Answer:
A second person prespective
Explanation:
Answer:
i had dat gam i think its 3rd person but i am not positive... i have never even heard of over the shoulder perspective.
When you connect a printer to your computer, ________ allows the operating system to detect the printer to make setup easier.
Answer:
PnP
Explanation:
where on a computer is the operating system generally stored?
The operating system on a computer is generally stored at hard disk.
Typically, a data structure known as the Interrupt Vector Table stores the addresses of interrupt handlers (IVT). When an interrupt happens, the processor refers to the IVT, a table of fixed addresses in memory.
An interrupt is a signal sent to the processor of a computer or other digital device by a hardware component or software function to get the processor's attention. By allowing the processor execute numerous tasks at once, interrupts enable hardware devices to connect with the processor and software to run more effectively.
The interrupt handler, which is normally included in the operating system kernel, receives control when an interrupt occurs, causing the CPU to pause its ongoing task execution. The interrupt handler responds to the interrupt, which may entail resolving an error condition, processing data from a device, or performing input/output tasks. The processor resumes working on the interrupted job once the interrupt has been handled.
Learn more about Interrupt here:
brainly.com/question/29770273
#SPJ6
what are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, reward, and other consequences that result from the players actions?
rules
feedback
tasks
algotithms
Answer:
A. Rules
Explanation:
Rules can determine what can be done and what cannot be done... giving it restrictions, or RULES in a video game among-st a player
Independence Day celebration in school paragraph
Answer:
We celebrated the Independence day in our school compound, with great pump and show. The school building and the ground were cleaned and decorated for the occasion. A flag pole was put up at the top of the school building. The seating arrangement was made on the platform
Explanation:
please Mark my answer in brainlist
PLEASE HELP! (NO LINKS)
The US Copyright Act gives computer programs the same status as what kinds of work?
Answer:
C.
Explanation:
In image below.
Have a wonderful day and mark brainliest if I helped,
starkitty052010 of Brainly
independence day in school long passage plss
Answer:
Independence Day Celebration in My School
Fifteen August, is a red letter day in the history of India. On this day in 1947, our country become free form the long imprisonment of the British rule. Since 1947, fifteenth August is celebrated every year with great joy and pride. It reminds us for the great struggle of our freedom from the British rule. The great sacrifice for our freedom fighters is remembered, which serves as a beacon light for the development of this great country. The main function is held at Red Fort in Delhi where the Prime Minister unfurls the National flag. It is an occasion of celebration for every Indian and the whole nation celebrate a holiday from all work and take a pledge to work whole heatedly for the development of this country and preservation of Independence. All those who have stood out exclusively in their respective field of work are honored in public meetings. The whole nation pays homage to the security forces who have laid down their lives for the honor and security of the country.
We also celebrated the Independence day in our school compound, with great pump and show. The school building and the ground were cleaned and decorated for the occasion. A flag pole was put up at the top of the school building. The seating arrangement was made on the platform. Markings were made on the ground with white lines. The flower pots were kept all along the path.
There was great enthusiasm among students. The school band of students took its position half an hour before the actual function was to began. The members of the band were wearing a beautiful uniform. They began to play sweet tunes. The students had taken their places well before the time. They were all in school uniform, the white paint and white shirt.
The function began exactly at 8 a.m. all who were present stood in attention. The principal unfurled the flag. The petals of rose fell on us. Five boys sang a song in honor of the national flag. It was “Vijayee Vishwa Trianga Payara”. Them by the school band. The principal look the salute. He made an impressive speech and invited the Education Minster to impressive speech and invited the Education Minster to address us. In his address he asked us to take pledge to safeguard the freedom of nation. He also reminded us of great sons of India, Mahatma Gandhi, Pt. Nehru, Subhash Chandra Bose, Lala Lajpat Roy and Chander Shekar Azad and their sacrifices to the nation. After that different groups of students presented a programme of mass drill and pyramid formation. Ever one liked the programme.
In the end, all stood in attention. All the students, teachers and guardians sang the National Anthem in chorus. With this the function was over. Today the memories of this function are as alive to me, as it was on that day.
Select the correct answer.
Which option would you use to insert two line breaks in your document?
A.<2br>
B.
C.
D.
Answer:
yes, I agree.
Explanation: ,
from which Menu option you can change page setup in MS Word
page layout tab or the page setup dialog box
________ programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures. Group of answer choices Object-oriented Structured Unstructured Content-markup
Considering the programming layout, Structured programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures.
Definition of Structured Programming Technique.This is because Structured Programming techniques are a method that is employed to enhance the reliability and simplicity of the program code.
Configurations of Structured Programming Technique.Structured Programming Techniques generally takes three structures body which include the following:
IF THEN ELSE DO WHILESequenceHence, in this case, it is concluded that the correct answer is option B. "Structured."
Learn more about programming techniques here: https://brainly.com/question/17180300
Two computer programs that are carefully joined together so that they appear to be a single program with a single user interface
In Computers and technology, a seamless interface is a technology in which two (2) computer programs are joined together carefully, in order to make them appear as a single software program that has a single interface for end users.
A seamless interface can be defined as a technology in mobile cloud computing (MCC) through which two (2) computer programs are carefully meshed or joined together, so as to make them appear as a single computer program with a single interface for end users.
This ultimately implies that, a seamless interface is used in providing end users a uniform interface for two or more different computer programs.
Consequently, two or more users are able to use and enjoy a two or more different computer programs through the design and development of a seamless interface without any form of obtrusiveness.
In conclusion, a seamless interface carefully joins two (2) computer programs together, so that appear as a single software program that has a single interface for end users.
Read more: https://brainly.com/question/20379777
You need to manage a process in the foreground by pressing Ctrl+C on the keyboard. Which signal code is sent to the process?
write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'
Answer:
//check which string is greater
if(strcmp(name1,name2)>0)
//assign name1 to first, if the
//name1 is greater than name2
first=name1;
else
//assign name2 to first, if the
//name2 is greater than name1
first=name2;
5)
//compare name1 and name2
if(strcmp(name1,name2)>0)
//compare name1 and name3
if(strcmp(name1,name3)>0)
//assign name1 to max, becuase
//name1 is greater than name2 and name3
max=name1;
Explanation:
Need help with 3.2 lesson practice questions (edhesive)
Answer:
Doesn't have a questionExplanation:
THANK YOUUAssuming a 1-KB page size, what are the page numbers and offsets for the following address references (provided as decimal numbers): a. 3085 b. 42095 c. 215201 d. 650000 e. 2000001
Answer:
(a) page = 3; offset = 13
(b) page = 41; offset = 111
(c) page = 210; offset = 161
(d) page = 634; offset = 784
(e) page = 1953; offset = 129
The page numbers and offsets for the following address are:
page number 3, with an offset of 13.page number 41, with an offset of 47.page number 210, with an offset of 641.page number 634, with an offset of 496.page number 1953, with an offset of 49.To find the page numbers and offsets for the given address references, we need to perform some calculations based on the page size.
Assuming a 1-KB page size (1 KB = 1024 bytes), use the following formulas:
1. Page number = Address reference / Page size
2. Offset = Address reference % Page size
a. 3085:
Page number = 3085 / 1024 = 3
Offset = 3085 % 1024 = 13
Address 3085 is on page number 3, with an offset of 13.
b. 42095:
Page number = 42095 / 1024 = 41
Offset = 42095 % 1024 = 47
Address 42095 is on page number 41, with an offset of 47.
c. 215201:
Page number = 215201 / 1024 = 210
Offset = 215201 % 1024 = 641
Address 215201 is on page number 210, with an offset of 641.
d. 650000:
Page number = 650000 / 1024 = 634
Offset = 650000 % 1024 = 496
Address 650000 is on page number 634, with an offset of 496.
e. 2000001:
Page number = 2000001 / 1024 = 1953
Offset = 2000001 % 1024 = 49
Address 2000001 is on page number 1953, with an offset of 49.
Learn more about offset here:
https://brainly.com/question/32088531
#SPJ3
ok so I have two accounts and like, the other account has -20 points??? what happened
Choose the response that best completes the following statement.
"If you're not sure if you should be on a site or signing up for a profile, ________."
ask permission
consider the outcome
don't say it online
use the 5-second pause
Answer:
probably the 5 second pause
Specifications What are the best practices you should communicate to the Design team about the formatting of the spec book
The Spec book, describes a formatted writing which contains the major specifications and description of the building blocks of an application or process. The design process should follow formatting guidelines such as ;
Inclusion of table of content, which gives a table like format of the content in the book within the first 25 pages. Inclusion of the Spec section number in the header and footer section of each page of the book. Avoid including any other value with the spec section number. Hence, the spec section number must be distinctly seperated.Learn more : https://brainly.com/question/25648287
Most general-purpose applications use a(n) ________ that displays graphical elements called icons to represent familiar objects.
A general purpose application is often called a 'off-the-shelf'. It is a kind of software that one can use at home and school. Most general-purpose applications use a graphical user interface that displays graphical elements called icons to represent familiar objects.
The graphical user interface is simply defined as a type of user interface that gives users permission to interact with electronic devices via the aid of graphical icons and audio indicator such as primary notation.
General purpose application software is simply defined as a type of application that is used for different kind of tasks.It is not known to be able to perform more than one function. For example, a word processor.
Learn more from
https://brainly.com/question/2919813
Vhat is the result when you run the following program?
rint(2 + 7)
rint("3+ 1")
4
O an error statement
2+7
o
4
0
9
3 + 1
Answer:
4
Explanation:
You often travel away from the office. While traveling, you would like to use your laptop computer to connect directly to a server in your office and access files. You want the connection to be as secure as possible. Which type of connection do you need
Answer:
You will use a secure connection
Explanation:
You need VPN so that your IP cant be tracked which will help hackers to find you
A secured connection is a connection which is encrypted and secure the data from both the ends. A VPN (Virtual Private Network) is a secured connection.
What is Secured connection?A secured connection is a connection that is encrypted by one or more security protocols to ensure the data security which is flowing between two or more ends.
A secured connection can help someone from stealing or changing information that has been sent online. To create a secured connection, the device and website's server use an SSL protocol. SSL protocol is a set of encryption rules that both computers understand and keep the data secured.
VPN stands for "Virtual Private Network". It is used for the opportunity to establish a protected network connection when using public networks. VPNs encrypt the internet traffic and disguise online identity of an individual. This makes it more difficult for third parties to track the activities online and steal data of an individual.
Learn more about Secured connection here:
https://brainly.com/question/25556545
#SPJ2
A(n) ________ is an excellent tool for representing a system's component processes and the flow of data among them.
A(n) _____is a small application that cannot run on its own but can be used with other software products.
Answer:
emulador
Explanation:
it need apps to run
A shared feature is a small application that cannot run on its own but can be used with other software products.
What is software?A device's running programs, scripts, and applications are collectively referred to as "software" in this context. It can be compared to the variable component of a computer, whereas the invariable component is the hardware.
Application software and system software are the two main subcategories of software. System software and application software are the two categories of software. System software is employed to direct operations as well as a computer's internal processes and hardware components.
Therefore, a little program known as a shared feature can be utilized with other software items but cannot be used independently.
To learn more about software, refer to the link:
https://brainly.com/question/1022352
#SPJ5
NFPA 780, Standard for the Installation of Lightning Protection Systems provides information on the installation of _____ for lightning protec-tion systems [250.4(A)(1)].
Answer:
a and b. 250.4(A)(1) Note
Explanation:
What genre of games involves gameplay that is designed to simulate real-world or fictionalized activites such as flying a plane or managing a city and often requires resource management?
Simulation games
Puzzle games
Adventure games
Strategy games
Answer:
simulation games
Explanation:
Simulation games are a broad category of games where gameplay is designed to simulate real-world or fictionalized activities and often require resource management skills.
Answer:
Simulation games
Explanation:
the use of technology to observe a user's actions often without the user's knowledge is known as:
A) Unauthorized access
B) Industrial espionage
C) Computer surveillance
D) Denial-of-service attack
Answer:
C
Explanation:
Computer surveillance refers to spying that allows the viewer to gain access of all activity on the given computer.
In a complex formula, how does excel determine which calculation to perform first?.
In a complex formula, the way excel determines which calculation to perform first is that; It follows the order of operations.
When carrying out calculations in excel, if we don't bracket certain operations, excel will use the order of operation called BODMAS to determine which operation to carry out first.
For example, if excel wants to solve 3 × 4 + 7 - 2;
The acronyms in BODMAS stand for;
B - Brackets
O - Orders (powers/indices or roots)
D - Division
M - Multiplication
A - Addition
S - Subtraction
Now, it means that the first action it will perform is Bracket while the last will be subtraction.
In our example, excel will first use the multiplication sign to get;
(3 * 4) = 12
Then addition; 12 + 7 = 19
Then subtraction; 19 - 2 = 17
Read more on BODMAS at; https://brainly.com/question/16788360
Write a program to output 3 lines of text with the following information:
Student's first and last name:
Class:
Born in:
Answer
Answer:
C LANG
#include <stdio.h>
// function main begins program execution
int main( void )
{
printf( "student's first name" );
} // end function main
PYTHON
student's name=''
born_date=''
class=''
print ('')
Explanation:
create an sql database rows and Columns then use sql commands to call any specific data if so :
(you have a complet database of students data)
SELECT born_date
FROM students
//(Call all students born_date )
//you can specify
********,*********
to create an sql table
CREATE TABLE students (
name char,
born_date int,
class int,
);
Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system.
Answer: Open-source CRM
All variables are----------------------------------------------- help please
Answer:
variables are any characteristics that can take on different values, such as height, age, species I think
Answer
A variable basically works as a "placeholder" for anything that might change a majority of the time.
Examples
In science one may call a factor in a experiment that is subject to change a variable.
In math the term is used for a symbol that we do not know yet, such as x or y. Typically in math a variable is a letter.
In computer programming, variables are used to store information to be referenced and used by a computer program. They do give a way of naming data with a descriptive name as well so programs can be understood more clearly. When you go to assign values to the "variable" you are basically assigning individual variables such as the ones above in a way.
Try to crack the code:
00110111 01001010 00110011 01011001 00111001 00100000 00110010 01001100 01000010 00110110 01000101 00100000 00110110 01001000 01010001 01010011 01001010
Answer:001101110010010100011011010110010011100100100000001100100100110001000010001101100100010100100000001101100100100001010001010101001101001010
Explanation:
i copied