Answer:
ang hrap nmn nyan
Explanation:
poede po
What do we call any element within a computer program, such as a computer game, which simulated decision-making based on algorithms defined by game designers and programmers?
non-player characters (NPCs)
artificial intelligence (AI)
avatar
roguelikes
Answer:
AI - Artificial Intelligence
Explanation:
A computer game allows a player to repeat a level until they run out of lives. Which two of the following loops would work correctly?
Answer:
c.
Explanation:
because this is the right syntax for the following loops
Which type of security is specifically concerned with computers or devices that are part of a network infrastructure
Answer:
Ransomware
Explanation:
"Ransomware is malicious software that threatens to reveal sensitive data or prevent access to your files/systems until you pay a ransom payment within a set timeframe."
A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called
A web-based program that uses artificial intelligence (AI) techniques to automate tasks such as web searches is called a: bot.
Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which involves the process of using computer algorithms to build a smart computer-controlled robot that is capable of automatically performing and handling tasks that are exclusively designed to be performed by humans or using human intelligence.
In the field of artificial intelligence (AI), a bot is an abbreviation for robot.
A bot is a web-based software program that assists an end user, or acts on his or her behalf, in the automatic performance of repetitive computer-related tasks such as web searches.
Read more: https://brainly.com/question/21656851
A client is looking to maximize value from its Cloud investments by baselining, profiling, and prioritizing its human capital needs.Which myNav module will help this client?
myNav is to be present inn the Accenture software. It aim is to helps companies manage the human, technology and business dimensions of cloud change. The myNav module that will help this client is Cloud Advisor.
Cloud Advisor is simply known to be one of the many modules within the myNav platform. It was set up to handle the difficulties of cloud for digital transformation.
These Advisors are known worldwide community of technical resources. They have a thorough knowledge of cloud technologies and practices.
Their mission is to know the trends, regulatory implications, and our clients' needs so as to help them to set goals and create plans to achieve their desired outcome.
Learn more from
https://brainly.com/question/24918185
You often travel away from the office. While traveling, you would like to use your laptop computer to connect directly to a server in your office and access files. You want the connection to be as secure as possible. Which type of connection do you need
Answer:
You will use a secure connection
Explanation:
You need VPN so that your IP cant be tracked which will help hackers to find you
A secured connection is a connection which is encrypted and secure the data from both the ends. A VPN (Virtual Private Network) is a secured connection.
What is Secured connection?A secured connection is a connection that is encrypted by one or more security protocols to ensure the data security which is flowing between two or more ends.
A secured connection can help someone from stealing or changing information that has been sent online. To create a secured connection, the device and website's server use an SSL protocol. SSL protocol is a set of encryption rules that both computers understand and keep the data secured.
VPN stands for "Virtual Private Network". It is used for the opportunity to establish a protected network connection when using public networks. VPNs encrypt the internet traffic and disguise online identity of an individual. This makes it more difficult for third parties to track the activities online and steal data of an individual.
Learn more about Secured connection here:
https://brainly.com/question/25556545
#SPJ2
EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.
Electronic data interchange (EDI), e-cash, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).
In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.
Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.
In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:
Electronic data interchange (EDI).e-cash. Smart cards.Digital certificates.Read more: https://brainly.com/question/24112967
How do you calculate the file size of a text file?
Answer:
It is calculated by multiplying the surface area of a document (height x width) to be scanned by the bit depth and the dpi2. Because image file size is represented in bytes, which are made up of 8 bits, divide this figure by 8.
what is the most common size for footings for an 8 inch foundation
Answer:
#4 rods at 12 inches o.c.
Explanation:
What core components are involved with all games?
Player actions, humor, rewards, coins
Player goals and actions, rules, challenges
Challenges, riddles, mind-benders, tasks
Injury, re-birth, rules, questions
Answer:
B.) Player goals and actions, rules, challenges
Explanation:
If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account
A lot of services are being provided over the Internet. If you do not want to use your Internet service provider (ISP) for your email account, you can you acquire a webmail account through online services
An online service is simply known as body that gives access to various types of data for different uses through the use of the the Internet.Examples are: online banking, news, shopping, social media networks, e-mail etc.
This services done online gives an avenue in which subscribers can communicate with one another via exchanging e- mail messages or through online conferences or forums.
Learn more from
https://brainly.com/question/9930336
How to test nativeelement in angular.
Answer:
Dim or Overly Bright Lights. ...
Dead Battery. ...
Slow or Malfunctioning Accessories. ...
Trouble Starting or Frequent Stalling. ...
Growling or Whining Noises. ...
Smell of Burning Rubber or Wires. ...
Battery Warning Light on Dash.
Explanation:
make sure you check
The Internet provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML.
Answer:world wide wev
Explanation:
how important are operating system in our devices?
Beyond restoring normal operations and data, what else should be done during the recovery phase?.
Based on troubleshooting management, beyond restoring normal operations and data, one should correct the underlying root cause during the recovery phase.
The need for correcting the underlying root cause.During the restoration of normal operations and data, it is essential to correct the root cause of the problem.
By correcting the root cause of the operational problem, will limit the chance of the problem recurring.
Also, correcting the root cause of the problem will make the operations free completely of any possible malicious issue.
Hence, in this case, it is concluded that the correct answer is "correct the underlying root cause during the recovery phase."
Learn more about Restoration of operation here: https://brainly.com/question/6983264
Help PLEASE ILL MARK as brainlest
Answer:
computer animation (3d)
THE BONUS QUESTION PART FOUR:
what is the most popular game that's lived for soo long
Answer:
Senet
Explanation:
RSA encryption relies on
_____. Select 4 options.
the use of prime numbers
the system time
a public key that the server and the user's computer know
a private key that only the server knows
the difficulty in factoring large numbers
Answer:
the difficulty in factoring large numbers
a public key that the server and the user’s computer know
the use of prime numbers
a private key that only the server knows
Explanation:
ege 2021
RSA encryption relies on a private key that only the server knows. Option C is correct.
What is RSA?RSA is a kind of asymmetric encryption that employs two distinct but linked keys. A communication can be encrypted using both the public and private keys in RSA cryptography. To decrypt a message, use the opposite key that was used to encrypt it.
The RSA algorithm is the foundation of a cryptosystem (a collection of cryptographic algorithms used for specific security services or purposes) that enables public key encryption and is widely used to secure sensitive data, especially when it is sent over an insecure network.
Therefore, option C is correct.
Learn more about the RSA, refer to:
https://brainly.com/question/14319307
#SPJ2
Diane changes the size of an image with the format picture pane and keeps the original ratio of height to width of the object. What has Diane done to the image?
chose D. she scaled, got 100%
Answer:
it's d.
Explanation: post protected
In the context of object-oriented programming a(n) is a template for a group of objects with similar characteristics.
A class is a template for a group of objects with similar characteristics.
An object-oriented programming uses objects, instead of functions and logic to model software designs.
In an object-oriented programming, there are:
ObjectsClassesMethodsEtcObjects are what make up the object-oriented programming.
Similar objects are grouped together into classes
Hence, the text that completes the blank is class
Read more about object-oriented programming at:
https://brainly.com/question/22530356
How to set encapsulation angular component.
Answer: anyone know?
Explanation:
___1. What is the first thing you should do if you received a package?
a. count the number of items c. accept it immediately then leave
b. check out the whole package d. check for the delivery receipt
________2. What should you do with the copy of your request for inspection?
a. return to the delivery man c. dispose it immediately
b. keep the copy of your request letter d. do not accept the letter
________3. What form is used to request for tools and equipment to be used for a
particular job written instruction to perform a work?
a. job order / order forms c. inventory of Materials forms
b. borrower’s forms d. purchase requisition
what is an operating system that controls some aspects of the computer?
(not very well phrased, ik, it's coming from a crossword for one of my classes assigned as a snow day thing. looking for a seven letter word)
central processing unit (CPU), computer memory, file storage, input/output (I/O) devices, and network connections.
Answer: Windows
Explanation:
examples of operating systems include
windows
mac
linux
windows has seven letters
A customer reached out via Twitter Direct Message to your company, looking for support with a complex issue. A co-worker was already helping that user but is away on vacation. Which Hootsuite feature would be best to respond with?
The Hootsuite platform provides tools that enable a person to manage his social media activities in one spot. The Hootsuite feature that would be best to respond with given the above scenario is;
Hootsuite inboxUsing the Hootsuite inbox, a user can access the private and public conversations between a former user and a client.
You can see the post that prompted the customer to speak with the organization's representative.
After reading through the conversations, you can reply the client and take any step that is required of you.
Learn more here:
https://brainly.com/question/15321261
3 out of 5 citizens were eligible to vote 180 actually voted
Answer:
What is the question.
Explanation:
Answers:
Either 108/180
or 180/300
Depending on question since I dont know what ur asking
Independence Day celebration in school paragraph
Answer:
We celebrated the Independence day in our school compound, with great pump and show. The school building and the ground were cleaned and decorated for the occasion. A flag pole was put up at the top of the school building. The seating arrangement was made on the platform
Explanation:
please Mark my answer in brainlist
You want to connect an external hard drive for backups. Which is the fastest connection used by current external hard drives
Answer:
thunderbold proly
Explanation:
shang chi Critique (6-8 sentences)
Explanation:
.......................
Which tcp/ip utility gives you the following output?.
Answer:
Nbstat -c is the correct answer.
The TCP/IP utility gives you the following output is nbtstat -c. The correct option is b.
What is TCP/IP utility?TCP/IP provides end-to-end communications that specify how data should be divided into packets, addressed, transmitted, routed, and received at the destination. This defines how data is exchanged over the internet.
The TCP/IP model has four layers: application, network access, internet, and transport. These layers function as a set of protocols when combined.
When a user sends data through these layers, the TCP/IP model does so in a specific order and then does so again in the opposite order when the data is received.
Therefore, the correct option is b, nbtstat -c.
To learn more about TCP/IP utility, refer to the below link:
https://brainly.com/question/29912510
#SPJ12
The question is incomplete. Your most probably complete question is given below:
netstat -r
nbtstat -c
netstat -a.
Arp -a.
What type of programing code do game developers use.
Explanation:
object oriented programming languages like C#, C++, Java are used by developers to develop a game.