1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
netineya [11]
4 years ago
6

COMPUTER SCIENCE HELP!!!!!

Computers and Technology
1 answer:
maw [93]4 years ago
8 0
1.( I need to know what program this is for to answer this one)
2.Explain a game you played for this one and include a interactive element it had like a Side-quest/Npc/Cool Background ect.
3.For 3D games you have to worry about smoothing and lighting, as for 2D you have to worry about keeping the objects within the players POV as they are usually locked to character and stuck facing one direction.
4.???(need progam name)
5.If the game is based in a snow biome you would use snow landscape textures.
You might be interested in
"Save" or "save as" can be used interchangeably and have no unique features.<br> True<br> False
zimovet [89]

Answer:

False.

Explanation:

"save" just preserves any edits made to file in its current state. "Save As" lets you rename it and change the file type.

4 0
3 years ago
Read 2 more answers
Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
user100 [1]

Answer: Option (A) & (D) are correct.

Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.

An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.

7 0
3 years ago
A software-based _________ is dedicated to examining and blocking internet traffic.
igomit [66]

A software-based <u>Firewall</u> is dedicated to examining and blocking internet traffic.

7 0
3 years ago
Read 2 more answers
Chad, a computer programming student, just finished writing a computer program. In order to check whether the program performs t
dangina [55]
He'd need to use a compiler. 
3 0
3 years ago
Read 2 more answers
Please someone help!!!!
Montano1993 [528]

Answer:

do what the directions say and you should be able to figure out the answer if not contact me through brainly

Explanation:

3 0
3 years ago
Other questions:
  • What is something you can do to stay connected to the relationships in your life while we spend this time at home?
    13·1 answer
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can
    10·1 answer
  • Describe one type of technology that is useful in producing images from space.
    9·1 answer
  • Machine-to-machine (M2M) technology enables sensor-embedded products to share reliable real-time data ________.Select one:a. ove
    14·1 answer
  • An attacker tried to hack into the database of a reputed organization. The attacker inserted malicious code into the query of a
    14·1 answer
  • Is orange named after the fruit or of the color?
    9·1 answer
  • Which phrase best describes a scenario in Excel 2016?
    5·2 answers
  • In this lab, you use the flowchart and pseudocode found in the figures below to add code to a partially created C++ program. Whe
    9·1 answer
  • I need help now with YT
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!