1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
3 years ago
14

Game Design Help please

Computers and Technology
1 answer:
vova2212 [387]3 years ago
5 0

Because, to put it simply, to use more complicated shapes requires more processing power which is unnecessary. Only if they would touch all parts of the shape should it be complicated.

You might be interested in
Explain the working system of a computer with an example​
Romashka-Z-Leto [24]

<h2>{\underline{\fcolorbox{White}{pink}{ANSWER♥︎}}}</h2>

<u>The computer is the combination of hardware and software. Hardware is the physical component of a computer like motherboard, memory devices, monitor, keyboard etc., while software is the set of programs or instructions. Both hardware and software together make the computer system function.</u>

<h2><u>E</u><u>x</u><u>a</u><u>m</u><u>p</u><u>l</u><u>e</u><u>s</u><u> </u><u>:</u><u>-</u><u> </u></h2>

<h3><u>Mainframe Computer</u></h3>
  • Mainframe Computer. 20 in Kickin Technology Series: MainFrame Computers. MORE POWEeeer! Movie 1. ...
  • Desktop Computer. Movie: 2. Desktop Computers. ...
  • Laptop or Notebook Computer. Movie: 3. Laptop Computers. ...
  • Palmtop Computer or Personal Digital Assistant (PDA)
7 0
3 years ago
What do we call exceptions to the exclusive rights of copyright law?
Studentka2010 [4]

Answer:

Fair use

Explanation:

I don't know if this is correct but Its the best option.

4 0
3 years ago
Traffic shaping reduces traffic by ________. preventing certain undesirable traffic from entering the network limiting the amoun
Lera25 [3.4K]

Answer:

Explanation:

Traffic Shaping is a technique for managing congestion on a network by delaying the flow of less important/desired packets on the network so more valuable/desirables ones are able to pass. Traffic shaping reduces traffic by preventing certain undesirable traffic from entering the network as well as limiting the amount of certain undesirable traffic entering the network.

5 0
3 years ago
Why is being distracted by the sights and sounds of our devices dangerous?​
11111nata11111 [884]

Answer:

because we lose our reflexes and our lucidness... if we r in our devices we dont see the world. we dont see the dangers we dont see or feel what we need to to survive. we find safety in things like electronics but they will never help us when it comes to real life problems. like if we are going to get hit by a car we are reading our phone not looking at our surroundings not listening to the warnings.

Explanation:

hope this helps

8 0
3 years ago
Suppose Client X initiates a FTP session with Server W and requests data transferring. At about the same time, Client Y also ini
sergeinik [125]

Answer:

Folllows are the solution to the given points:

Explanation:

In this question, the server uses special port 21 and  20 for the command and data transfer. A customer uses a random short-term N > 1023 and N+1 ports Listen and the Ports may be randomly distributed and the following samples are given for:  

In point (a):

X: 1030 Client, W server: 21 (service)  

W: 20 server (data) ,Client X:1031

In point (b):

Server W: 21 (command) Client Y: 1035  

Client Y: 1036, (data) Server W: 20  

In point (c):

Client X: 1030, Server W: 21.  

Client X: 1031, (data) Server W: 20  

In point (d):

Client X: 1035, Server W: 21.  

Client X: 1036 ,(data): Server W: 20.  

In point (e):

Yes, it's an opportunity. It can be the same as a certain likelihood.  

In point (f):

The port of the server is the norm. If W and Y are on the same host, the client's port numbers can vary.  

4 0
4 years ago
Other questions:
  • Why are computer programs so much longer now than they were in the late 1980?
    8·1 answer
  • An iterative algorithm uses a loop to solve the problem, while a recursive algorithm uses a method that calls itself. (true, fal
    7·1 answer
  • Which of the following is typically not found in web page-authoring software
    9·1 answer
  • The hotspot created by MiFi is password protected and can be used to connect Wi-Fi devices located within ____ feet of the MiFi
    9·1 answer
  • Write a function (funception) that takes in another function func_a and a number start and returns a function (func_b) that will
    7·1 answer
  • PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto
    9·1 answer
  • List the steps in setting up an online banking account
    12·2 answers
  • The amount of ram that is actually on the memory modules in your computer is the ________ memory.
    11·1 answer
  • Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
    5·1 answer
  • Which file extension would be used to indicate a webpage document?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!