1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
3 years ago
12

When Creating a FPS game what basic rules would you add?

Computers and Technology
1 answer:
Morgarella [4.7K]3 years ago
6 0

Answer:

We should add:

Explanation:

Anything red must explode if shot. Fixed mounted guns must always face away from any potential flash points and be pretty much useless. Never bring a gun to a knife fight. Never run into a room that you have just thrown a flash bang into as the grenade only effects you.. Create a world that invites, encourages, and rewards smart thinking.The game world is the real world.packages are the best way to draw out campers, pop one out into open areas and pick people off as they inevitably try to steal it from you, then when they are all dead still in and claim your UAV (or ammo crate more often than not).The only thing you can ever rely on your team to do is, give away your position, run into your line of fire and friendly flash you.If you pick up the sniper or any other power weapon someone on your team will always teamkill you for it then miss with every shot they fire using it.

You might be interested in
After an object has been instantiated, its methods can be accessed using the object's _____, a dot, and a method call
BigorU [14]
<span>After an object has been instantiated, its methods can be accessed using the object's identifier, a dot, and a method call.
</span>DOI stands for D<span>igital Object Identifier, to permanently identifies an article or document and link to it on the web and can be  </span><span>a string of numbers, letters and symbols.</span>
5 0
3 years ago
Something I should look for when trying to decide if a source is credible is the publication's ....
storchak [24]
Answer: Date

Explanation: We receive new information everyday, and things are always changing. If something is old, it may need to be updated with the correct information
7 0
3 years ago
What is a back door?
V125BC [204]

Answer:

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.

Explanation:

3 0
3 years ago
Read 2 more answers
What is the difference between connecting link and missing link ?
JulijaS [17]
It's simple. Missing link is the connecting link which had been cut or extinct. The main example are extinct animal species.
8 0
3 years ago
What is the key difference between UDP and TCP protocols in TCP/IP reference model?
g100num [7]

Answer:

TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. The speed for TCP is slower while the speed of UDP is faster.

5 0
2 years ago
Read 2 more answers
Other questions:
  • If x is an int, which of the following statements adds 5 to the current value of x and stores the new value back in x?
    12·1 answer
  • Which inserted element in an email message displays a graphic from a data source
    15·2 answers
  • In a flow chart, both the decision structure and the repetition structure use the diamond symbol to represent the condition that
    9·1 answer
  • You are trying to access the Wi-Fi network at a coffee shop. What protocol will this type of wireless networking most likely use
    11·1 answer
  • Which Fairy Tail character is this?
    14·2 answers
  • Pick the two statements about packets and routing on the Internet which are true. a. Packets travelling across the Internet take
    13·1 answer
  • Assume hosts A and B are each connected to a switch Svia 100-Mbps links. The propagation delay on each link is 25μs. The switch
    15·1 answer
  • Gavin is making a new logo for his business. He uses drawing software to create a unique. Which file format does he use to creat
    5·1 answer
  • 1. (01.03 MC) What is a string in Python
    9·2 answers
  • A group of two or more computer systems linked together via communication devices is called:.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!