Choose a video game that you enjoy playing and discuss its game mechanics. Can you identify any game mechanics that your game has that were not mentioned in the unit?

Answers

Answer 1

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

Explanation:

meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow em


Related Questions

A file contains 5000 bytes. Calculate the size of the file in kilobytes.
Your answer must be to one decimal place

You should show your working.

Answers

Answer:

5 Kilobytes

Explanation:

5000 bytes ÷ 1000 = 5 kilobytes

what are the 4 types of satellite?​

Answers

Communications Satellite.

Remote Sensing Satellite.

Drone Satellite.

Ground Satellite.

What type of access controls allow the owner of a file to grant other users access to it using an access control list

Answers

Answer:

Discretionary Access Control

Explanation:

The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control.

What is discretionary access control?

This is known to be a type of control that gives one a specific amount of access control to the use of the object's owner, or any other person.

Note that The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control as it only gives a little access.

Learn more about Discretionary Access from

https://brainly.com/question/20038736

#SPJ2

How to edit an existing recipient list? class 9 for(3 marks)​

Answers

Answer:

(Archives) Microsoft Word 2003: Mail Merge: Working with the Recipient List

Last updated Monday, Aug. 31, 2020, at 10:35 a.m.

This article is based on legacy software.

For a successful Mail Merge, you will need to establish a recipient list, also referred to as the data source. This contains the information that will vary with each record, such as names or identification numbers. If you are creating a mailing list, for example, names and addresses will be included in your data source.

You can either create a new data source or use a pre-existing source, such as your Outlook Contacts. You may also wish to alter the entries in your data source without having to open it, change the appropriate entries, and then save the changes. Mail Merge allows you to specify which individual entries you want to include as well as add and delete data document entries and fields.

Creating a New Data Source

Before creating the data document, take a moment to plan out the information you want to include. While creating your data document, you can add or remove fields to tailor the document to suit your needs. Creating a new data source is an option in the third step of the Mail Merge Wizard.

State one technique for overcoming external fragmentation in dynamic partitioning. Why is this technique of overcoming external fragmentation considered inefficient

Answers

Compaction often gives solutions to the issues regarding external fragmentation.

One technique for overcoming external fragmentation in dynamic partitioning is

Compaction.

The reason why this technique of overcoming external fragmentation may be inefficient is because:

External fragmentation may need a lot of compaction and it is an expensive operation.

The use of contiguous allocation is often hard to fit processes into memory and also it is so difficult to grow or shrink the amount of memory allocated to a process.

Compaction only takes place when relocation is dynamic, and this also is expensive.

Compaction often shuffle memory notes or contents and then put or pile them up all in free memory and in one large block.

External fragmentation takes place when free memory is removed into small blocks.

Learn more from

https://brainly.com/question/23636593

Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders

Answers

Change the perms to be you not trustedinstaler

You want to kill all process IDs of a specific process with a single command. Which command should you use

Answers

Answer:

killall

Explanation:

3
Select the correct answer.
Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use to
present the model at a board meeting?

Answers

Answer:

he can use microosoft word, gooogle docs/slides, or any old tech because it will present from any

Explanation:

You are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Answers

Answer:

hYou are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Explanation:

to center data in a cell, click the ____ button on the ribbon.

Answers

To center data in a cell, click the center  button on the ribbon.

Data in a cell can be aligned either  horizontally or vertically .

For the  horizontal alignments, we have

against the left border, against the right border, and in the centre.

For the  vertical alignments, we have

against the top border, against the bottom border, and in the middle.

To center data, the following steps should be followed.

1.Click the cell where you want to center the data.  

2. Click "Home," then the small arrow in the bottom corner of the "Alignment" area of the ribbon.

3.Click the  drop-down box next to "Horizontal" and choose "Center." Do also for the "Vertical.

when trying to solve a problem, bret uses a logical, step-by-step formula called

Answers

The logical, step-by-step formula that Bret uses when trying to solve a problem is called an algorithm.

An algorithm refers to a standard formula (procedures) which comprises a set of finite steps or instructions that is typically used for solving a problem on a computer.

This ultimately implies that, an algorithm is a standard, logical formula containing the step-by-step rules for proffering a solution to a particular problem on a computer.

In this context, Bret uses a logical, step-by-step formula called an algorithm, when trying to solve a problem.

Read more on algorithm here: https://brainly.com/question/24793921

How do people get in your computer

Answers

Answer:

????

Explanation:

This is absurd, you cannot enter your computer. it is to tiny for you to fit in.

Answer:

Explanation:

I don’t know

You need to replace the motherboard on a laptop. Which two items should you disconnect or remove first

Answers

Your motherboard should now be freely floating in your case—pull it out. With the old motherboard free, you'll need to remove its CPU cooler, CPU, and RAM so you can install it into your new motherboard.

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat

Answers

Answer:

Evil Twins Attack

Explanation:

When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.

what is not an example of a changing operating space?

Answers

What is not an example of a changing operating space? A parking garage. Riley is driving down the highway when the road starts curving to the right.

Parking in garage is not an example of a changing operating space.

What is operating space?

When an operating space is said to be "changing," it usually means that the environment around your car is deteriorating or switching from an open to a closed state.

Operational Spaces are the space(s) inside the Facilities from which the Concessionaire shall have the right, privilege, and obligation to continuously and for the duration of the Term operate its concession in accordance with the terms and conditions of this Agreement.

Distractions while driving, such as texting and using a phone, driving dangerously, such as going too fast or following too closely.

Driving when intoxicated. While drinking and driving is not especially high among novices, it produces a disproportionate number of fatal crashes.

Thus, parking garage is the answer.

For more details regarding operating space, visit:

https://brainly.com/question/9339555

#SPJ6

What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;

Answers

Answer:

The output of count would be 1.

Explanation:

The first if statement is true. Since 10 > 5

The second if statement is true. Since 20 > 5

So,

count ++;  // That increments the variable count by 1

the else statement is not provoked since the if statements were correct.

7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​

Answers

Answer:

18

Explanation:

lets go step by step.

the function called tryIt has a value, a variable named "a". this "a" variable will be whatever the user enters when the program says, Enter a number.

ok so if we enter "a" as 2, and b in the function will always be 7, and 2 + 7 equals 9,

and the ans variable (short for answer) will take the result of the function (9) and multiply it by 2,

then the answer is 18

The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext

Answers

The answer is decryption

can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

yes cause you didn’t block them

What is row and column? class 9​

Answers

Answer:

just click the picture

Explanation:

plz mark me a BRAINLEST plss I just need it

Which Windows Server 2016 core technology provides a single interface for installing, configuring, and removing a variety of server roles and features on your Windows server

Answers

Answer:

Server manager

Explanation:

Which invention provided instant communication and information to a massive audience for the first time? a. Intranet c. Video b. Television d. Internet Please select the best answer from the choices provided A B C D.

Answers

Answer:

B. television

Explanation:

Answer:bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb

Explanation:

At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server.

State the type of computer system that is required for EACH of the following purposes..

Processing of scientific data ...........

Distribution of data over a network

Working from home .....

Answers

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

The computer that's needed for processing scientific data is the supercomputer.

The computer that is needed for the distribution of data over a network is the client or server computer while the computer that's needed for working from home is a laptop.

A supercomputer simply means a computer that has a high level of performance and has thousands of processors. The server computer provides functionality for other devices.

Learn more about computers on:

https://brainly.com/question/24540334

what is a drone satellite?​

Answers

Answer:

A satellite that can be controlled where to go.

Explanation:

what is a collection of web pages containing text images audio and videos.​

Answers

Answer: A website..?

4.10.4 Inventory codehs python
i have no idea on how tp fix this, pls help:(

Answers

Answer:

between line 23 and 24, add:

    if num > 0:

(and indent the next line)

Explanation:

You want to suppress the "Now we have 0 left" message, and an additional if statement will do that for you.

In this exercise we want to use computer and python knowledge to write the code correctly, so it is necessary to add the following to the informed code:

  if num > 0:

Want to suppress the "Now we have 0 left" message, and an additional so for that is necessary to put between line 23 and 24, the code:

   if num > 0:

See more about computer at brainly.com/question/950632

(NOT A AND B) AND (NOT A AND NOT C) OR (B AND C) logic Gates
draw the logic circuit​

Answers

answer:

((!A && B) && (!A && !C) || (B && C))

I hope the drawing is clear enough.

using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack

When you declare a method, you also need to provide the method ______________, which consists of statements that are executed when the method is called.

Answers

When you declare a method, you also need to provide the method body, which consists of statements that are executed when the method is called.

Hope this helps!

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

Other Questions
factorize1) x-4y2) 27-8y Root word , Prefixes , Suffixes Management estimates that 1% of the $100,000 of credit sales will be uncollectible. The Allowance for Doubtful Accounts has a $100 unadjusted debit balance. The adjusting entry to record estimated bad debts includes a ______. (Select all that apply.) can find anything to answer this Solve for the unknown angle stacie, who has a mass of 45 kg, starts down a slide that is inclined at an angle of 45 degree with the horizontal. If the coefficient of kinetic friction between stacie's shorts and the slide is 0.25, what is her acceleration State if the triangles are similar. If so, how do you know they are similar and complete the similaritystatementSTU ~ rhetoric in declaration of indepencence A packet of Hobnobs claims to be 24% bigger!!It now contains 31 biscuits. How many did it have before? . At a certain airport, 75% of the flights arrive on time. A sample of 10 flights is studied. a. Find the probability that all 10 of the flights were on time. 15 points Complete the sentences below with appropriate comparison words.l put15. Jaime es bajo Ignacio es aho. Ignacio esaltoJaime16. carolina es muy simpatica. carla tambien ed muy simpatica carla es simpatica carolina 17. Marta tiene seis aos. sara tiene ocho aos. Sara esque marta. some uses of sodium bicarbonate Can somebody do a summary of this?Nearly all people conform to most norms most of the time. People conformbecause through socialisation they have internalised the norms and values oftheir culture. There is a value consensus; nearly all people in a society agree onshared values, and also on the norms derived from them. Even criminals willoften disapprove of the actions of other criminals, which suggests that theyshare part of the overall value system. However, societies need to have ways ofensuring social conformity. All societies have ways of making their membersconform to norms. This is achieved by systems of sanctions. Positive sanctionsare often referred to as rewards and so sanctions usually mean negativesanctions (punishments).Informal social control is exercised by individuals and groups who do nothave any official power to do so. It includes, for example, any way in which youmight express disapproval of something your friends have done that you donot like. You might make a negative comment about them or refuse to speak tothem until they apologise. Informal social control can seem minor but is oftenvery effective. It can be exercised through glares and comments like 'that wasrude or expressions of anger or disgust. One common form of informal social control in peer groups of young people is ostracism or social rejection; that is, anindividual is excluded from the group and made aware that they are not welcome.Some types of informal social control are:shameridiculesarcasmcriticism.When informal social control does not work, then formal social control may beused. This needs to be done by someone who has authority in that situation, suchas a teacher, employer or police officer. Agencies of formal social control includethe police and the criminal justice system. They can impose a wide range of formalsanctions, such as fines and imprisonment.Agencies of social control are also agencies of socialisation. They pass onnorms and values but they are also able to make people conform. The main agenciesof social control are as follows.- Families. It is through primary socialisation in the family that children absorbnorms and values. The strong bonds between parents and children and theimpressionability of young children make this the most important period ofsocialisation. Children learn to regulate their own behaviour so as not to offendothers. They internalise values so that they feel guilt and remorse if they breaknorms that are based on them.- Schools. In the school system children are controlled in many ways. They are toldwhat to do and when, most of the time. Unit 5 explores the idea of the hiddencurriculum, which suggests that at school learning to obey the rules and conform toeducation is as significant for children as learning knowledge and skills.Religion. For those with religious beliefs, religions offer guidelines and laws for howto behave and offer both rewards and punishments for behaviour. The values of asociety are often based on the main religion.The media. The media offer role models as well as constant messages about how tobehave and reminders about rewards and punishments through offering examplesof good and bad behaviour, both in factual news reporting and in fiction.Workplaces. There are rules and regulations at places of work and other norms thatpeople may need to learn as they settle into a new job.- Peer groups. These are powerful agencies of social control because people feelthe need to belong to groups. The threat of being rejected is often a powerfulone. When we feel we have been pushed into behaving in ways that our peers willapprove of, this is called peer pressure.If these agencies fail to control behaviour then societies have more powerfulsanctions. The police and the criminal justice system can be used to enforce laws.Police forces are set up with the explicit purpose of social control. They are able touse coercion (force) when they decide it is necessary. By arresting and chargingpeople the police bring people into the criminal justice system where judges andjuries, acting on behalf of society, have the power to impose sanctions. The range ofsanctions available is discussed in Unit 6 on crime and deviance. In some countriesif it seems that the police are unable to control behaviour the armed forces may beused to do so. How do catalysts generally affect chemical reactions? A They increase the temperature of the system. B They increase the surface area of the reactants. C They increase the activation energy by introducing enzymes. D They lower the activation energy by providing an alternate pathway. Given log 102 = 0.3010 and log 103= 0.4771, find log 1049 without using a calculator. Please help i attached a link below to the graph Write the linear inequality shown in the graph. The gray area represents the shaded region.y x 4y x + 4y x 4y x + 4 please help me with this question as it's really important What relationship do you think bioterrorism and antidotes have to each other? Farmer Bob is planting a garden this spring. He wants to plant squash, pumpkins, corn, beans, andpotatoes. His plan for the field layout in feet is shown in the figure below. Use the figure and yourknowledge of polynomials, perimeter and area to solve the following questions.1. Write a polynomial expression that represents the area of the potato field.2. Simplify a polynomial expression that represents the area of the potato field.3. Explain why the calculated area would be useful to Farmer Bob. I NEED HELP IDENTIFYING THE STAGES!!! PLZ HELP!!! Interphase, Prophase, Metaphase, Anaphase, or Telophase