1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
2 years ago
12

6. A genre of video game in which a player chooses a character and builds, upskills and modifies that character is referred to a

s _____________.
a) First person shooter game of FPS
b) Personification game
c) Action game
d) Role-playing game or RPG
Computers and Technology
2 answers:
Mama L [17]2 years ago
3 0
C is the answer as action games have big impact on children’s lives
aliina [53]2 years ago
3 0
RPG!
Role playing games are where people build and create their own characters and enhances their skills over time (Like D&D)
You might be interested in
Which Access database object asks a question about the data stored in a database and displays specific fields and records that a
AVprozaik [17]

Answer: Query

Explanation:

It is through the process of queries a user is able to ask questions about the data stored in the database and view specific fields as required. These queries can be of many type and each time using a query would give us the desired fields.

7 0
2 years ago
A cell in a spreadsheet can contain _________?
serg [7]
The correct answer is All of these :)
3 0
3 years ago
Where can elicitation techniques be used?
Nikitich [7]

Answer:

An elicitation technique is any of a number of data collection techniques used in anthropology, cognitive science, counseling, education, knowledge engineering, linguistics, management, philosophy, psychology, or other fields to gather knowledge or information from people.

Explanation:

3 0
2 years ago
These tools gather information from sources such as emails, text messages, and tweets and make the information instantly and pub
babunello [35]

Answer:

Crisis-Mapping

Explanation:

Social networks are characterized by the immediacy of the content that users produce, and that same feature can be transferred to the online mapping of crises and conflicts.

Characteristics Crisis-Mapping:

  • Real-time information processing.
  • Immediacy;
  • Visualization of the aggregated information can allow the detection of patterns that cause new analyzes to be undertaken or work hypothesis to verify.
  • Continuity in the tasks, the maps record activity without interruption during the twenty-four hours of the day and seven days per week.
  • Flexibility in the protocols, since the tasks are distributed and evolve according to the dynamics (the crisis maps evolve with the crisis itself).
8 0
3 years ago
A ________ is a virus that is triggered on a certain date.
marysya [2.9K]
A time bomb virus is a virus that is triggered on a certain date. It is a malicious program that is designed to release virus unto a system. Once the time has arrived, it will automatically start working what it is programmed to do since any virus could do anything depending on what it is designed to do.
8 0
3 years ago
Other questions:
  • "Which of the following will help protect against a brute force attack?
    11·1 answer
  • Anderson uses his computer and internet link to chart the movement of his favorite 46 stocks. He buys and sells according to the
    15·1 answer
  • Which task manager tab provides details about how a program uses system resources?
    14·1 answer
  • In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-p
    15·1 answer
  • Katarina is deciding whether to buy a desktop or a laptop computer. What will most likely help Katarina make her decision?
    10·2 answers
  • Which of the following might an interior designer in the retail industry specialize in?
    9·1 answer
  • It's fill the gap homework
    7·1 answer
  • Why is data processing done in computer?​
    14·1 answer
  • How does Shakespeare immediately introduce Tybalt as a menacing character?
    9·1 answer
  • Hi you probably don't care but if u want a gift card use my code GCQ7B on fetch rewards must scan a receipt first
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!