1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
5

Most game development is done with object-oriented programming languages

Computers and Technology
2 answers:
kari74 [83]3 years ago
7 0

I think its b, but not so sure

dont sue me if im wrong please

babymother [125]3 years ago
6 0

It's true, that other person was incorrect.

You might be interested in
Solve the equation.<br>| 11 X 12362​
sergey [27]

Answer:

135982

Explanation:

Its simple math

4 0
3 years ago
What are output statement in QBASIC?
Roman55 [17]

Answer:

<h2> hi. here's your answer ....</h2>

<h3>print statement provides output on the screen . it prints the value of the expression on the screen . if the expression list is blank , no character is print . the expression in the list may be numeric or string .</h3><h2>Hope you like it..</h2><h2>(◕ᴗ◕✿)</h2>

5 0
3 years ago
What is the problem with paying only your minimum credit card balance each month​
Vinvika [58]

Answer:

The problem is that each month your credit card balance increases, and it increase by a certain percent of what you already owe. So if you pay the minimum each month, you'll just end up paying more money because it's ever increasing.

Please give brainliest!

6 0
3 years ago
Read 2 more answers
Which of the following is planted on an infected system and deployed at a predetermined time?A. Logic bombB. Trojan horseC. Worm
nekit [7.7K]

Answer:

A. Logic Bomb.

Explanation:

A Logic Bomb is a piece of code that is planted in a software system that is infected intentionally to set off malicious function.They are deployed at a predetermined time.

For ex:- a programmer hiding the files that deletes details of the employee who left the company.So these files can never be deleted.

4 0
3 years ago
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
Other questions:
  • The united states attempted to halt the communist revolution in cuba by​
    7·1 answer
  • What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
    5·1 answer
  • Our readings so far explored computer hardware and software, in particular operating systems and application software. There are
    11·1 answer
  • In a stream channel what is deposited first?
    7·1 answer
  • Which part of the cpu accepts data?
    15·1 answer
  • Please help me I need a help
    13·1 answer
  • 3. In 1989, the first handheld console was released by _____ and it was called ________.
    11·1 answer
  • Create five circles like the Olympic Rings. fill them with the colors given below
    8·1 answer
  • Select the correct answer. Nancy has made a small web page with the new features of HTML5. She has to show this web page in scho
    9·1 answer
  • 500 word career report, auto care
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!