1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
3 years ago
5

Which of these programmers creates the core game engine?

Computers and Technology
2 answers:
vredina [299]3 years ago
7 0

Answer:

b engine programmer

Explanation:

crimeas [40]3 years ago
4 0
B. Engine Programmer
You might be interested in
Should a UDP packet header contain both Sour Port # and Destination Port #?
densk [106]

Yes, a UDP packet header should contain both Sour Port # and Destination Port #.

<h3>Which fields are included in a UDP header?</h3>

The fields that one can see in a UDP header are:

<h3> Source port :</h3>

This is known to be the port of the device that is known to be sending the data. This field is one that a person can set to zero only if the destination computer do not require one to reply to the sender.

<h3> Destination port :</h3>

This is known to be the port of the device that is said to be getting or  receiving the data.

Hence, to the answer above, my response is Yes, a UDP packet header should contain both Sour Port # and Destination Port #.

Learn more about UDP packet from

brainly.com/question/10748175

#SPJ1

4 0
2 years ago
The Open Systems Interconnection (OSI) Reference Model: defines standards for many aspects of computing and communications withi
Advocard [28]

Answer:

is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer.

2. Data link Layer.

3. Network Layer.

4. Transport Layer.

5. Session Layer.

6. Presentation Layer.

7. Application Layer.

Hence, the Open Systems Interconnection (OSI) Reference Model is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Additionally, each layer has its unique functionality which is responsible for the proper functioning of the communication services.

8 0
3 years ago
Create a division formula.
baherus [9]

Answer:

=(A4+B4+C4+D4+E4)/5

Explanation:

If we want to have the average of the passengers, first we must sum all the revenue and then divide it with passenger quantity.

In this particular example, I made the formula with 5 passengers, I sum the 5 revenues and then I divide with 5 passengers if there are more passengers we must sum all of them, and divided all of them, for example:

=(A4+B4+C4+D4+E4+F4)/6

4 0
3 years ago
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at
erastova [34]

Answer:

The correct answer to the following question will be "DHCP server".

Explanation:

A network manager that dynamically supplies and delegates equipment of clients with their IP addresses, standard portals and some other networking specifications, known as DHCP server.

  • It depends on the standard operating procedure classified as Dynamic Host Configuration Protocol to answer to client-specific broadcasting commands.
  • It's used to optimize the authentication mechanism of computers on IP channels, enabling them using applications and services including NTP, DNS, and any UDP or TCP-based networking protocol.

Therefore, the DHCP server is the right answer.

7 0
3 years ago
To secure the company website, the webmaster suggests that the company purchase a secure certificate to encrypt all communicatio
iVinArrow [24]

Answer: Software

Explanation:

Security certificate is defined as the assurance that maintain authenticity and intactness of a website or different sites.It is present in small sized data filed that establishes encryption and validation through verification of owner's identity.

  • As per the suggestion of Webmaster, who takes care of web-pages and web-servers , security certificate should be purchased to verify the transmission of message with encryption.
  • Certificate in this case will be acting as software for providing security and operations to the websites.

4 0
3 years ago
Other questions:
  • The network ____, the person overseeing network operations, uses a server operating system to add and remove users, computers, a
    15·1 answer
  • zeroIt is a function that takes one argument and returns no value. The function stores the value 0 back into the parameter. x is
    8·1 answer
  • Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work
    14·1 answer
  • Programming assignment (100 pts): In the C++ programming language write a program capable of playing Tic-Tac-Toe against the use
    14·1 answer
  • What are some pros for having your phone during school hours?
    10·2 answers
  • What is the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automa
    8·1 answer
  • Ok so this question is kinda weird but does anyone know what google drive is. If so how do you upload a video to it?
    11·2 answers
  • What is the full form of 'Rom<br>​
    7·2 answers
  • How can i fix a all white phone screen
    11·2 answers
  • Explain the measures put in place in order to maintain each of the element of computer security<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!