1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovangra [49]
2 years ago
7

To make the monster pace, you needed the monster to turn ___ degrees.

Computers and Technology
1 answer:
dangina [55]2 years ago
7 0

To make the monster pace, you needed the monster to turn <u>180 degrees</u>: option 2.

<h3>What is graphic design?</h3>

Graphic design refers to an artistic process that is used for the creation of either two-dimensional or three-dimensional art works and animations, especially through the use of special application software.

In Computer technology, objects can be designed and developed to move from one point to another based on a set of executable codes and parameters.

In this context, you needed the monster to turn <u>180 degrees</u> so as to enable it face a forward direction and then, allow it to pace or be in motion.

Read more on graphic design here: brainly.com/question/25299426

#SPJ1

You might be interested in
Impacto que ha tenido en la sociedad la educacion virtual​
iVinArrow [24]

Answer:

ʜᴏʟᴀ ɪᴅɪᴏᴛᴀ

ᴄᴏᴍᴏ ᴇsᴛᴀs

ᴇsᴛᴜᴘɪᴅᴏ

7 0
3 years ago
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
3 years ago
Suppose you have a program P and 90 percent of P can be parallelized, but 10 percent of P is inherently sequential and cannot be
EleoNora [17]

Answer:

Means no matter how many processors you use, speed up never increase from 10 times.

Explanation:

If a problem of size W has a serial component Ws,then performance using parallelism:

Using Amdahl's Law:

Tp = (W - Ws )/ N + Ws

Here, Ws = .1,

W - Ws = .9

Performance Tp = (.9 / N) + .1

---------------------------------------------------------

Speed Up = 1 / ( (.9 / N) + .1)

If N -> infinity, Speed Up <= 10

Means no matter how many processors you use, speed up never increase from 10 times.

5 0
3 years ago
The domain in an email message tells you the
Alexus [3.1K]
The type of service provider
8 0
3 years ago
Vkq-jnfi-uif se-x fun girls joi-n mee-t usin-g this cod_e​
liberstina [14]

Answer:

Why?

Explanation:

7 0
3 years ago
Other questions:
  • Chloe is building a kiosk-based Excel application. She wants to make some modifications to the screen elements in order to keep
    8·1 answer
  • Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
    9·1 answer
  • Suppose that a computer virus infects your computer and corrupts the files you were going to submit for your current homework as
    12·1 answer
  • According to Fourman, Informatics is _______________ with a very _____________ scope.
    5·2 answers
  • Your help will help me understand my answers by comparing to yours. Your kind contribution is very much appreciated.
    6·1 answer
  • Where do players resurrect if they have been destroyed in a game?
    13·1 answer
  • If your microwave oven is a computer, define its Operating System and User Interface.
    12·1 answer
  • State two function of protein in the body
    8·1 answer
  • Mark and his team are working on a project that is due for delivery in the next few days. The team is using project management t
    10·1 answer
  • Explain why the receptionist responded as indicated in the following scenario.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!