1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
12

(Game Design) Creating and manipulating data structures is one of the primary functions of a development environment.

Computers and Technology
2 answers:
Virty [35]3 years ago
8 0

Answer:

False

1.b false

2.a true

3.c giving it a color

4.d all of the above

5.d a dummy object

6.b false

7.d the class of objects which have been saved in a game project

8.a a class

9.a a query

10.a create an object that is just a transform

11.d data modelling

12.a bitmaps

13.c using

14.a an operator

15.b algorithms

Galina-37 [17]3 years ago
7 0

true i believe im not for sure

You might be interested in
Describing Report Viewing
mrs_skeptik [129]

Answer:

C) Print Preview

Explanation:

8 0
3 years ago
Keion works as a freelancer creating websites and designing logos for clients. He recently had a hard drive failure and lost wor
kolezko [41]

Answer:

B. RAID 1

Explanation:

The recommended RAID configuration is RAID 1.

3 0
4 years ago
What is it called when you give credit in your writing to someone else's quote?
katrin2010 [14]
Answer: citation

There are two basic ways to give credit to another person in your writing.

(a) The use of a signal phrase.
For example, you might write this:
According to John Doe (2005),  Author of "Old Classic Novels", it is necessary to understand  ...

(b) In-Text Citation.
For example, you might write:
It is necessary to understand ... (John Doe, 2005, p. 65-70)

In this case, the reference is provided at the end of the article or as a footnote.

3 0
3 years ago
Your computer monitor’s power switch is in the ‘ON’ position; however, the display is blank. Which of the following is NOT a lik
Yuri [45]
Answer : Monitor may be in sleep/hibernate mode.
7 0
3 years ago
Which of these is a way of making applications less vulnerable to hacking?
Alecsey [184]
(First one )
---------------------
7 0
3 years ago
Read 2 more answers
Other questions:
  • Directions: pick the right letter for each number.
    11·2 answers
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    7·1 answer
  • Sally is editing her science report about living things. She needs to copy a paragraph from her original report.
    15·2 answers
  • Is my answer is right? Someone tell me immediately!!!
    11·1 answer
  • A binary gap within a positive integer N is any maximal sequence of consecutive zeros that is surrounded by ones at both ends in
    13·1 answer
  • Why do we need IP Addresses in order for the Internet to function properly?
    7·1 answer
  • How many of yall are willing too sub to my channel called "Space Juice" with around 200 subs?!​
    6·1 answer
  • Which of the following is part of a person's digital footprint? *
    5·1 answer
  • Missing only a few days of school will not impact your grades.
    9·1 answer
  • leon started a project to design and create a new video game for the animation studio where he develops graphics and animations
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!