1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
14

9. How much is gaming and video game streaming predicted to grow from 2018-2026?

Computers and Technology
1 answer:
galben [10]3 years ago
7 0

Answer:

43 percent

Explanation:

because there's a chance they will grow if their awesome

You might be interested in
How many steps are there on Mail Merge Task Pane? List them.​
Pavlova-9 [17]

Answer:

There are six steps in the Mail Merge Task Pane.

  • Select the document type.
  • Start the document.
  • Select recipients.
  • Write your letter.
  • Preview your letters.
  • Complete the merge.

Explanation:

Mail Merge is a handy feature that incorporates data from both Microsoft Word and Microsoft Excel and allows you to  create multiple documents at once, such as letters, saving you the time and effort of retyping the same letter over and  over.  

4 0
4 years ago
Describe the six clauses in the syntax of an SQL retrieval query. Show what type of constructs can be specified in each of the s
mash [69]

Answer:

A query in SQL consists of up to six clauses.

There are presently six clauses that you can utilize in an SQL statement. These six clauses in no particular order are SELECT, FROM, WHERE, GROUP BY, HAVING, and ORDER BY. These clauses have to be coded in a precise sequence.

Explanation:

• SELECT < attribute list >

• FROM < table list >

• [ WHERE < condition > ]

• [ GROUP BY < grouping attributes (S) > ]

• [ HAVING < group condition > ]

• [ ORDER BY < attribute list > ]

you must also note that; You will have to connect to a database before you can utilize the SQL statements to query or manipulate data.

7 0
3 years ago
What are factors that limit a technological design
Oksana_A [137]
The factors that limit a technological design can be physical and social. The physical limitations are constraints due to nature itself. They  include natural laws and properties of materials.
Social limitations on the other hand <span>are limitations that arise as a result of the society we are living in and include the ease of use, safety, attractiveness, and <span>cost.</span></span>
7 0
3 years ago
Read 2 more answers
Why is it difficult to detect a Trojan horse?
marishachu [46]

Answer:

Explanation:

Because the virus disguises it self as something you are trying to download, then it attackes your device

8 0
3 years ago
Read 2 more answers
What must your motherboard have to use bitlocker encryption in windows 7 which will ensure that your hard drive cannot be used i
Gala2k [10]

your motherboard must have TPM Chip to use bitlocker encryption in windows 7 which will ensure that your hard drive cannot be used in another computer.

<h3 /><h3>What is a motherboard?</h3>
  • The primary printed circuit board (PCB) of all-purpose computers and other extensible systems is called a motherboard.
  • The primary printed circuit board (PCB) of a computer is called the motherboard. All components and external peripherals connect to a computer's motherboard, which serves as its main communications hub.
  • It offers connections for various peripherals and retains and enables communication between many of the critical electrical parts of a system, including the memory and central processor unit (CPU).
  • In contrast to a backplane, a motherboard frequently houses important sub-systems such the central CPU, input/output and memory controllers for the chipset, interface connections, and other parts that are integrated for general usage.
  • Specifically, a PCB with expansion capability is referred to as a motherboard.

To learn more about motherboard, refer to the following link:

brainly.com/question/15058737

#SPJ4

6 0
2 years ago
Other questions:
  • How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
    11·2 answers
  • A large flowing network of streams and rivers moving across a land area is a ______________________.
    15·1 answer
  • How can you get access to Help? Click all that apply.
    5·2 answers
  • What is the name of the technology that is typically implemented on switches to avoid Ethernet connectivity problems when the wr
    11·1 answer
  • Explain how devices on a lan access resources in a small to medium-sized business network.
    15·1 answer
  • What is the uniquely identifiable element about which data can be categorized in an entity-relationship diagram?
    6·1 answer
  • Consider a file currently consisting of 100 blocks. Assume that the file control block (and the index block, in the case of inde
    12·1 answer
  • Use the drop-down menus to complete the sentences about the Calendar view Arrange command group.
    6·1 answer
  • Please please help ASAP it’s timed
    13·1 answer
  • you need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. which storage device wil
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!