1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delicious77 [7]
3 years ago
15

What are the careers needed to create a video game? Name all the careers involved please.

Computers and Technology
1 answer:
AURORKA [14]3 years ago
6 0
Audio Engineers
Interpreters and Translators
Video Game Testers
Technical Support Specialists
Marketing Managers
Market Research Analysts
Sales Representatives

You might be interested in
Using the same Apple ID for multiple devices will definitely sync them all together <br> True/False
frez [133]
False they won’t sync them all together
4 0
3 years ago
Read 2 more answers
Which of the following are good backup methods you can use to protect important files and folders from loss in the case of a har
grigory [225]

Answer:A,B, and D

Explanation:

6 0
3 years ago
Read 2 more answers
T in your computer will you use to plug in your camera?
Gnom [1K]
A tool in your computer that you will use to plug in your camera is the Universal Serial Bus (USB). If you camera has this chord and it is an Universal Serial Bus type. Then what you need is your software installer of the camera and only the USB.
7 0
4 years ago
Universal Containers offers a variety of products that are comparable to products from other companies. Sales representatives re
-Dominant- [34]

Answer:

The System Administrator should implement a Competitors  on the opportunity Page Layout

Explanation:

<em>Because, it allows basic information to be captured about the competitors on each opportunity. Besides it qualifies opportunities based on historic success against competitors, tailors the sales approach based on the competitors each deal and consistently increases win rates by learning what worked and what did not.</em>

5 0
3 years ago
Who was responsible for unleashing the melissa computer virus
CaHeK987 [17]

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

6 0
3 years ago
Other questions:
  • What was a lesson that the Enlightenment taught people?
    11·1 answer
  • How are the stop lamp bulbs connected in relation to each other? a. In parallel. b. In series. c. In series/parallel. d. None of
    13·1 answer
  • One of the implications of price elasticity of technology products is that:
    11·1 answer
  • Whoever answers int the next 15 minutes will get brainliest. To get brainliest, it also has to be the correct answer. 8 points r
    11·2 answers
  • Need some personal advice here.
    12·2 answers
  • Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s person
    7·2 answers
  • Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services
    12·1 answer
  • Note that common skills are listed toward the top, and less common skills are listed toward the bottom. According to O*NET, what
    15·1 answer
  • Discuss the term internal control​
    12·1 answer
  • Instruction: weird I know (~ ̄³ ̄)~
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!