1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
3 years ago
6

In a game with three frames, where will the objects on Layer 1 appear?

Computers and Technology
2 answers:
Ivan3 years ago
6 0
It’s between d or c
lara [203]3 years ago
4 0

Answer:

C. Behind everything else

Explanation:

In a game with three frames it is important to maintain balance and conformity, so that the three frames make sense together and establish a pleasant and aesthetically acceptable environment.

For the game to be harmonious it is important that the objects of Layer 1 appear behind everything else. However, this is not a rule that you have to follow to the letter, if your goal is not compliance and balance.

You might be interested in
Where is the typical location of a touchpad inside of a laptop?
butalik [34]

Answer:

Attached to the keyboard

Explanation:

Touch pad is the type of the mouse that is located on the laptop just near the keyboard or we can say that it is attached to the keyboard of the laptop. It has almost two buttons that are used for the purpose of Left and Right Click.

The touch pad is used to move the cursor to the required position on the screen of the laptop. This will work by just moving figure on the touch pad as the cursor move on the screen in the same direction of the finger..

5 0
3 years ago
Use the svd() function in matlab to compute a, the rank-1 approximation of a. clearly state what a, is, rounded to 4 decimal pla
PolarNik [594]

Using the knowledge in computational language in C code it is possible to write a code that organizes and calculates the value of the matrix of A*A and that is in up to 4 decimal places.

<h3>Writing the code in C is possible:</h3>

<em>A=[1 2 2;3 4 5;6 7 8];</em>

<em>[u ,s ,v] = svd(A);</em>

<em>k = 1;</em>

<em>A1 = u(:,1:k)*s(1:k,1:k)*v(:,1:k)'; %'</em>

<em>RMSE = rms(sqrt(mean((A - A1).^2)))</em>

See more about C code at brainly.com/question/17544466

#SPJ1

3 0
1 year ago
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
3 years ago
Whats important about the points?
likoan [24]
You can earn ranks! That is important.
8 0
3 years ago
Read 2 more answers
True/False: Each individual element of an array can be accessed by the array name and an element number, called a subscript. Tru
Dahasolnce [82]

Answer:

True

Explanation:

3 0
2 years ago
Other questions:
  • 4. Scientists are not concerned with the human impact on the environment. True or False?
    6·2 answers
  • Sulfur content is measured in
    11·1 answer
  • John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the dat
    10·1 answer
  • A _____ is a number that summarizes an encrypted information. digital certificate hash function message digest hash algorithm
    8·1 answer
  • Is it possible to have a deadlock involving only oneprocess? Explain your answer.
    11·1 answer
  • Taylor and Rory are hosting a party. They sent out invitations, and each one collected responses into dictionaries, with names o
    9·1 answer
  • Select three advantages of cloud computing.
    10·1 answer
  • Will, there be any presents this year
    15·1 answer
  • Compare mini and mainframe computer in terms of speed,memory and storage​
    15·1 answer
  • Post back maintains view state by assigning the form values to a hidden form field named ____.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!