hey
I'm going to college for game design.
one of the best languages and the one I'm studying in is c# it is used in unity and many other game engines but there are many more. Just to list a few c++, Java, and many more it is up to you. if you would like more info about this just let me know By the way what game are you planning to make that is one of the most important factors
Hope this helps
-scav
Answer: review; quality
Explanation:
SQA refers to the ongoing process that can be found in the Software Development Life Cycle whereby the developed software is checked in order to ensure that the desired quality measures are met. The SQA processes is vital as it checks for the quality in every development phase.
The first step of the SQA process is to (review) the software development process. The next step is to set (quality) attributes.
Answer:
PING
Explanation:
To check if there's still connectivity between the computer and server, I would use the ping command.
The ping command is primarily a TCP/IP command. What this command does is to troubleshoot shoot. It troubleshoots connection and reachability. This command also does the work of testing the name of the computer and also its IP address.
Answer:
The technique used by the photographer which would be considered unethical today is:
Stage Managing
Explanation:
- The Migrant Mother is a famous that was captured by the photographer named Dorothea Lange. This photograph was taken during the era of great depression that shows the misery of a women as well as her courage.
- The photographer used the stage managing technique because the women in the photograph purposefully posed for the picture in order to let others know about their plight. She wanted to develop awareness as well as wanted the Government to help farmers.
- The name of the women in the picture is Florence Owens Thompson and she was a mother of seven children. She lived in California.
Answer:
A vulnerability level of ZERO can never be obtained since all countermeasures have vulnerabilities themselves. For this reason, vulnerability can never be zero, and thus risk can never be totally eliminated.
Explanation:
also we need to be protected from scams and stuff