There are a number of security risks associated with using the Internet. Name three of these risks For each, state why it is a risk and describe how the risk can be minimized. Security risk 1........ [1] Why it is a risk......... How to minimise the risk.......... [1​

Answers

Answer 1

The three risks was  computer virus , spyware and phishing.

How we can minimize risk?

Protecting the organisation from an expanding range of threats such as... hardware and software failure - such as power loss or data corruption - includes securing corporate systems, networks, and data as well as ensuring availability of systems and services, planning for disaster recovery and business continuity, complying with government regulations and license agreements, and managing risk.

Malicious software intended to obstruct computer operations is known as malware. Machine code known as viruses can replicate and move from one computer to another, frequently causing disruptions in computer operations.

Never leave anything unattended in an open location, a shared residence, or somewhere that could be seen by trespassers. Use physical locks or carry them around with you. Carry your laptop and other electronics in a discrete protective bag or case.

To learn more about malware refer to:

https://brainly.com/question/399317

#SPJ9


Related Questions

An array is called vanilla if all its elements are made up of the same digit. For example {1, 1,
11, 1111, 1111111} is a vanilla array because all its elements use only the digit 1.
However, the array {11, 101, 1111, 11111} is not a vanilla array because its elements
use the digits 0 and 1.
Write a program that reads a string from a user that represent array and check if its a vanilla
array. Otherwise it will print message as in the sample run shown below and should continue to
allow the user to enter values. The program will terminate only if the user press the "Enter" key
without entering any value. For example the '{1}' is a vanilla array since all elements use the
same digit. Where '{11, 22, 13, 34, 125}' array is not vanilla array becuase elements used 5
different digits.

Answers

Using the knowledge in computational language in JAVA it is possible to write the code that An array is called vanilla if all its elements are made up of the same digit.

Writting the code:

import java.util.Scanner;  

public class Main

{

public static void main(String[] args) {

   

   

   

    int n;  

Scanner sc=new Scanner(System.in);  

System.out.print("Enter the number of elements you want to store: ");  

//reading the number of elements from the that we want to enter  

n=sc.nextInt();  

//creates an array in the memory of length 10  

int[] array = new int[10];  

System.out.println("Enter the elements of the array: ");  

for(int i=0; i<n; i++)  

{  

//reading array elements from the user  

array[i]=sc.nextInt();  

}

System.out.println("Array elements is: ");  

for(int i=0; i<n; i++)  

{  

   System.out.print(array[i]+" ");  

} System.out.println("\n");  

int res=0;  

int t;

int k;

for(int i=0; i<n; i++)  

{  

  t=array[i];

  while(t>0)

  {

      k=t%10;

      t=t/10;

      if(k==0)

      {

          res=1;

          break;

      }

  }if(res==1)

  {System.out.println("False it is not vanilla array");  

      break;

  }

 

}if(res==0)

{

   System.out.println("True it is  vanilla array");  

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

difference between electronic and non electronic components

Answers

Answer:

The working principle of both of them are same, i.e., uses the electrical energy for doing work. The major difference between the electrical and electronic devices is that the electrical devices convert the electrical energy into the other form of energy like heat, light, sound, etc

Which is true about a gas? Choose the correct answer. Responses It changes to a liquid when it heats up. It changes to a liquid when it heats up. It takes up a definite amount of space. It takes up a definite amount of space. It takes up a definite amount of space but does not have a definite shape. It takes up a definite amount of space but does not have a definite shape. It does not take up a definite amount of space and does not have a definite shape. It does not take up a definite amount of space and does not have a definite shape.

Answers

A gas does not take up a definite amount of space and does not have a definite shape.

What are the properties of a gas?

There are four basic states of matter, with gas being one of them. A pure gas can be composed of single atoms, elemental molecules derived from a single type of atom, or complex molecules derived from a combination of atoms. There are many different pure gases in a gas mixture like air.

Three characteristics distinguish gas from liquids or solids they come from:

(1) they are easily compressed,

(2) they expand to fill their containers, and

(3) they take up a lot more area than solids or liquids.

To learn more about gas, use the link given
https://brainly.com/question/25649765
#SPJ9

What is variable view?

Answers

Answer:

Variable View contains descriptions of the attributes of each variable in the data file. In Variable View, rows are variables. Columns are variable attributes.

Explanation:

Data View is where we inspect our actual data and. Variable View is where we see additional information about our data.

Name two ways to store data

Answers

Answer:

Hard drives and solid-state drives

Explanation:

1. Write down a brief history about the internet.

Answers

Answer:

The Internet was developed by Bob Kahn and Vint Cerf in the 1970s. They began the design of what we today know as the 'internet. ' It was the result of another research experiment which was called ARPANET, which stands for Advanced Research Projects Agency Network.

Explanation:

Knowledge Review 3
Which of the following are characteristics of the core capabilities? (Select all that apply.)

Answers

Are distinct critical elements necessary to meet the National Preparedness goal.Are essential for the execution of each mission area: Prevention, Protection, Mitigation, Response, and Recovery.Provide a common language for preparedness across the whole community.

The above three are the characteristics of core capabilities.

What is National Response Framework?

The National Response Framework (NRF) is a guide to how the nation responds to all types of disasters and emergencies.

What are the main components of the National Response Framework?

Response doctrine is comprised of five key principles:

engaged partnershiptiered responsescalable, flexible, and adaptable operational capabilitiesunity of effort through the unified commandreadiness to act.

To know more about NRF:

https://brainly.com/question/13107467

#SPJ13

SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN
JAVA.
• Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
• Unless otherwise noted in the question, assume that parameters in method calls are not null and that methods are called only when their preconditions are satisfied.
• In writing solutions for each question, you may use any of the accessible methods that are listed in classes defined in that question. Writing significant amounts of code that can be replaced by a call to one of these methods will not receive full credit.
A manufacturer wants to keep track of the average of the ratings that have been submitted for an item using a running average. The algorithm for calculating a running average differs from the standard algorithm for calculating an average, as described in part (a).
A partial declaration of the RunningAverage class is shown below. You will write two methods of the RunningAverage class.
*
public class RunningAverage
{
}
/** The number of ratings included in the running average. private int count;
/** The average of the ratings that have been entered. */ private double average;
// There are no other instance variables.
/** Creates a RunningAverage object.
* Postcondition: count is initialized to 0 and average is
* initialized to 0.0.
*/
public RunningAverage()
{ /* implementation not shown */ }
/** Updates the running average to reflect the entry of a new
* rating, as described in part (a).
*/
public void updateAverage (double newVal)
{ /* to be implemented in part (a) */ }
/** Processes num new ratings by considering them for inclusion
* in the running average and updating the running average as
necessary. Returns an integer that represents the number of
*
* invalid ratings, as described in part (b).
* Precondition: num > 0
*/
public int processNewRatings (int num)
{ /* to be implemented in part (b) */ }
/** Returns a single numeric rating.
public double getNewRating()
{ /* implementation not shown */ }
(a) Write the method updateAverage, which updates the RunningAverage object to include a new rating. To update a running average, add the new rating to a calculated total, which is the number of ratings times the current running average. Divide the new total by the incremented count to obtain the new running
average.
For example, if there are 4 ratings with a current running average of 3.5, the calculated total is 4 times 3.5, or 14.0. When a fifth rating with a value of 6.0 is included, the new total becomes 20.0. The new running average is 20.0 divided by 5, or 4.0.
Complete method updateAverage.
/** Updates the running average to reflect the entry of a new
* rating, as described in part (a).
*/
public void updateAverage (double newVal)
(b) Write the processNewRatings method, which considers num new ratings for inclusion in the running average. A helper method, getNewRating, which returns a single rating, has been provided for you.
The running average must only be updated with ratings that are greater than or equal to zero. Ratings that are less than 0 are considered invalid and are not included in the running average.
The processNewRatings method returns the number of invalid ratings. See the table below for three examples of how calls to process NewRatings should work.
Statement
Ratings
processNewRatings
Generated
Return Value
processNewRatings (2)

2.5, 4.5
processNewRatings (1)
-2.0
1
0.0,
-2.2,
processNewRatings (4)
2
3.5, -1.5
Comments
Both new ratings are included
in the running average.
No new ratings are included in the running average.
Two new ratings (0.0 and 3.5) are included in the running
average.
Complete method processNewRatings. Assume that updateAverage works as specified, regardless of what you wrote in part (a). You must use getNewRating and updateAverage appropriately to receive full
credit.
/** Processes num new ratings by considering them for inclusion
* in the running average and updating the running average as
*
necessary. Returns an integer that represents the number of
* invalid ratings, as described in part (b).
* Precondition: num > 0
*/
public int processNewRatings (int num)

Answers

It’s g zzzzzzzzzzzzzzzzzzzzzzzz

A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?

Answers

Since the user launches an application on an Android device, the option that  is the cause of the issue is option (C) The application was not developed to react to changes to the gyroscope.

What is the gyroscope about?

The majority of Android devices have sensors available. One of them rotates the screen appropriately is the gyroscope.

Because the software or application is not set up to rotate in accordance with the gyroscope when the user runs an application on the tablet, the screen does not rotate when the tablet is turned by the user.

Therefore, The gyroscope keeps functioning properly by monitoring the rate of turn around one specific axis. An real value is determined when the rotations around an aircraft's roll axis are measured up until the item stabilizes.

Learn more about application from

https://brainly.com/question/24264599
#SPJ1

See full question below

A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?

(A) The auto-adjust setting is not enabled in the operating system.

(B) The tablet is running low on power and disabled landscape mode.

(C) The application was not developed to react to changes to the gyroscope.

(D) The user did not switch the tablet to landscape mode.

In reference to computers, what is a firewall?

A) letters, numbers, and special characters assigned to unlock accounts and websites
B) email attachments
C) an installed software element that protects and monitors incoming and outgoing data
D) a second copy of files saved to a cloud

Answers

Answer:

C) an installed software element that protects and monitors incoming and outgoing data

Explanation:

4.what the economic and ideological causes of the American, the French, and the Chinese Revolutions, and to see the larger historical contexts in which these events took place?

Answers

The economic and ideological causes of the American, French, and Chinese revolutions were the imposition of taxes, poor economic policies, and increasing imperialist demand, respectively.

The economic and ideological causes behind the American revolution:

The imposition of taxes on the colonies, which they refused to pay. The primary goal of levying a tax was to recoup the debt incurred by the colonists as a result of the war. The corrupt ideology drove this revolution.

The French revolutions' economic and ideological causes:

Poor economic policies that resulted in bankruptcies and the extravagant spending of France's royals resulted in the imposition of high taxes on the people. The Enlightenment, influenced by the British political system, was the ideological cause.

The economic and ideological causes of the Chinese revolution:

The major reasons for the revolution were increasing imperialist demand from the West and Japan, as well as the desire to see a unified China.

To know more about the American Revolution, visit: https://brainly.com/question/18317211

#SPJ1

with aid of two examples, describe the use of merging of docments

Answers

Answer:

Answer down below

Explanation:

Q's Asked: With the aid of two examples, describe the use of merging of documents.

------------------------------------------------------------------------------------------------------------

Explanation of "merging documents":

What is the use of merging of documents?

Well merging documents is really only used for organization or systems where documents/ data are changed by different users or systems.

Anyway The requirements for "mail merging" is :

(a) Main Document,

(b) Data Source,

(c) Merge Document.

: Meaning of A horizontal merger: A horizontal merger is when competing companies merge—companies that sell the same products or services.

: Meaning of A vertical merger: A vertical merger is a merger of companies with different products. :3

Welp anyway back to the Q's: With the aid of two examples, describe the use of merging of documents.Umm some people that use "merging of documents", are horizontal mergers which increase market share, such as Umm... T-moblie and sprit bc they are both a phone company. vertical mergers which exploit existing synergies.  So like ummm.... a sports drink company and a car company combining together. hope this helps ~~Wdfads~~~

What is the fee involved in order for a Worker to use Microworkers service?
$9
$1
$2
None, Microworkers id free

Answers

None, Microworkers id free there is no charge .

What are microworkers ?

A microworker is someone who undertakes and completes these tasks. Tasks are generally easy and don't require a lot of time or skill. Microwork is often used as a way to make extra money because it can be done in a short period of time and does not require a long-term commitment. There are many of his Microwork sites that provide tasks that workers can perform. These sites include Amazon Mechanical Turk, Microworkers, and Clickworker. In Clickworker, microworkers are called Clickworkers.

learn more about microworkers here :

brainly.com/question/20851831

#SPJ13

Write a method that takes two String
parameters, returns the number of times the
second string appears in the first string.
This method must be named
substringCount () and have two String
parameters. This method must return an
integer

Answers

A method that takes two String parameters, returns the number of times the second string appears in the first string.

public static int substringCount(String s1, String s2)
{
  int count = 0;
  int i = 0;
  while ((i = s1.indexOf(s2, i)) != -1)
  {
     count++;
     i += s2.length();
  }
  return count;
}

What is string?
A string is typically a sequence of characters in computer programming, either as a literal constant or as some sort of variable. The latter can either be fixed or its elements and length can be changed (after creation). A string is typically implemented as just an array data structure of bytes (or words) that stores a sequence of elements, typically characters, using some character encoding. A string is generally thought of as a type of data. A string can also represent other sequence(or list) data types and structures, such as more general arrays. A variable declared to be a string may cause memory storage to be statically allocated for just a predetermined maximum length or utilise dynamic allocation to allow this to hold a variable number of elements, depending on this same programming language and specific data type used.

To learn more about string
https://brainly.com/question/28290531
#SPJ13

Looking for similarities between concepts or problems is referred to as
an algorithm
Odecomposition
pattern recognition
abstraction

Answers

Pattern recognition is used  for similarities between concepts or problems in an algorithm.

What is meant by pattern recognition?

Pattern recognition is a data analysis method that uses machine learning algorithms to automatically recognize patterns and regularities in data. This data can be anything from text and images to sounds or other definable qualities. Pattern recognition systems can recognize familiar patterns quickly and accurately.

An example of pattern recognition is classification, which attempts to assign each input value to one of a given set of classes (for example, determine whether a given email is "spam" or "non-spam").

Therefore, Pattern recognition is used.

To know more about Pattern recognition from the given link

https://brainly.com/question/28427592

#SPJ1

How are additional slides added to presentations?

from the Drawing toolbar
by clicking on the New Slide icon
by selecting the New Slide option from the Insert menu
by selecting the New Slide option from the File menu

[ DO NOT REPLY FOR POINTS YOU WILL BE REPORTED ]
(multiple choice) (edgenuitу)

Answers

You are using PowerPoint? You are in luck! I am a PowerPoint master.

A. By clicking on the new slide option.

You can clearly see below that you have to click the new slide option

Which of the following could be considered an algorithm?


directions for assembling a bicycle


the pages in a book


a file system directory


an application
F

Answers

The best answer is an application

Consider this program on the picture attached:

(a) In what programming language is this program implemented?
(b) Why is this program correct? In other words, how does it work?
(c) In what way is the program poorly designed?

Answers

Answer:

a) Javascript

b) The program works because it iterates through an array and logs each array element into the console

c) It is poorly designed because depending on the array element value, the program will have to wait that many milliseconds before it logs and move on to the next element. This isn't good because the program may take a long time to execute if the array contains elements with large values.

Memory Management - Page fault and Page Thrashing
i) What is page fault?
ii) Describe the steps that take place after a page fault. Include both the actions taken within the handler and those that are taken in hardware before the handler is initiated. How segment defects might be found and treated should be mentioned in your response. Including diagrams may make it easier for you.
iii) What is page thrashing and how might it be avoided?

Answers

1) A page fault is an exception raised by the memory management unit when a process accesses a memory page without making the necessary preparations. To access the page, a mapping must be added to the process's virtual address space.

2) Once the virtual address that produced the page fault is determined, the system verifies that the address is genuine and that there is no protection access problem. If the virtual address is legitimate, the system determines if a page frame is available. If no frames are available, the page replacement procedure is used to delete a page.

3) Thrashing occurs when the page fault and switching occur at a higher frequency, requiring the operating system to spend more time exchanging these pages. This is referred to as thrashing in the operating system. The CPU utilization will be lowered or nonexistent as a result of thrashing.

Eliminating one or more running programs is a temporary remedy for thrashing. Adding extra RAM to the main memory is one of the recommended strategies to minimize thrashing. Another option for dealing with thrashing is to increase the size of the swap file.

What is Memory Management?

Memory management is a type of resource management that is used to manage computer memory. Memory management must include mechanisms for dynamically allocating parts of memory to programs at their request and freeing it for reuse when no longer required.

Management is the method of regulating and coordinating computer memory by allocating parts known as blocks to various operating applications in order to maximize system performance. The primary memory management function of an operating system is the most critical.

Learn more about Page Faults:
https://brainly.com/question/28557805
#SPJ1

What are some examples of common watermarks? Check all that apply.
save
sample
draft
do not copy
open

Answers

The common Watermarks that can be applied are

1. Sample

2. Do not copy

3. Draft

What is watermark with example?

Watermarking is the process of superimposing a logo or piece of text atop a document or image file, and it's an important process when it comes to both the copyright protection and marketing of digital works.

There are two types of digital watermarking:

Visible Digital Watermarking:

Invisible Digital Watermarking:

Hence, Sample , Do not copy and Draft can be considered as Watermark

To know more about watermark from the given link

https://brainly.com/question/19709292

#SPJ4

All academic departments in a University keeps a database of its students. Students are classified into undergraduate, graduate, and international students. There are few reasons for grouping the students into these three categories. For example the department's secretary informs: the undergraduate students about new undergraduate courses offered, the graduate students about graduate courses and professional conferences and international students about new emigration laws.
i. Identify (if any) the subtypes of entity students.
ii. Identify a unique attribute (relationship) for each subtype.
iii. Draw an EER diagram for the department's database.​

Answers

The identification of subtypes of entity students may be done on the basis of students those who have taken courses on the basis of their educational qualifications.

What do you mean by the EER diagram?

The EER diagram stands for the Enhanced-entity-relationship diagram. This diagram provides a visual representation of the relationship among the tables in your model. The revisions that are made with the Model editor are significantly represented in the associated diagram.

According to the context of this question, the unique attribute (relationship) for each subtype is the classification of students based on the national and international characteristics of all courses.

The EER diagram is manipulated by the structural arrangement of the classification of the students on the basis of several characteristics.

To learn more about the EER diagram, refer to the link:

https://brainly.com/question/15183085

#SPJ1

What effect do coworkers have on the socialization of new employees?
O a
Coworkers potentially do all of these things.
Ob
Coworkers provide valuable support and information to newcomers.
Oc
Od
Coworkers have no benefit to the socialization process and should be separated from newcomers as much as possible.
By welcoming the newcomer to the team, coworkers tend to offer more job-related information to the newcomer.
Through social interaction, coworkers reduce the newcomer's stress during socialization.
Oe

Answers

Through social interaction, coworkers reduce the newcomer's stress during socialization. Thus option E is the correct answer.

What is socialization?

Socialization generally refers to the process of social influence through which a person acquires the culture or subculture of their group, and in the course of acquiring these cultural elements, the individual's self and personality are shaped.

Why is socialization important?

Socializing not only staves off feelings of loneliness, but also helps sharpen memory and cognitive skills increases your sense of happiness and well-being, and may even help you live longer.

How will you socialize new employees in your organization?

You can help socialize employees by encouraging after-work gatherings.

Thus, option E is the correct option.

To know more about socialization:
https://brainly.com/question/10455747
#SPJ1

which search algorithm uses three variables to mark positions within the array as it searches for the searchvalue?

Answers

A binary search algorithm that uses three variables to mark positions within the array as it searches for the searchvalue.

What is a binary search?

In Computer technology, a binary search simply refers to an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data that are stored on a database, especially by using the run-time complexity of Ο(logn)

Note: n is the total number of elements in a list.

Additionally, keywords and search operators are important variables (elements) that have a significant effect on search results. Therefore, searchvalue is a binary search algorithm that is designed and developed to make use of three (3) variables to mark positions within an array as it perform a searche operation.

Read more on binary search here: https://brainly.com/question/17180912

#SPJ1

Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.

Answers

A sample expression that uses Boolean operators that prints "Special number" if special_num is -99, 0, or 44 is given below:

The Program

import java.util.Scanner;

import java.io.*;

public class Test

{

   public static void main(String[]args) throws IOException

   {

       File file = new File("SNUMS.INP");

       Scanner inputFile = new Scanner(file);

       int order = 1;

       int i = 1;

      int[] special = new int[1000000+1];

       // Write all 10^6 special numbers into an array named "special"

       while (order <= 1000000)

       {

           if (specialNumber(i) == true)

           {

              special[order] = i;

               order++;

           }

           i++;

       }

       // Write the result to file

       PrintWriter outputFile = new PrintWriter("SNUMS.OUT");

       outputFile.println(special[inputFile.nextInt()]);

       while (inputFile.hasNext())

           outputFile.println(special[inputFile.nextInt()]);

       outputFile.close();

   }

   public static boolean specialNumber(int i)

   {

       // This method check whether the number is a special number

       boolean specialNumber = false;

      byte count=0;

       long sum=0;

       while (i != 0)

       {

           sum = sum + (i % 10);

           count++;

           i = i / 10;

       }

       if (sum % count == 0) return true;

       else return false;

    }

}

Read more about boolean operators here:

https://brainly.com/question/5029736

#SPJ1

(دانا
Physical appearance
OF Fith generation
computer

Answers

The physical appearance of the fifth-generation computers is VLSI architecture, parallel processing such as data flow control, and logic programming.

What are the generations of computers?

The phrase “generation” refers to a shift in the technology that a computer is/was using. The term “generation” was initially used to describe different hardware advancements.

These days, a computer system's generation involves both hardware and software. 5 Fifth Generation: The period of the fifth generation: 1980-onwards. ULSI microprocessor based.

Thus, fifth-generation computers have knowledge based on a relational database and applied artificial intelligence and pattern processing.

To learn more about Fifth generation computers, refer to the link:

https://brainly.com/question/9354047

#SPJ1


Why is the I/O subsystem called a subsystem?

Answers

The I/O subsystem manages all peripheral device communication with the central processor. Hardware such as disc drives, tape drives, and printers are examples of peripheral devices.

What is an IO subsystem?

The I/O subsystem manages all peripheral device communication with the central processor. Hardware such as disc drives, tape drives, and printers are examples of peripheral devices.

Between input handlers and input devices (such as a keyboard, mouse, joystick, and so on), the Input subsystem serves as an abstraction layer. The input devices provide input events by capturing inputs from user activities or from external sources. For instance, pressing a key causes an input event.

The kernel, an I/O subsystem based on the hardware and device-driver infrastructure, offers a number of functions including scheduling, caching, spooling, device reservation, and error handling. Additionally, the I/O subsystem is in charge of safeguarding itself against rogue programmes and malevolent users.

To learn more about i/o sub system refer to:

https://brainly.com/question/4274507

#SPJ1

The I/O subsystem manages all peripheral device communication with the central processor. Hardware such as disc drives, tape drives, and printers are examples of peripheral devices.

What is an IO subsystem?The I/O subsystem manages all peripheral device communication with the central processor. Hardware such as disc drives, tape drives, and printers are examples of peripheral devices.Between input handlers and input devices (such as a keyboard, mouse, joystick, and so on), the Input subsystem serves as an abstraction layer. The input devices provide input events by capturing inputs from user activities or from external sources. For instance, pressing a key causes an input event.The kernel, an I/O subsystem based on the hardware and device-driver infrastructure, offers a number of functions including scheduling, caching, spooling, device reservation, and error handling. Additionally, the I/O subsystem is in charge of safeguarding itself against rogue programmers and malevolent users.

To learn more about  I/O subsystem refer to:

https://brainly.com/question/20331489

#SPJ1

Which CPU sockets are supported by the motherboard and are the
least expensive? (Select two.)
17-975, 3.33 GHZ, 8MB Cache, LGA1366
AMD Phenom II X4 940 Black Edition
Intel Pentium 4 Processor 662
Intel Core 2 Duo Processor E6300
i7-930, 2.80 GHZ, 4MB Cache LGA1366

Answers

Answer:

Educated guess: The 662 and E6300, since the others are both i7. The 662 and E6300 are both socket LGA775.

Explanation:

The Intel Pentium and Core 2 lines are lower spec than Intel's i7 generations, so they must be cheaper. AMD is entirely different, and that Phenom II is AM2 socket type if I'm remembering correctly. This is all so dated. The E6300 there came out 16 years ago. That i7-930 is the most recent in the list and came out in 2010, 12 years ago.


What are progression mechanics? Why are they important for games?

Answers

The phrase "progression mechanics" in game design refers to video game mechanics where the creator establishes a path of action that a player must follow to advance in the game. The checkpoints that a character must achieve to move on to the next level are crucial to the progression of gameplay. The checkpoints change depending on the type of game. A few standard checkpoints are:

In action, adventure, and role-playing games, defeating the level boss (RPGs)achieving the third place on a certain track in racing gamescompleting a set of puzzles in a game of puzzlestaking down the enemy's base of operations in real-time strategy games

Most video games are developed using a progression gameplay concept. Designers like progression gaming because it enables them to build a compelling narrative around the game's action. Every game aims to be both engaging and enjoyable to play. Proponents of progression gameplay point out that because game creators are aware of the direction their creation will go in, they can create a far richer and more complex narrative around that direction.

On the other hand, proponents of emergent gameplay prefer games where player random acts have an unlimited number of potential results rather than a finite set of predetermined outcomes that are mapped out by designers. Of course, there is a lot of room for compromise between the two methods. Both emergent gameplay and progression are features found in many games.

Read more about game mechanics here:

https://brainly.com/question/24010467

4. Answer the following. a. Write the steps to create new presentation from Blank Presentation. How​

Answers

Create new presentation from a Blank Presentation using  PowerPoint by following these steps:

Launch PowerPoint.Select New from the left pane.

Select an option:

Choose Blank Presentation to start from scratch when creating a presentation.Choose one of the templates to use a ready-made design.To see PowerPoint tips, click Take a Tour, and then click Create.

With PowerPoint on your PC or on any device, you can:

Make a presentation from scratch or from a template.Text, images, art, and videos can all be added.Using PowerPoint Designer, choose a professional design.Include transitions, animations, and movement.Save your presentations to OneDrive so you can access them from your computer, tablet, or phone.Share and collaborate with others, no matter where they are.

To learn more about powerpoint presentations, visit: https://brainly.com/question/23714390

#SPJ9

(blank) affects the ability to query a database.

a. i/o performance
b. schema
c. Backup

Answers

Answer:

performance

Explanation:

Other Questions
allison has to design a device that converts energy between two different forms. she decides she wants to convert electrical energy into motion and sound. which invention should she model her design after? adenosine inhibits other neurons in the brain. specifically, it inhibits the release of excitatory neurotransmitters and decreases the effect of dopamine. during the day, adenosine levels rise, and adenosine acts on its receptor to inhibit other neurons. specifically, what effects would caffeine have? Which model of understanding personality emphasizes looking at specific characteristics of an individual in order to describe their personality and to predict behaviors?. Anyone have answers to 3.6 code practice on project stem, Python Fundamentals? Thanks in advance. Been struggling hard.Actual Question:Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far.Sample RunEnter a number: 9Smallest: 9Enter a number: 4Smallest: 4Enter a number: 10Smallest: 4Enter a number: 5Smallest: 4Enter a number: 3Smallest: 3Enter a number: 6Smallest: 3 The area of the rectangle shown is 44 m.Work out the missing length x. Explain how tocount thenumber of atomsin a moleculethat hasparentheses ()around it? A chemist wants to make 100.0 mL of a 4.0 M sodium hydroxide (NaOH) solution.Approximately what mass of NaOH is required to make the solution? How can the increase demand on water affect water quality How do the excerpts provided illustrate a change in the american view on the role of the national government during the period of 1750-1800? What does it mean if a iphone is renewed? an engineer is working on determining the speed limit for a curved stretch of road. she knows the coefficient of friction between the wheels and the road is 0.7 when the road is dry and 0.3 when the road is wet. she also knows that the mass of the vehicle does not matter, but completes her calculations for a 700kg car. in order to set a speed limit that is safe under any conditions, should she perform her calculations with the coefficient of friction for wet or dry pavement? A car traveled 120 miles in 2.5 hours the line represents that relationship between the distance travels and the time it took. The point 1,48 is on the line. you are saving for retirement. to live comfortably, you decide you will need to save $2 million by the time you are 55. today is your 20th birthday, and you decide, starting today and continuing on every birthday up to and including your 55th birthday, that you will put the same amount into a savings account. if the interest rate is 3.5%, how much must you set aside each year to ensure that you will have $2 million in the account on your 55th birthday? group of answer choices $28,982.31 x-12.5=95 ''solve'' .................. Antoinette spends 3 hours reading each day.What is the total amount of time (in hours) thatAntoinette spent reading after 6 days? Ahlee i riding her bike to the beach. If the beach i 17 mile from her home, and he ha already travelled 3/5 of the way, how much farther doe he have to cycle? The graph below illustrates the decay of a radioactive substance over t days.Use the graph to estimate the average decay rate from t = 5 to t = 15 Note: Your answer will be negative. Differentiate the function with respect to x. What is the product of the complex numbers below? 7-i / 3+i which of these amounts is NOT a required minimum insurance for Colorado's Financial Responsibility Law?a. $5,000 for parked vehiclesb. $15,000 Property damagec. $50,000 for bodily injury to two or more persons in any one accidentd. $25,000 for bodily injury to one person in any one accident