1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
4 years ago
14

When Creating a game ( Which I Am, FPS ofc ) what are the basic rules would you want to add

Computers and Technology
1 answer:
Gnesinka [82]4 years ago
5 0

Answer:

2 ig

Explanation:

You might be interested in
Can web sites contain copyright material? <br> Yes <br> No
Maru [420]
Yes they can contain copyright
6 0
3 years ago
Read 2 more answers
in java how do I write a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number
jekas [21]

Answer:

do{

             Scanner s1 = new Scanner( System.in);

              int a = s1.newInt();

             System.out.println(a);//println will automatically add a newline after each number input.

        }while(a<100);

And the program will terminate on first input itself as 123 is more than 100.

Explanation:

Please check the answer section.

3 0
3 years ago
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of atta
NISA [10]

Answer:

Eve is employing a <u>chosen-ciphertext attack.</u>

Explanation:

Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.

The Ciphertext is a term used to explain data encrypted in the form of text.

When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.

3 0
3 years ago
A ____ network allows computers running the same networking program to nonnect with each other and access files stored on each o
lisabon 2012 [21]

Answer:

"Peer-to-peer" is the correct answer for the above question.

Explanation:

  • A peer-to-peer network is a network architecture where the connected computer behaves like the server and the client itself. Any computer can behave like a server or like clients at any time.
  • This is a network that is different from the client-server model and can be connected and allows to share one another hardware resource.
  • The above question asked about the network architecture which is used to allow to share the hardware resources of one another's computers. The network architecture is a Peer-to-peer network.
4 0
3 years ago
Which of the following is not an Operating System? Select one:
harina [27]
Internet Explorer is not an Operating System. Internet Explorer is a web browser.
6 0
3 years ago
Other questions:
  • Because an AVL tree is a binary search tree, the search algorithm for an AVL tree is the same as the search algorithm for a bina
    10·1 answer
  • What is an audit trial
    8·1 answer
  • You and a few friends are having a meal at a pizza restaurant, and the server has just given you the bill. Write a function that
    14·1 answer
  • 100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from
    6·1 answer
  • ____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.
    11·1 answer
  • What is the purpose of OPPA? A. It regulates the strength of passwords chosen by the users. B. It prohibits the use of informati
    11·1 answer
  • Which software application is most appropriate for creating slideshows using text, charts, photographs, clip art, and video? dat
    13·2 answers
  • Why is transmitting information through computers cheap and fast
    12·1 answer
  • Choose the correct term to complete the sentence.
    10·2 answers
  • A program similar to mtr, ____, is available as a command-line utility in Windows operating systems.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!