1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
3 years ago
5

Which one of these tasks is part of the pre-production phase of game development?

Computers and Technology
2 answers:
pickupchik [31]3 years ago
7 0
[B], developing the art style guide and production plan.

It wouldn't be [A], because patches are released to consumers of the game, to fix bugs and add new content, which won't be done until post-production.

It wouldn't be [C] either, as it is also post-production, because you are sending the game to produced, packaged and shipped, meaning the game has already been pretty much fully developed.
frutty [35]3 years ago
4 0

Answer:

b

Explanation:

You might be interested in
Ou are a web page designer and you set up a page with five different links. a user of the page can click on one of the links or
sertanlavr [38]

There are 6 possible outcomes and they are :

S={link1,link2,link3,link4,link5,leave}

this is the sample space for the outcome of a visitor to your webpage.

8 0
3 years ago
Which image shows organic shapes? <br> A. image 1 <br> B. image 2 <br> C. image 3 <br> D. image 4
solniwko [45]
Image 3.

Hope this helps!!
4 0
3 years ago
Read 2 more answers
A type of graph that uses horizontal bars to compare data is called a
sergiy2304 [10]
The answer is A) a bar graph

6 0
4 years ago
Read 2 more answers
A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
raketka [301]

Answer:

When enabling TLS 1.2 for your Configuration Manager environment, start by ensuring the clients are capable and properly configured to use TLS 1.2 before enabling TLS 1.2

Explanation:

When enabling TLS 1.2 for your Configuration Manager environment, start by ensuring the clients are capable and properly configured to use TLS 1.2 before enabling TLS 1.2

4 0
2 years ago
Join Viber Creations on Viber https://invite.viber.com/?g2=AQAboWGw5hKZN009gOjCULc4cbWKWg42%2BIFmJoPC93MPlt9kstcpJyU6yagPh050 |
Dovator [93]
Hmmmm
I have to say the step mom in Cinderella
7 0
3 years ago
Other questions:
  • Choose the list of the best uses for word processing software.
    5·1 answer
  • You use ddl to create, modify, and delete the ___________________________ of a database.
    6·1 answer
  • Write any three type of looping structure with syntax​
    13·1 answer
  • Suppose an initially empty stack S has performed a total of 15 push operations, 12 top operations, and 13 pop operations ( 3 of
    5·1 answer
  • How many triangles can you make if the side lengths are 4 cm, 5 cm, and 11 cm?
    10·1 answer
  • What steps should you take if your harassed online​
    9·2 answers
  • Order the steps for changing the settings of an outlook data file
    10·1 answer
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
  • 13. You're doing research for a paper. When would you use an indirect citation?
    12·1 answer
  • a domain name is assigned to you when you submit your website to a search engine. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!