1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mafiozo [28]
2 years ago
5

For what was the simulation game, America's Military, used?

Computers and Technology
2 answers:
Grace [21]2 years ago
5 0

Answer:

hhh

Explanation:

zvonat [6]2 years ago
3 0
America's Army, army training simulator and electronic game used for army recruitment and training. It was created in 2002 by Lieut.
You might be interested in
An entrepreneur identifies and fills the gap between what the society needs and what is available is called​
valkas [14]

Explanation:

Therefore, an entrepreneur is an organization builder. 6. Gap-filling function – The gap between human needs and the available products

7 0
2 years ago
Why I/O modules is needed between system bus<br>and I/O devices?​
beks73 [17]

Answer:

1. Processor communication -- this involves the following tasks:

<em>a. exchange of data between processor and I/O module</em>

<em>b. command decoding - I/O module accepts commands sent from the processor. E.g., the I/O module for a disk drive may accept the following commands from the processor: READ SECTOR, WRITE SECTOR, SEEK track, etc. </em>

<em>c. status reporting – The device must be able to report its status to the processor, e.g., disk drive busy, ready etc. Status reporting may also involve reporting various errors. </em>

<em>d. Address recognition – Each I/O device has a unique address and the I/O module must recognize this address. </em>

<em />

2. Device communication – The I/O module must be able to perform device communication such as status reporting.

3. Control & timing – The I/O module must be able to co-ordinate the flow of data between the internal resources (such as processor, memory) and external devices.

4. Data buffering – This is necessary as there is a speed mismatch between speed of data transfer between processor and memory and external devices. Data coming from the main memory are sent to an I/O module in a rapid burst. The data is buffered in the I/O module and then sent to the peripheral device at its rate.

5. Error detection – The I/O module must also be able to detect errors and report them to the processor. These errors may be mechanical errors (such as paper jam in a printer), or changes in the bit pattern of transmitted data. A common way of detecting such errors is by using parity bits.

5 0
3 years ago
Sorry to bother you guys but for some reason it wont let me comment. How can i fix this?
Step2247 [10]

Explanation:

I would just say close the app and come back in after

7 0
3 years ago
Read 2 more answers
What is the most recent version of Microsoft Windows?
yuradex [85]

Answer:

I believe it is windows 8

7 0
3 years ago
Read 2 more answers
If you have cable internet service, what protocol is used between the head end connection and the cable company's network
julsineya [31]
The answer would be (DOCSIS). :)

Have a blessed day and hope this helps!
7 0
3 years ago
Other questions:
  • What does software alone enable a computer to do? connect to the Internet control processing speeds interact with the user manag
    11·2 answers
  • What are examples of educational obstacles to a career plan?
    13·1 answer
  • Web sites use _____ to track users while they are on the site.
    14·1 answer
  • In an is framework, ________ is the bridge between the computer side on the left and the human side on the right
    12·1 answer
  • Laura is confused with the spelling of the word pronunciation. She types the word pronunciation. Which feature of the auto corre
    8·2 answers
  • Garry is a record executive who is building a data table to include in a presentation about one of his artists. The table is mea
    15·1 answer
  • What are two types of formulas in Excel
    13·2 answers
  • 2. From the listing code, please give the block of line numbers for code which are concerned with the following: A) Main functio
    5·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • 1- pensamiento sistémico<br>2- visión oriental y occidental​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!