1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dlinn [17]
3 years ago
12

Imagine you are the human resource director for a small video game company that employs around 20 coders, managers, artists, etc

. You're in charge of writing the safety rules and regulations for the company. Provide at least four discrete rules you would implement
Computers and Technology
1 answer:
wolverine [178]3 years ago
6 0

Answer: maybe not put cheats no secret or easter eggs or hard challenges im not sure

Explanation:

You might be interested in
. List down mental health problems that may arises with excessive use of digital social networking Do we ever need to be concern
Snowcat [4.5K]

Answer:

Excessive utilization of digital instant messaging could perhaps lead to numerous mental health conditions.

Explanation:

  • The massive pressure just to preserve a privileged lifestyle the same as peer group and other such influencers.
  • Cyberbullying would also be a key component of the social mainstream press. This might cause stress.

Yes, researchers undoubtedly need to worry about who becomes familiar with the internet. There's a whole number of news items living with the effects of over-using social networking sites. There seemed to be headlines that a teen must have been strongly affected by someone with a man as well as ransacked with real money by encouraging them to stay married to her.

8 0
3 years ago
What are the two types of programming languages?
ddd [48]

Answer:

High level language.

Low level language

Explanation:

please give brainliest

3 0
3 years ago
Which ipsec subprotocol provides data encryption?
Mrac [35]
I'm not sure but I think LastPass?
6 0
4 years ago
Why does dns use udp instead of tcp? if a dns packet is lost, there is no automatic recovery. what are the consequences?
inysia [295]
<span>If a DNS packet using UDP is lost this problem must be handled at the application layer. If an answer is not received after some period of time the specific application may choose to resend the DNS query. I can go much more into detail but this should answer your question. If you need more detail just ask.</span>
6 0
3 years ago
A seismograph has a heavy weight that is hung from a spring. What would happen if the weight were attached to a rod instead of a
Goshia [24]
<h2><u>Answer:</u></h2>

A seismograph has an overwhelming weight that is swung from a spring. As the spring is high touchy to the developments of the Earth at that point is the correct decision offer a seismograph.

On the off chance that this is changed by a pole, at that point it won't see the developments of the earth making the seismograph not precise and it would not work.

6 0
3 years ago
Other questions:
  • Consider the following program segment. ifstream inFile; //Line 1 int x, y; //Line 2 ... //Line 3 inFile &gt;&gt; x &gt;&gt; y;
    13·1 answer
  • A company database consists of 10,000 sorted names, 40% of whom are known as good customers and who together account for 60% of
    13·1 answer
  • The two major factors that impact processor speed or clock speed and _____ .
    8·1 answer
  • Briefly describe the interface between the memory and the processing unit. That is, describe the method by which the memory and
    6·1 answer
  • Case-Based Critical Thinking Questions​Case 1: Tony’s Pizza &amp; Pasta​Tony’s Pizza &amp; Pasta restaurant uses an application
    9·1 answer
  • The requester of sensitive information should not receive access just because of his or her clearance, position, or rank. The re
    15·1 answer
  • Write a loop that sets each array element to the sum of itself and the next element, except for the last element which stays the
    15·1 answer
  • Code Problem 2 in Python 2.
    5·1 answer
  • What note for percussun is this??
    12·1 answer
  • Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his cre
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!