Answer:
Explanation:
The answer is false
Because the 4 elements are shapes texture colour and size
This is a java program with a class called Sum1.
Explanation:
While loop is used to add 10 number.
import java.util.Scanner;
public class Sum 1
{
public static void main(String args[])
{
int number, count, sum = 0;
Scanner s = new Scanner(System.in);
System.out.print("Enter the number:");
number = s.nextInt();
while(number > 0)
{
count = number % 10;
sum = sum + n;
number = number / 10;
}
System.out.println("Sum of Digits:"+sum);
}
}
Common uses for spreadsheet documents be
-Organizing bills and money
-Groups of people and events
-Family plannings for weeks
-Grocery Lists.
I hope this helps!
Game design document is the term used for the initial document that includes the necessary information to build a game
Explanation:
A game design document serves as a nexus and core to combine and list all features of a game. It consists of written descriptions, images, graphs, charts and lists of data relevant to specific parts of improvement, and is usually formed by what characteristics will be in the game, and sets out how they will all fit together.
Creating a GDD will assist the team's designer in knowing what the fragrance of the game is and the intended range of its overarching world. Holding all the game factors in one well-organized document will help the designer easily communicate their idea to the rest of the team, and also healing to pinpoint deficiencies or missing components of the game. The GDD should serve as your master checklist.
Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.
Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems or
weaknesses that prevent malicious attacks.
To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer. This was a malicious attack.
However, sometimes people can be specifically targeted to steal their data or monitor their activities.