1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
15

Please answer fast! I need this now!

Computers and Technology
1 answer:
nexus9112 [7]3 years ago
7 0

Answer:

The GDD (game design document) comprises of the three things. And the first thing is a description of the product, and which is explained in the question, and it is the gameplay. This part of the GDD mentioned in the question is the way the game is to be played, and what is the risk involved in the different stages of the game.

Explanation:

Please check the answer.

You might be interested in
What are the contents of memory locations 200, 201, 202, and 203 if the word 1234 is stored at offset 200 and the word 5678 is s
Igoryamba

Answer:

Data at the following addresses will be as following:-

200 :- 34

201 :- 12

202 :- 78

203 :- 56

Explanation:

If there is 1 byte storage.

if the data is of 4 digits.Then we have to store it in 2 memory locations.

The first two digits will be stored at the higher byte address that is 201 and the last two digits will be stored at then lower byte address that is 200.

The case is same with the next data 5678.

At address 202 :- 78 will be stored and at address 203 :- 56 will be stored.

3 0
3 years ago
The auto recover function in a word is available to especially if you experience powerful failure explain what happens to your d
Komok [63]

Answer:

When the document is not saved before the application is closed, The word application assumes that the file is not important, so does not save a recovery file, but to recover the file open the application and go to the recently opened file, do not edit the file, go to the bottom of the document and click on recovery or use the CTRL-Z shortcut key.

Explanation:

Microsoft word is a word processing application used to make and edit word documents. The recovery option in the word application is an essential tool in Word that prevents a permanent loss of documents in production and can be used to retrieve saved and unsaved documents.

7 0
3 years ago
Program your own file lab7.cpp in which your main() function will test the new data structure. The main() function, Declares an
Stella [2.4K]
Is this a question or just something up here just to be here
3 0
3 years ago
Please post detailed answers to the following questions. Please use complete sentences.
Aloiza [94]

Please post detailed answers to the following questions. Please use complete sentences t two artists from the following list: Phil Borges,Lee Jeffries.

<h3>What are photography opportunities?</h3>

The taking of constant or nevertheless snap shots furnished a brand new medium with which to seize reality, and modified the manner humans in general, and artists in particular, noticed the arena and created new inventive opportunities. Learning from the technological know-how of photography, artists evolved a selection of the latest portrayal techniques.

Photography modified our imaginative and prescient of the arena with the aid of using presenting greater get entry to to greater snap shots drawn from greater locations and instances withinside the global than ever before. Photography enabled snap shots to be copied and mass-distributed. The media-sphere became burgeoning.

Read more about the internet :

brainly.com/question/2780939

#SPJ1

4 0
2 years ago
Materials used in front office
mina [271]

Answer:

A Telephone, Printer, Computers, Security Monitor

4 0
3 years ago
Other questions:
  • Allows a service provider organization to own and manage the infrastructure (including computing, networking, and storage device
    13·1 answer
  • Rank these three account types in order of decreasing liquidity. Start by picking the most liquid account type first
    13·2 answers
  • What are 3 things that victims of cyber bullying can experience?​
    15·2 answers
  • Which of the following would be a valid method call for the following method? public static void showProduct (int num1, double n
    6·1 answer
  • A _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to hea
    9·2 answers
  • What is the main function of the arithmetic logic unit (ALU)?
    6·1 answer
  • In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers
    9·1 answer
  • Write a function findWithinThreshold that identifies the elements of a given array that are inside a threshold value. Takes the
    13·1 answer
  • You are considering implementing a backup scheme for a server. After researching options, you decide on a method that does not r
    7·1 answer
  • 4.3 mini programs AP computer science
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!