1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OleMash [197]
3 years ago
11

Give an example of an app, website, or a game that used addictive design. Describe three features of addictive design it uses.

Computers and Technology
2 answers:
ruslelena [56]3 years ago
4 0

Answer:

Fortnite.

Explanation:

Fortnite uses a cartoonish type of design throughout the entire game, giving it a unique touch that no other game has.

1. It's cartoonish style.

2. It's emotes and fun dances.

3. Colorful gameplay.

Artist 52 [7]3 years ago
3 0
Angry Birds 2
Hope these will help you

You might be interested in
Some of the more important __________ include anti-virus (and anti-malware), host-based firewall, system hardening (removing unw
xeze [42]

Answer:

host-based security measures

Explanation:

Anti-virus, host-based firewall, system hardening, change control, and log management are host based.

6 0
3 years ago
What are motion graphics?
AysviL [449]
D)Animated abstract shapes
3 0
3 years ago
Which of the following statements are true?
grin007 [14]

Answer:

I think the answer are two which are B and C

7 0
3 years ago
20 POINTS!!!!!!!!!! will give brainliest
PilotLPTM [1.2K]

Answer:

Release

Explanation:

Founders Education

4 0
3 years ago
In designing input by clinicians for an EHR system, which of the following would be effective for a clinician when the data are
svetoff [14.1K]

Answer:

Speech recognition

Explanation:

Speech recognition would be effective for a clinician when data entry is fairly repetitive and the vocabulary used is fairly limited and over time it as become a replacement for other forms of dictation.

3 0
3 years ago
Other questions:
  • What protocol suite below is the most commonly used protocol for local area network (lan) communication?
    8·1 answer
  • A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify a
    11·1 answer
  • Was the type writer the first part of the keyboard? ​
    8·1 answer
  • In the cis configuration, the methyl groups are placed _____.
    8·2 answers
  • The measure of how quickly things may be converted to something of value is called.
    10·2 answers
  • Use the Windows ________ to check on a nonresponsive program. Select one: A. Backup utility B. Task Manager C. System Restore D.
    10·1 answer
  • A subroutine may be used to refer to which of the following? Check all that apply.
    15·2 answers
  • Why does every image on brainly look like this too me?? it started today
    15·2 answers
  • TRUE OR FALSE: THE BUILDER'S CLUB IS A PAID SUBSCRIPTION.
    9·2 answers
  • That’s what I have so far. I need help!
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!