1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
3 years ago
11

BRAINLIEST !!A game design document is like a diary for game developers.

Computers and Technology
1 answer:
mafiozo [28]3 years ago
5 0
The answer is true. A game design document is like a diary for game developers.
You might be interested in
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
1 year ago
Jesse is writing a physics quiz about the motion of a roller coaster cart. He has a clip art illustration of a cart rolling hori
NISA [10]
<span>1.editing the image file in a dedicated photo editing program before inserting it
Hope this reaches you before net neutrality sets in</span>
4 0
3 years ago
Read 2 more answers
________ is the process of translating a task into a series of commands that a computer will use to perform the task.
IgorC [24]
Programming 
It can also be described as Reverse Engineering 
7 0
3 years ago
Which programming languages are the best choices for desktop applications? Select 3 options.
slega [8]
The three are Python c and html
5 0
3 years ago
Read 2 more answers
How can I become front end developer
yawa3891 [41]
The answer is by earn a recognized diploma get a guaranteed job.
8 0
3 years ago
Read 2 more answers
Other questions:
  • How can you best protect yourself when using social media
    5·2 answers
  • Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
    12·1 answer
  • What is a color that cannot be created by mixing other colors together?
    15·2 answers
  • Blank includes websites that encourage interaction and connection among people ,business and organizations
    13·1 answer
  • I’m which scenario would someone most likely be using presentation software ?
    6·2 answers
  • Use the drop-down menus to describe how Adnan can add shapes to his presentation.
    11·1 answer
  • Complete the sentence.
    8·1 answer
  • What is Stefen Salvators mom name? For the tvd fans
    12·2 answers
  • Please Help, Thank you!
    5·1 answer
  • Name the first mechanical computer​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!