1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
9

Can you please help me with Learning Binary Code to program games?

Computers and Technology
2 answers:
Alexeev081 [22]3 years ago
8 0
You can't use a binary code for games. However, you might be aware of the game APA guidelines, which will help you program games in the html format etc. 
cluponka [151]3 years ago
4 0
Hi There!

Binary Coding is not for games! If you want to learn coding go on a website called codeacademy!

Hope This Helps!

You might be interested in
There are ____ standard colors for text in a theme.
soldier1979 [14.2K]
In microsoft powerpoint there are 2 or two standard colors for text in a theme. If you use a theme on your presentation, a theme is always equipped with two types of colors for the text, because it gives you more options on what color suits your text and blends with the theme perfectly.
7 0
4 years ago
You should structure the first before you search for a relevant picture.
Zarrin [17]
No, I believe it is "You should use proper grammar when asking a question".
6 0
3 years ago
What is the difference between a 13 column abacus and 5 column abacus?
Pepsi [2]

Answer:  The difference between these two types of abaci are the number the beads.

Explanation:

have a great day or night

4 0
3 years ago
Between which zones and a DMZ should firewalls be placed? Choose two answers.
brilliants [131]

Answer:

Internal and External Zones

Explanation:

Demilitarized Zone (DMZ) in a network means that, we make sure the security of network at higher level as military make sure the security of their bases or zones.

In this type of network, The network of the internal organization (LAN) needs security from hackers and unauthorized users who are trying to access the resources and information from the network.

This network is divided into two major zones. A DMZ has been placed between two zones along with firewalls enhance the security of LAN Network from the networks on internet. These two zones are named as Internal and External Zone. The firewall between DMZ and External zones monitors the users from external networks on the internet who tries to access organization's network. Internal network monitors the traffic between DMZ and Internal LAN network.

4 0
4 years ago
Disadvantage do you think one can have if he or she does use electronic media
Dima020 [189]
- discontinuity
- dependence on the electric power
and more
6 0
3 years ago
Other questions:
  • To download a webpage, the web browser copies files and transfer them to your ____
    14·2 answers
  • In which setting would you be least likely to find a full-time A/V technician?
    5·2 answers
  • Which task manager tab provides details about how a program uses system resources?
    14·1 answer
  • What is the capture of transaction and event information using technology to (1) process the information according to defined bu
    13·1 answer
  • Which button, when pressed, allows light from the subject to fall on the sensor?
    8·1 answer
  • Print "Censored" if userInput contains the word "darn", else print userInput. End with newline. Ex: If userInput is "That darn c
    5·1 answer
  • Before becoming romantically involved with a coworker you should
    7·2 answers
  • 30 points) Suppose you are given a string containing only the characters ( and ). In this problem, you will write a function to
    14·1 answer
  • Which process could you use to add a table to a document?
    14·1 answer
  • Complete the function favoriteFlower(). Note that the program will not run as is because the function is incomplete. The purpose
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!