1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eduardwww [97]
3 years ago
15

Game Design 40 POINTS. Help Please. If you help then you are godly.

Computers and Technology
1 answer:
Brrunno [24]3 years ago
5 0

question 4 is b

question 3 is also b

last one A

You might be interested in
Which of the following is not possible? A class that implements two interfaces. A class that inherits from two classes. A class
ozzi

Answer:

"A class that inherits from two classes"

Explanation:

If we're talking about Java, you can't extend from two classes. The reason for this is Java doesn't allow multiple inheritance.

The reason for this is to avoid the ambiguity caused by it. One of the cases where multiple inheritance can cause ambiguity is the diamond problem.

Diamond problem can occur if two classes (say B and C) inherit from one class (say A). And another class (say D) inherits from both B & C.

If B and C class override the same method from A class. And D class calls that method, which one will be called, class B's or C's??

4 0
3 years ago
Natalie enjoys talking to people and helping them with their problems. Her friends always tell her that she’s a good listener. B
Akimi4 [234]

Answer:

C and D

Explanation:

The other 3 answers don't even involve talking.

7 0
3 years ago
Read 2 more answers
Which of the following remote access security technologies performs authentication through a three-way handshake (that is, chall
levacccp [35]

Answer:

CHAP

Explanation:

CHAP allows a client to be authenticated without sending credential information across a network.

7 0
3 years ago
In a penetration test, the ________ team comprises testers who are given no knowledge of the infrastructure and are attacking a
just olya [345]

Answer:

TIGER TEAM

Explanation:

Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.

There are different types of penetration testing teams which are: red team, blue team and purple team.

Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.

In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.

Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.

3 0
3 years ago
"______" is a wireless local network that uses high frequency radio signals to transmit an Internet signal from a wireless route
Hitman42 [59]

Answer:

Modem possibly

6 0
4 years ago
Other questions:
  • Given the function definition below, what is the effect of thecall:
    7·2 answers
  • What is an electronic tool that stores large amounts of data in one place in a systematic, logical way? A Database B Platform C
    5·1 answer
  • The loss of privacy data has implications:
    5·1 answer
  • Assume a PHP document named hello.php has been saved in a folder named carla inside the htdocs folder on your computer. Which is
    11·1 answer
  • You csn access various sites on the www by using hyperlinks or by
    7·1 answer
  • An expression which combines variables numbers and at least one operation
    8·1 answer
  • What is the advantages and disadvantages of hardware devices and software devices ?
    9·1 answer
  • _____moves the head to proper track
    13·2 answers
  • We can find out how robots work by looking in detail at the smaller parts. What do we call this?
    6·1 answer
  • The first time that a particular visitor loads a web site page is called a(n) _____.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!