E.eid , D.dname

Explanation:

The attributes that are examined for the query are the attributes of the table that are mentioned in the select statement and where clause.

So according to first query we are working on all attribues of Emp table so all of the attributes of Emp table are examined.In second query we selecting all attributes of both the tables hence all attributes of both the table and same in the next query.

In fourth query though the query is not complete where clause is missing but we have eid from Emp and dname from Dept tables for sure and the attributes mentioned in where clause will also be present.

7 0
3 years ago
The node of a doubly linked list contains _____.
meriva

Answer:

Hi!

The correct answer is one data field and two links fields.

Explanation:

The node of a doubly-linked list contains one data field, and two links fields that references to the next node on the list and another one link field that references to the previous node in the sequence of nodes).

3 0
3 years ago
Other questions:
  • (I'LL GIVE BRAINLIST)
    10·2 answers
  • What best compares potrait and landscape orientations
    6·1 answer
  • You need to access the registry on your windows 10 computer how do you do this
    9·1 answer
  • What was the technology that defined each of the four generations of computers?
    12·1 answer
  • The _____ feature will allow users to view nonprinting formatting marks to aid in editing a document. View Alignment Show/Hide I
    12·1 answer
  • Which describes the first step a crawler-based search engine uses to find information?
    14·2 answers
  • 6. When working with a file,
    9·1 answer
  • Please answer my question y'all!
    6·2 answers
  • What would be the best tool to display the following information from a basketball game?
    6·1 answer
  • Why do attackers tend to target public or private Wi-fi networks?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!