1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
4 years ago
14

When Creating a game ( Which I Am, FPS ofc ) what are the basic rules would you want to add

Computers and Technology
1 answer:
Gnesinka [82]4 years ago
5 0

Answer:

2 ig

Explanation:

You might be interested in
4. The clutch pedal is found in cars with manual and automatic transmissions.
kicyunya [14]
False. The clutch only exists in vehicles with manual transmissions.
8 0
3 years ago
Which correctly shows the configuration of boxes in the View tab that allow the indents to be changed?
den301095 [7]
The correct answer is B. Got it right on my review
4 0
3 years ago
What is a system that uses computerized advisory programs to imitate the reasoning processes of experts in solving difficult pro
algol13

Answer:

Expert systems

Explanation:

Experts systems are known as computerized advisory programs that are used for the imitation of expert's reasoning processes when solving problems that pose a difficulty. They are usually a knowledge base that have several accumulated experience and certain rules that are used in the application of the knowledge according to the specific situation.

6 0
3 years ago
You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. T
leva [86]

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

5 0
3 years ago
Regarding computer protection, quarantining is defined as ________. Select one: A. placing a found virus in a secure area on the
MatroZZZ [7]

Answer:

A. placing a found virus in a secure area on the hard drive

Explanation:

When a file is defected in a computer, quarantining is applied to prevent other parts of the computer. The infected file is isolated and if you let your antivirus software, it can delete the infected file.

3 0
3 years ago
Other questions:
  • What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
    15·1 answer
  • Which type of communication protocol converts data into standard formats that can be used by applications?
    11·1 answer
  • What is a gutter margin?
    5·2 answers
  • In the structure of a conventional processor, what is the purpose of the data path?
    15·1 answer
  • Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.
    6·1 answer
  • Information systems include all of these
    5·1 answer
  • What is one requirement for achieving Continuous Deployment
    15·2 answers
  • Full form of http.<br>wrong answer will be reported ​
    6·2 answers
  • A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
    7·1 answer
  • Dynamics
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!