1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
9

Which of the following is not a programmer role

Computers and Technology
2 answers:
lord [1]3 years ago
4 0
Animation Programmer


In this situation, the subject of "Game Creation", has nothing to do with animations, that would be the work of the animation team. A programmer would be the one programming the tools, the AI, and even the graphics, but not the animations.

Good Luck!
jasenka [17]3 years ago
4 0

Hello!

I believe the one that is not a programmer is: Animation Programmer.

I hope you found this helpful! c:

You might be interested in
Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional
pantera1 [17]

Answer:

All of the above

Explanation:

6 0
3 years ago
What are possible consequences for cyberbullying?
BaLLatris [955]

Answer:

Possible consequences for cyber bullying include depression, isolation and illness

Explanation:

The reason for this is when a person is hurt there body tends to go through things to make them feel a certain way about things.

3 0
3 years ago
Read 2 more answers
Why does dns use udp instead of tcp? if a dns packet is lost, there is no automatic recovery. what are the consequences?
inysia [295]
<span>If a DNS packet using UDP is lost this problem must be handled at the application layer. If an answer is not received after some period of time the specific application may choose to resend the DNS query. I can go much more into detail but this should answer your question. If you need more detail just ask.</span>
6 0
3 years ago
PLATO: Select all the correct answers.
AnnZ [28]

Answer:

sending email  and low set up cost

Explanation:

The options are:

sending email

blocking multiple people to use the same file

low security

low set up cost

limited access to files

And generally, the universities look for sending mail option, and the low set up cost. They never look for blocking multiple people, low security, or limited access to the files. And hence, the correct options are as mentioned in the answer section.

6 0
3 years ago
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
2 years ago
Other questions:
  • A video games sell for $59.99..
    13·1 answer
  • The information gathering technique that enables the analyst to collect facts and opinions from a wide range of geographically d
    11·1 answer
  • Microsoft ________ is a cloud storage and file sharing service
    12·1 answer
  • To minimize the invasion of privacy, _____.a.organizations should not modify data once it is entered into an information systemb
    14·1 answer
  • 1. Multiple Choice(25 points) 1) 4’b1001 represents the following decimal number______________ a) 8 b) 9 c) 10 d) 11 2) The foll
    10·1 answer
  • To use an imported image, simply drag it from the desktop onto the stage. true or false
    15·2 answers
  • If we live 4000 meters from the fire hydrant, how many kilometers away do we live?
    6·2 answers
  • How can ICT be a tool in connecting all stakeholders in your community?
    5·1 answer
  • Memory of your familiar old e-mail password may block the recall of your new password. This illustrates
    8·1 answer
  • A switch to kernel mode, wherein the operating system performs some action before returning control to the originating process?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!