1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ra1l [238]
3 years ago
15

Game have been a part of human life only recently in human history—about 1100 AD. True False

Computers and Technology
1 answer:
wariber [46]3 years ago
7 0

Answer:

The answer is false it has not

You might be interested in
Write a program that reads a list of integers into a vector, and outputs the two smallest integers in the list, in ascending ord
AnnyKZ [126]

Answer:

In C++:

#include <bits/stdc++.h>

#include <iostream>

#include <vector>

using namespace std;

int main(){

vector<int> vectItems;

cout << "Vector length: ";

int ln; cin>>ln;

int num;

for (int ikk = 0; ikk < ln; ikk++){

 cin >> num;

 vectItems.push_back(num);}

int small, secsmall;

small = secsmall = INT_MAX;  

for (int ikk = 0; ikk < ln; ikk++){

 if(vectItems[ikk] < small){

     secsmall = small;  

           small = vectItems[ikk];   }

 else if (vectItems[ikk] < secsmall && vectItems[ikk] != small) {

           secsmall = vectItems[ikk];} }

 cout<<small<<" "<<secsmall;

 return 0;}

Explanation:

See attachment for program file where comments are used for explanation

Download cpp
8 0
3 years ago
Linda is a core member of a project. She estimates the cost of the project, creates project requirements, and notes risks. What
lord [1]

Explanation:

no linda is the core member not rhe project

4 0
3 years ago
Which of the following grinding methods is best suited to a shorter cylindrical workpiece?
schepotkina [342]
well i dont know but i would go with b :D

4 0
3 years ago
You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o
Tema [17]
B.) phishing
Definition of phishing:
Try to obtain financial or official information from internet users, usually sent as an email to look like it is from a legitimate company
6 0
3 years ago
RAM memory is considered volatile because this memory is erased when the computer is turned off
Goshia [24]
False because ram is constantly always running
5 0
3 years ago
Other questions:
  • Why was Unicode invented?
    6·1 answer
  • Can your computer become infected with a virus via email
    10·1 answer
  • 25) _____ involves assigning numbers or other symbols to answers so that the responses can be grouped into a limited number of c
    11·1 answer
  • Which of these networks is primarily for posting and viewing photos?
    8·2 answers
  • Sami is creating a web page for her dog walking business. Which item will set the theme for her page? Background color Heading c
    9·1 answer
  • Which of the following is true of how computers represent numbers?
    9·2 answers
  • Copyright laws protect:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task a
    6·1 answer
  • Match the following pls help
    5·1 answer
  • Hellpppppppppppppppp
    13·2 answers
  • If a robot is able to change its own trajectory as per the external conditions, then the robot is considered as the__.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!