Games for which of these devices have the lowest graphical quality and computing requirements? ASAPP!!!!!
A. PDAs
B.handheld consoles
C. tablets
D.smartphones
E. feature phones

Answers

Answer 1

Answer: A. PDAs

Explanation:

Personal Digital Assistants (PDAs) allowed for a user to carry out computational tasks such as calendars and planning in the time before smartphones. They were extremely useful to business people.

They did not however, have the best graphics for running games. This meant that any games on a PDS would be of pretty low graphic quality and require low computing requirements as well.

Answer 2

Answer:

A - PDA

Explanation:

PLATO


Related Questions

PLEASE PLEASE HELP pleeeeeeeeeaaaase

Answers

Answer:

Truuuuuuueee

Explanation:

Plz give brainliest

Answer:

It's true

Explanation:

I just had the same question , ur welcome :)

What is the difference between a patent and a copyright?
A copyright protects inventions, a patent protects intellectual property.

B copyright protects intellectual property; a patent protects inventions.

C Copyrights are for music, and patents are for books.

D Patents are for books, and copyrights are for music.

Answers

Answer:b

Explanation:

The difference between a patent and a copyright is,

B) Copyright protects intellectual property; a patent protects inventions.

Given that,

To find the difference between a patent and a copyright.

We know that,

Copyrights primarily safeguard original works of authorship, such as literary, artistic, musical, or dramatic creations.

On the other hand, patents are granted to inventors to protect new and useful processes, machines, compositions of matter, or any new and inventive improvement thereof.

So, copyrights are more about creative expressions, like music and books, while patents are focused on protecting unique and innovative inventions.

Option B is true.

To learn more about copyright visit:

https://brainly.com/question/357686

#SPJ4

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing

Answers

Answer:

The right approach is Option b (volume testing).

Explanation:

A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.

Other options are not related to the given query. So the above is the right response.

ANSWER ALL QUESTIONS CORRECTLY PLEASE AND YOU WILL GET A BRAINLIEST AND 10+ POINTS!!!! I WOULD REALLY APPRECIATE IT

Through the use of ICT and emerging technology in todays world, a number of sectors have been affected (whether in a positive or negative way). Three sectors in which ICT has had an impact are the health care, education, and banking sector.
Define the term ICT?

List three ICT tools that are commonly used in the education system?


Identify two ways in which ICT has impacted the education sector?

Answers

Answer: uhm can u explain what ICT is so i can understand the questions pls when i whould gladly help :)

Explanation:

A man-in-the-middle attack or impersonation are likely to result in problems with

data availability.

data confidentiality.

data integrity.

data mining.

Answers

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

A man-in-the-middle attack or impersonation is likely to result in problems with data confidentiality. Thus, option B is correct.

What is a  man-in-the-middle attack?

A man-in-the-middle (MITM) attack is a broad name used whenever an abuser inserts himself into a conversation between a user and now an application. That will listen in on the conversation or to pretend to be one of the participants and create the impression that normal information-sharing is taking place.

Attacks compromise the integrity and confidentiality of exchanges, which exposes information, technology, and other things to malevolent use. Consider the threat if a hacker was able to remotely open an automatic door lock or deploy the airbags in a linked car.

Therefore, option B is the correct option.

Learn more about man-in-the-middle attack, here:

https://brainly.com/question/13014110

#SPJ6

Write a pseudocode algorithm that ask a user to enter three numbers. The program should calculate and print their average

Answers

Answer:

BEGIN

INPUT first_number, second_number, third_number

average = (first_number + second_number + third number)/ 3

PRINT average

END

Explanation:

That is the simplest answer one can create

What is Polymorphism in programming? Explain in your own words with examples.

Answers

Answer:

A computer program which can change on it's own, such as a polymorphic virus that is harder to detect. It can change it's own code to achieve the same goal but have a different structure.

Explanation:

Answer:

Polymorphism is a feature of object-oriented

programming languages that allows a specific routine to use variables of different types at different times. Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.

Explanation:

hope it helps

Write a JavaScript program to create a multiplication table for numbers 1 to 12 using a while loop. I’ll mark brainliest, thanks

Answers

Answer:

</p><p>

</p><p>days1(); // calling function days1()

</p><p>

</p><p>function  days1() // function days1

</p><p>

</p><p>{

</p><p>

</p><p>var  week = ["sunday ", "monday ", "tuesday "," wednesday"," thursday",

</p><p>

</p><p>"friday"," saturday"];

</p><p>

</p><p>var i;

</p><p>

</p><p>for (i=0;i<7;i++)  // iterating over the loop

</p><p>

</p><p>{  

</p><p>

</p><p>document.write(" The number of days in a week :" +</br>);

</p><p>

</p><p>document.write( week[i] + "</br>" );  // print the number of days

</p><p>

</p><p>}

</p><p>

</p><p>}

</p><p>

</p><p>

Output:

The number of days in a week :

sunday

monday

tuesday

wednesday

thursday

friday

saturday

Explanation:

In this program, we create a function days1().In this function, we declared an array i.e "  week " which will store the list of the days of the week. After that, we iterate the for loop and prints a list of the days of the week.

In python please!! Write the definition of a function named countPos that needs integer values from standard input until there are none left and returns the number that are positive. The function must not use a loop of any kind.

Answers

Answer:

Explanation:

The following code is written in Python it doesn't use any loops, instead it uses a recursive function in order to continue asking the user for the inputs and count the number of positive values. If anything other than a number is passed it automatically ends the program.

def countPos(number=input("Enter number: "), counter=0):

   try:

       number = int(number)

       if number > 0:

           counter += 1

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

       else:

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

   except:

       print(counter)

       print("Program Finished")

countPos()

Who is Carl Thompson?

Answers

Carl Thompson was a well know Jazz player back in the mid 1900s

Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.

Answers

Answer:

They are the same layer, only they are viewed through different conventions.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

On the other hand, the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer comprises of four (4) main layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

This ultimately implies that, the Open Systems Interconnection (OSI) Application Layer and the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer are the same layer, only they are made up of different number of layers and as such are viewed through different conventions.

Answer:

c

Explanation:

1) The Output of a computer can be seen on
b) Mouse
a) Monitor
c) Keyboard​

Answers

Answer:

Explanation:

Option B monitor is the correct answer

Answer:

ans is a

hello

myself swapna

z 1
-- = --
7 21
solve​

Answers

Answer:

[tex]z= \frac{1}{3}[/tex]

Explanation:

Given

[tex]\frac{z}{7} = \frac{1}{21}[/tex]

Required

Solve

[tex]\frac{z}{7} = \frac{1}{21}[/tex]

Multiply both sides by 7

[tex]7 * \frac{z}{7} = \frac{1}{21} * 7[/tex]

[tex]z= \frac{1}{21} * 7[/tex]

Rewrite as:

[tex]z= \frac{1 * 7}{21}[/tex]

[tex]z= \frac{7}{21}[/tex]

Simplify fraction

[tex]z= \frac{1}{3}[/tex]

We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the challenges you would face in such a scenario.

Answers

Answer:

Explanation:

Everything runs on the internet nowadays. Living without internet would bring many challenges. One of which would be difficulty making purchases. It is not always easy to find what you need close by which is why the majority of commerce nowadays is done through the internet. Another difficulty would be the lack of information, not being able to quickly search for something. Lastly, and probably the most important is the lack of communication. Without internet, you would lose contact with many loved ones around the world and would be limited to telephone communication.

Arranging a given set of data in ascending or descending order is ...................​

Answers

Explanation:

maybe it's answer is sorting

One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
A: capital gains on the investment will be taxed at a lower rate.
B: fees will not be charged by brokers for selling the investment.
C: money earned on the investment will be considered tax-free.
D: profits on the investment can be averaged over the length of time the investment
is held.

Answers

Answer:

A, Capital gains on the investment will be taxed at a lower rate.

Explanation:

omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!

what method of technical drawing uses converging lines?

Answers

The foundation of linear perspective is the concept of diminution, which states that objects appear to get smaller as they travel farther away from the observer.

What's a good illustration of linear perspective?

The seeming convergence of two parallel lines, particularly when looking at a lengthy section of two-lane highway, is an illustration of linear perspective. People who watch the highway in front of them have the impression that the lanes are converging at the horizon.

One kind of linear perspective is one point perspective. In a flat work of art, linear perspective creates the appearance of space and form by using lines to depict objects. It is a methodical method of drawing. One point perspective, which only uses one vanishing point, earns its name.

There are three forms of linear perspective. One point, two point and three point. When the vanishing point for the objects in your picture is close to the center of the scene, you have one point perspective, which is the simplest sort of perspective.

To learn more about linear perspective  refer to

https://brainly.com/question/22902116

#SPJ1

how important the role of valet and butler service in the hospitality

Answers

very important bc they help you with what you need.

Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest

Answers

Answer:

Explanation:

The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do

Answers

Answer:

Have them try again. If it still is wrong then maybe dont let them use the internet!

PLEASE HELP !!!!!!!!!!!!!
What is revising?

Answers

Answer:

Revision literally means to “see again,” to look at something from a fresh, critical perspective. It is an ongoing process of rethinking the paper: reconsidering your arguments, reviewing your evidence, refining your purpose, reorganizing your presentation, reviving stale prose.

Can you use 2 wireless keyboards and 2 wireless mouse on a dual monitor desktop without interfering with the other monitor ?

Answers

Answer:

I'm pretty sure this is not possible on Windows OS.

Explanation:

Two different monitors can work, as you probably know, but I don't think you can use separate keyboards and mice on the same machine.

What is the dark, sticky substance that forms when tobacco is burned?

Answers

Answer: Tar.

Explanation:

A chemical substance made when tobacco is burned. Tar contains most of the cancer-causing and other harmful chemicals found in tobacco smoke. When tobacco smoke is inhaled, the tar can form a sticky layer on the inside of the lungs.

About C header files of C programming

Answers

Answer:

A header file is a file with an extension. Which contains C function declarations and macro definitions to be shared between several source files. There are two types of header files: the files that the programmer writes and the files that come with your compiler.

Match each operating system drawback to its respective operating system.

1. more susceptible to viruses Linux. Operating System
2. fewer compatible applications Microsoft Windows Operating System
3. limited support system Apple Operating System

Answers

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

Answer:

1. Microsoft Windows is more susceptible to viruses

2. Mac OS X (Apple OS) has fewer compatible applications

3. Linux OS has a limited support system.

A DTP firm has published and printed fliers for an upcoming fundraising event. In which section of the flyer would you find the contact details of the DTP firm
A. Body
B. Credits
C. Navigation
D. Title

Answers

B.Credits at the end of the flyer

How is a high-level programming language compiled? (5 points)
O a
A binary interpreter is used to translate each line of code.

All lines of code are translated together and then executed at once.
ос
One line of code is translated and then executed before moving to the next line.
d
Six lines of code are translated and then executed before moving to the next set of six.

Answers

Answer:

A high-level language is a programming language that uses English and mathematical symbols in its instructions. To execute a program in a high-level language, it can be compiled or interpreted. A compiler translates the entire program written in a high-level language to machine language prior to execution. After the compiler translates the code into machine language, it is typically executed line-by-line.

Explanation:

Answer:

One line of code is translated and then executed before moving to the next line.

Kevin created a scene in an animation where he shows a leaf falling slowly. Which principle of animation did he follow in doing so? Kevin is using the principle of ____. This principle is proportional to the _____ of the objects displayed. Answers given for the first: Arcs, Timing, Staging Answers given for the second: Height, Length, Speed

Answers

Answer:

Kevin is using the principle of Timing. This principle is proportional to the Speed of the objects displayed.

Explanation:

Timing is one of the principles of animation wherein the speed of the movement of an object is controlled by the animator and made to harmonize with certain effects such as sounds. In an example of some projected balls we find that when getting to the peak, their movement is slower compared to when they are coming down.

Speed plays a key role here. This is similar to the slowly falling leaf. Speed and timing are major considerations. When paired with good sounds, the animation comes off better.

What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
The most common thing to share in Outlook is the calendar.
The Publish Online option is for users outside an organization.
Changing calendar permissions only changes what a user can see.
Publishing a calendar online will allow anyone in the world to see it.
The Share option opens an email message that sends the calendar link.
O Calendar sharing options include Email, Share, Publish Online, and Delegate.

Answers

Answer:

The characteristics of calendar sharing options in Outlook 2016 are;

1) The most common thing to share in Outlook is the calendar

2)  The Publish Online option is for users outside an organization

4) Publishing a calendar online will allow anyone in the world to see it

5) The Share option opens an email message that sends the calendar link

6) Calendar sharing options include Email, Share, Publish Online, Delegate

Explanation:

1) Sharing is used mostly by a group of people working on a given project

Items commonly shared in Microsoft Outlook includes email Folders calendars and address books (contacts)

Therefore, for people working on a project together, the most common thing to share in Microsoft Outlook 2016 is the calendar

2) The Publish Online option allows a user to make a calendar available to people outside the organization

3) The calendar sharing permissions are;

a) Who can view the date and time marked as busy

b) Who can view the location and titles of appointments

c) Who can view all the calendar details

d) Who can edit

e) Who can delegate

Therefore, changes in calendar permissions does not only change what the user can see

4) When publishing a calendar, a special URL is created that can be shared to people outside of an organization

A published calendar can be viewed by everyone that has the calendar link

Therefore, publishing a calendar online will allow anyone in the world to see it

5) When a calendar is shared, the person with which the calendar is shared will receive an invitation email for the invitee to accept with an "Open this Calendar" button

Therefore, the Share option opens an email message that sends the calendar link

6) Calendar sharing options includes

a) Sharing the calendar within the organization

b) Publishing a calendar to the web to share the calendar

c) A calendar can be shared in an email

d) Authority can be delegated to a particular calendar

Therefore, calendar sharing options include Email, Share, Publish Online, Delegate

1, 2, 3, 5

just did it

hi please help ASAP it's about html!​

Answers

Given :-

Create a HTML code for writing a web page for your school time-table.

Answer :-

<html>

<head>

<title> Time Table </title>

</head>

<hrcolor = "red">

<hrcolor = "blue">

<body>

<table><tr = "7"><md = "7"><Period 1_></table>

</body>

</html>

[tex] \\ [/tex]

Answered by - ItzMaster

Other Questions
Pls help me no links I am serious please help me with this Thats the passage help me Need help please!!!!!How did the atomic bomb end the war with Japan? ( 2 sentences minimum) What are the three parts of a neucleotide What does the story of Columbus and the Indians show us about how history gets written? Two- one foot rulers laid end to end on reach how many inches? complete the sentence. The Psalms are written as songs and? parables prayers histories Describe the competitive exclusion principle and its effects on competing species Steve built a square hamster pen that has a perimeter of 240 centimeters. ASAP NEED NOW! NO LINKS OR USING FOR POINTS OR YOU GET REPORTED!What are Ezra's personal feelings about, in the poem "Song" by Ezra Pound. help................ Find the circumference of the pizza. Round your answer to the nearest tenth. diameter 12 in. What is the purpose of the prologue of Romeo and Juliet? Select 3 options. - to introduce the audience to important characters- to inform the audience where the story takes place - to set up the central conflict between the families - to invoke feelings of sympathy in the audience - to lay out specific details about different plot points what is the mass of 0.083 moles of iron to the nearest tenth When given a word problem, what should you always do to better visualize the problem? What do you think about going back to school this month? Write a persuasive essay in support of your position. Make sure you write at least two paragraphs and include your position and supporting reasons.Think about what you will write before you begin writing.State your opinion clearly and give two or more reasons to support your opinion.The paragraphs should include at least three complete sentences.Check your writing for correct grammar, capital letters, punctuation, and spelling. IF PASSPORT is written as RCUURQTV, then how will BOOKLET be coded? How much would each orange weigh if the total weight of all the oranges were distributed equally? A $30 sweater is on sale for 20% off at Kohls. The same $30 sweater is on sale at Macy's for $5 OFF the price. What is the difference in sale prices between the two stores Which store has the sweater in the above question for the better price ?