1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
3 years ago
8

Ivan wants to have code in a game that will make it possible to change the speed of a swimmer in the game. Which of these does I

van need?
A.
a Boolean value

B.
output

C.
a variable

D.
a database
Computers and Technology
1 answer:
allochka39001 [22]3 years ago
4 0

Answer:

C. Variable

Explanation:

I hope it helps

You might be interested in
Google is an example of a(n):
Andre45 [30]
Well i see your X so i would say you were correct it is a search engine.
7 0
3 years ago
which programming paradigm do programmers follow to write code for event driven applications? a. object oriented programming. b.
7nadin3 [17]

Answer:

D) Procedural

Explanation:

7 0
3 years ago
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
Effectiveness of thicker,biodegradable plastic shopping bags
juin [17]

The Effectiveness of thicker, biodegradable plastic shopping bags is that they can last for a long time and still be able to carry shopping items  even if they are exposed to natural environment.

<h3>What is the use of biodegradable plastic bags?</h3>

Plastic bags are known to be part of modern technology. They are usually very  thin and strong. They are able to carry a heavy load as a result of shopping.

Conclusively, Note that this type of plastic bags which are said to be biodegradable can last for a long time and still be able to carry shopping items  even if they are exposed to natural environment.

Learn more about bags from

brainly.com/question/728465

4 0
3 years ago
What finger is used to key letter c
kumpel [21]

Answer:

your pointer finger

sorry if this is wrong

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • What's the best option if you can't show your PowerPoint presentation at all?
    9·2 answers
  • Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
    12·1 answer
  • What is the name for the percentage of people who don't have jobs in a country or area?
    11·2 answers
  • Create a function named PrintStudents, which takes a string input filename and an integer minimum score value and a string outpu
    14·1 answer
  • Write a program that reads the subtotal and the gratuity rate, then computes the gratuity and total. For example, if the user en
    6·1 answer
  • Providing incentives for customers to learn more about your service is known as?
    7·1 answer
  • What is the 5 basic steps of computer programing?
    6·1 answer
  • Create flowchart using Flowgorithm to represent the logic where the user inputs a number between 1 and 3 and displays the number
    7·1 answer
  • You need to secure your wireless network. which security protocol would be the best choice
    10·1 answer
  • if you were determining what was expected of you simply by looking at media, what messages would you take away?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!