1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashcka [7]
2 years ago
10

Do you play Rocket League

Computers and Technology
2 answers:
lakkis [162]2 years ago
6 0
Yessirrr like 3 times a week
Verdich [7]2 years ago
6 0

Answer:

I do

Explanation:

You might be interested in
The _____ requirements are associated with the efficiency, maintainability, portability, reliability, reusability, testability,
melamori03 [73]

Answer: Non-functional

Explanation:

Non-functional requirement(NFR) are the the requirements that evaluates operation of any particular system.It consist of several factors for judging the system such as security, reliability, quality, utility, maintainability etc.These parameters depicts about how a system will perform the tasks.

Other options are incorrect because function requires are used for depicting about specific and certain function in system. Performance requirements deal with the parameter of operation execution.

Correctness and standard requirement are measure for correcting system and general needs in a system respectively.

7 0
3 years ago
Read 2 more answers
Local laws passed councils are called
anzhelika [568]
An ordinance is the name typically used for a law passed by a local political subdivision, such as a city, county, village, or town. Ordinances may address a wide variety of local issues, from local government structure to speed limits and sign sizes.
4 0
3 years ago
Hue purchased 50 shares of stock on April 24, 2019. The price skyrocketed, so she decided to sell the stock in April of 2020. Wh
nadya68 [22]

Answer:

April 25, 2020

Explanation:

April 25, 2020

In order for an investment to be considered long-term, it must be held for longer than 1 year.

April 24th is not longer than a year, the only answer that is longer than a year of holding is April 25, 2020

8 0
2 years ago
ASAP PLZ!!!!!! Select the correct answer from each drop-down menu. Complete the sentences related to the types of sample data. I
Anit [1.1K]

Answer:

Data mining is one of the activities in Data Analysis. ... On the other hand, Data Analysis tests a given hypothesis. While Data mining is based on Mathematical and scientific methods to identify patterns or trends, Data Analysis uses business intelligence and analytics models.

Explanation:

8 0
3 years ago
What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz
Hunter-Best [27]

Answer:

Bayesian filtering

Explanation:

This is a type of filtering software that makes use of Bayesian logic to evaluate every incoming email that you receive, analyzing the header and content of the email to determinate if it is spam or not. It uses a preset of common words that are present in most spam emails, and it categorizes all received emails according to their probability to contain spam in trusted, or not trusted email. These categories are usually set by the user.

In short, Bayesian logic uses the knowledge acquired from past events to try to predict future events. Determinate the probability of success (from 0 to 100%) of a certain activity, according to the result of prior tests. It was first suggested in 1763 after the death of its creator Thomas Bayes, and it is widely spread across several different sciences such as programming, artificial intelligence, physics, etc.

6 0
3 years ago
Other questions:
  • A hard drive that is running slowly may not have been
    10·2 answers
  • Identify the computer cycle in each of the descriptions below by choosing the answer from the
    12·1 answer
  • To insert a column without using commands in any tabs, a user can _____ -click and then click insert column.
    6·2 answers
  • Write a (one) program for your microcontroller so that it:
    14·1 answer
  • Which piece of computer hardware was revised to run hypervisors natively?
    12·2 answers
  • For demultiplexing a UDP socket is identified by:_____.
    15·1 answer
  • Which statements about organizing messages in Outlook 2016 are true? Check all that apply. The Categories function is used for g
    13·2 answers
  • Why is computer called information processing machine....?​
    6·2 answers
  • One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
    7·1 answer
  • Show that ALLDFA is in <img src="https://tex.z-dn.net/?f=%5Cmathrm%7BP%7D" id="TexFormula1" title="\mathrm{P}" alt="\mathrm{P}"
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!