1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DochEvi [55]
2 years ago
7

Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type

of game would you create for each generation based on that generation’s psychographic characteristics? Give reasons for your choices. You may do some online research to find existing games (if any) that may appeal to each generation of players.
PLEASE HELP!!! GIVING LIKE ALL MY POINTS!
Computers and Technology
1 answer:
Hunter-Best [27]2 years ago
7 0

i would love to help i just dont understand

You might be interested in
when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it m
Elena-2011 [213]

Authentication can be done by the issuer of the security.

What do you mean by authentication?

Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.

Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.

To learn more about authentication
brainly.com/question/28240257

#SPJ4

6 0
1 year ago
What is the digital revolution and how did it change society? What are the benefits of digital media?
Rama09 [41]

Hello!

Before Social Media , Many people liked the old classical way and they had there own way to communicate with people. With social media everything changed . Companies started to grow and real face to face communication was  shrinking slowly . Kids locked themselves in there rooms to text friends and play games instead of playing outside. But technology does have a good affect for example if it wasn't for technology i wouldn't be able to help you right now ! If it wasn't for social media Wendy's wouldn't be able to Roast people . And contact over the phone would be limited .

HOPE I HELPED HAVE A BLESSED DAY!!


7 0
3 years ago
Green Fields Landscaping Company sells evergreen trees which are priced by height. Customers have a choice of purchasing a tree
Tomtit [17]

Answer:

Answered below

Explanation:

//Program is written in Python programming //language.

number_of_trees = int(input ("Enter number of trees purchased: "))

height_of_trees = float(input("Enter height of trees: "))

delivery_status = input("Do you want trees delivered? enter yes or no ")

price_of_two_meters = 20

total_price = number_of_trees * price_of_two_meters

//Invoice

print (number_of_trees)

print(height_of_trees)

print (total_price)

print (delivery_status)

8 0
3 years ago
Some problems are better solved by a computer and some are better solved by humans.
aalyn [17]

Answer:

I say when u don't know the answer completly.

3 0
3 years ago
Ethernet use a contention-based media access method defined by the IEEE 802.3 standards called ___ .
egoroff_w [7]

off the top of my head I think this might be (CSMA/CD)

4 0
3 years ago
Other questions:
  • Tornado Alley is located in the middle of the United States, extending from Texas up through the Dakotas. The above statement is
    14·1 answer
  • 3.
    13·1 answer
  • Although the Earth's crust formed relatively early in the Earth's history, it was not present when the Earth first began to form
    12·2 answers
  • • The technical support department at your company has informed you that you will be receiving a new computer within the next we
    6·1 answer
  • What method is used to manage contention-based access on a wireless network?
    7·1 answer
  • Select the correct answer.
    5·1 answer
  • When the code that follows is executed, a message is displayed if the value the user entersvar userEntry = (prompt("Enter cost:"
    11·1 answer
  • Which guideline should you follow when selecting the font for a presentation
    9·1 answer
  • A __________ note is a private note that you leave for yourself or for other people who might use the presentation file
    9·1 answer
  • Where does append add the new elements?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!