1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
2 years ago
9

Whats is a better game?

Computers and Technology
1 answer:
Jobisdone [24]2 years ago
3 0

Answer:

The first two are the best ones I see here, because I play them. Not sure how else to say that. Please make sure to also use brainly for school, though. Thanks!

You might be interested in
What is the tendency for an individual to have better memory for information that relates to oneself in comparison to material t
Elena-2011 [213]

Answer:

The answer is "Option c".

Explanation:

The self-reference will affect the appears, that enables the people to transmit data separately, as per their degree of knowledge, If people are willing to identify the information, the frequency of recalling may be increased if it is linked in some way to ourselves, and other options are wrong, that can be described as follows:

  • In option a, It is used to store information for a long time, that's why it is not correct.
  • In option b, It is used for both, input and receives sensory register and the long-term store, that's why it is not correct.
  • In option d, It provides cognitive interference that's why it is not correct.
4 0
3 years ago
Consider a sequence of 1's and 1's with the property that the sum of any prefix of the sequence is never negative For example th
MrMuchimi

Answer:

Check the explanation

Explanation:

Answer: Solution: Algorithm:

Step 1: Start.

Step 2: Create a stack Step

3: Push an initial stack variable, it will represent that, stack is empty.

Step 4: Get input

             If +1 then push "+1"

             Else if -1 then pop

Step 5: Repeat until all input finish or Stop if empty stack variable popped. Step 6: Stop.

It is a pushdown automata problem.

It can be also represented as:

X =1+1* —1* 1No(+1)>= No(-1)}

4 0
3 years ago
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
andrew-mc [135]

Answer:

Option c: Heuristic

Explanation:

Heuristic scanning is a form of computer virus detection analysis that screen for the suspicious characteristic of the program which maybe a virus. Heuristic scanning is designed to detect those new computer virus, unknown virus or the modified version of the known virus.

To perform heuristic scanning, a weigh-based evaluation algorithm will be adopted to estimate the likelihood of the current scanned program behaves like a virus which can pose a computer threat. If it exceeds a threshold level, an alarm will be triggered.

3 0
3 years ago
If you were able to earn interest at 3% and you started with $100, how much would you have after 3 years?​
erma4kov [3.2K]

109

A= Amount+ interest *sb

interest=P×r×t/100

100×3×3/100

100 cancel 100=3×3=$9

100+9=109

7 0
3 years ago
Which statement below is incorrect when discussing communication in the online community?
Marysya12 [62]
It's everyone's responsibility to report cyberbullying.

The tone is important whenever you are talking to someone else.

You can literally say anything in virtual world, but you should behave yourself

If everybody knows the common text phrases, then it's fine, but it will be better to talk formally.
8 0
3 years ago
Other questions:
  • Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, s
    11·1 answer
  • propose,two new ,proudly South African ways,which you can visualize that the IoT,can be used at work to make life better.
    12·1 answer
  • Major stress in your life can cause:
    11·2 answers
  • Html code to hyperlink home.html​
    5·1 answer
  • What is a computer memory <br>​
    9·2 answers
  • Moving your Sprite top to bottom is moving along the X coordinate?<br><br> True<br> False
    5·2 answers
  • Which methods will remove filters? Check all that apply.
    6·2 answers
  • What structure is a candle​
    13·1 answer
  • Opinion paragraph should the driving age be raised 21 ​
    13·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!