1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brut [27]
2 years ago
6

What is the term used for the document that describes the scenes and sequence of a game?

Computers and Technology
1 answer:
Sunny_sXe [5.5K]2 years ago
8 0

Answer:

Option A

Explanation:

Game design document

You might be interested in
python This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defi
riadik2000 [5.3K]

Answer:

Check the explanation

Explanation:

arrow_base_height = int(input('Enter arrow base height:\n'))

arrow_base_width = int(input('Enter arrow base width:\n'))

arrow_head_width = arrow_base_width

while arrow_head_width <= arrow_base_width:

   arrow_head_width = int(input('Enter arrow head width:\n'))

print()

for i in range(arrow_base_height):

   for j in range(arrow_base_width):

       print('*', end='')

   print()

for i in range(arrow_head_width):

   for j in range(arrow_head_width-i):

       print('*', end='')

   print()

Kindly check the code output below.

5 0
3 years ago
Read 2 more answers
a marketing company is setting up a new office in the city. which type of contract should they sign for periodic maintenance of
True [87]

Answer:

The contract they had to sign was a computer maintenance contract with computer service providers.

Explanation:

<em>Why </em><em>do companies have to </em><em>maintain computers</em><em> regularly? </em>

Because of all the activities of the company at this time on average use applications from computers. With the maintenance of computers, the activities of the company will continue to run well.

There are two types of maintenance that can be carried out:

  • Hardware Maintenance
  • Software Maintenance

#AnswerForTrees

8 0
2 years ago
What is the oldest malware victor
arsen [322]

Answer:

The oldest malware vector was emails.

Explanation:

Websites were not widespread early on into the internet, however it was very easy to have a virus that uses an email contact list, where it can send itself to other email addresses and spread.

7 0
3 years ago
The sum of these 9 numbers is 36. 2, 2, 6, 2, 1, 8, 7, 5, 3 What is the mean of these 9 numbers?
fiasKO [112]

Answer:

4

Explanation:

The mean is the sum divided by the count of numbers, so 36/9 = 4

6 0
1 year ago
Read 2 more answers
One of the First-Generation Computer built in 1942 during the Second World War and fully utilized to compute Military Artillery
Temka [501]
ENIAC, in full Electronic Numerical Integrator and Computer, the first programmable general-purpose electronic digital computer, built during World War II by the United States. American physicist John Mauchly, American engineer J. Presper Eckert, Jr., and their colleagues at the Moore School of Electrical Engineering at the University of Pennsylvania led a government-funded project to build an all-electronic computer.

From Brittanica.com
7 0
2 years ago
Other questions:
  • 1.
    12·1 answer
  • Which term describes the order of arrangement of files and folders on a computer
    11·1 answer
  • What is the first computer ever made?????
    9·2 answers
  • What computer is designed to meet the computing needs of several people simultaneously in a small to medium-size business enviro
    5·1 answer
  • A powerboat is about to cross paths with a sailboat under sail. What should the powerboat do
    5·1 answer
  • My friend Leo wants to have an emergency plan for his final exams on University of Southern Algorithmville. He has N subjects to
    6·1 answer
  • Create a program that finds (n+1)! -factorial- of an integer n in C++.
    13·1 answer
  • What can i say back to my IT school lady?
    8·1 answer
  • Find the distance between the points.<br><br><br>(5,-2),(-6,-2)
    12·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!