1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
3 years ago
11

BRAINLIEST !!A game design document is like a diary for game developers.

Computers and Technology
1 answer:
mafiozo [28]3 years ago
5 0
The answer is true. A game design document is like a diary for game developers.
You might be interested in
Refer to the color wheel to identify the color scheme.
morpeh [17]
C) monochromatic
Hope this helps!

btw make me brainliest?
4 0
3 years ago
PLEASE HELP ME WITH THIS QUESTION:
Darina [25.2K]
There’s literally no question here
5 0
3 years ago
HELP PLZZZZZZ
Brums [2.3K]

Answer:

Do you want me the money for the policy that has been canceled

3 0
3 years ago
It's best to use assertive speech when you<br> I want to show respect. *<br> True<br> False
mestny [16]

Answer:

True

Explanation:

Hope this helps :)

6 0
3 years ago
Read 2 more answers
You learn that in a previous security breach at GearUp, a disgruntled employee destroyed the encryption key that had been used t
lukranit [14]

Answer:

The data can be safeguarded using key escrow procedure.

Explanation:

Key escrow basically means to store the cryptographic key in an "escrow" by a reputable trusted third party. The copy of the encryption key is kept with the third party. In case the cryptographic key gets lost or destroyed, then the key escrow service helps to access the encrypted data. It also manages the access control to the key in case the key gets lost. So this way in case of security breach at GearOn the key escrow service can be used to re-implement or access the key easily.

6 0
3 years ago
Other questions:
  • Which type of factories began to flourish in the late eighteenth century
    5·1 answer
  • Do most good businesses have to deal with conflict
    7·1 answer
  • Which approach to knowledge management capitalizes on tacit knowledge and requires heavy IT investment?
    8·1 answer
  • A user is connected to his personal mobile hotspot device at a library for internet access. He notices the display shows two con
    10·1 answer
  • How does digital camera differ than manula camera?​
    6·1 answer
  • Read a sentence from the console.
    6·1 answer
  • A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
    14·1 answer
  • Which programming language in order takes the most lines code​
    6·2 answers
  • Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
    15·1 answer
  • What is a list of things we use programming for??? longest gets brainly
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!