1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
2 years ago
6

Which two features could be added to a game using an "if () then " block

Computers and Technology
1 answer:
mafiozo [28]2 years ago
3 0

The two features could be added to a game using an "if () then " block are:

  • Using nested If Then blocks.
  • Checks the specific Bid quantity for the instrument.

<h3>What does the If Then block mean?</h3>

The If Then block is known to be the outputs one of  a given two values, that is as a result of  the value of a Boolean input.

Note that  the input value  is very important and as such, The two features could be added to a game using an "if () then " block are:

  • Using nested If Then blocks.
  • Checks the specific Bid quantity for the instrument.

Learn more about game  from

brainly.com/question/1786465

#SPJ1

You might be interested in
A popular encryption method used to protect data that travel over a wireless network is ___
ddd [48]

Answer:

The most serious threat to offshore industrial systems is external access to control systems. Unwanted access to the human/machine interface (HMI) can allow third parties full control of a system. Zybersafe provides protection of the integrity of data that traverses the Ethernet connection between a company’s headquarters and a remote system.

4 0
3 years ago
The int function can convert floating-point values to integers, and it performs rounding up/down as needed.
omeli [17]

Answer:

Thks is true the int function changes a float value to an integer and will round up or down by default.

5 0
2 years ago
IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Vadim26 [7]

Answer: true

Explanation: true

6 0
3 years ago
A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated
julia-pushkina [17]
Botnet Trojan. Hopefully that’s helpful :)
5 0
3 years ago
Which item can you add using the tag?
Svetllana [295]

Answer:

an image

Explanation:

good luck have a nice day

3 0
3 years ago
Read 2 more answers
Other questions:
  • What were precomputed tables and why were they necessary?​
    12·2 answers
  • ____________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs
    6·2 answers
  • How to tell if motherboard has bluetooth?
    8·1 answer
  • You should process the tokens by taking the first letter of every fifth word,starting with the first word in the file. Convert t
    12·1 answer
  • Which of the following are not parts of a message? Select all that apply.
    12·1 answer
  • Assume that an array of integers named a that contains exactly five elements has been declared and initialized. Write a single s
    15·1 answer
  • When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was runn
    9·1 answer
  • Information technology has powerful effects on social behavior. Which of the following issues should NOT be expected when intera
    11·1 answer
  • I dont uderstand dis my teacher no helping pls help me i need to understand TEch
    10·1 answer
  • How did transistors revolutionize the world of computers?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!