1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
6

Can anyone teach me the basics of lua scripts 50 points

Computers and Technology
1 answer:
Pie3 years ago
3 0

Answer:

are you talking about about a game, or coding?

You might be interested in
Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by au
AnnyKZ [126]

Answer:

Option B (Deployment of write once read many (WORM) drives) is the appropriate one.

Explanation:

  • SIEM application goods/services consolidate safety information management (SIM) with security event management (SEM) throughout the area of device protection. We include an overview including its known vulnerabilities created by users and network equipment in actual environments.
  • No quantity of administrative intervention will alter the substance on something like a WORM disc, even by physical disc disruption or failure. That would be the better-suggested choice.
7 0
4 years ago
Which phrases or sentences in the passage denote operations that the hospital carries out with the help of computers?
Schach [20]
Here are the phrases or sentences that show operations that the hospital functions with the aid of computers:
-<span>As soon as he was admitted, the hospital authorities recorded David's medical history. (Medical Histories are often encoded in the computers to serve as records for future references.)
-</span><span>David was then placed in an Intensive Care Unit (ICU), where his vital signs were constantly monitored. (Here, these machines were connected to the computers in order to take note of his vital stats.)</span>
3 0
4 years ago
Read 2 more answers
Corona and app inventor can be used to develop ________.
Sidana [21]
<span>Corona and app inventor can be used to develop apps for smartphones. Corona can be used to build both games and apps from major platforms like iOS, Android, Kindle, Apple TV, Android TV, macOS, and Windows. App Inventor was originally provided by Google and is now maintained by MIT.</span>
3 0
4 years ago
If I dribbled on my motherboard and I used windex to clean off the spit would it still work ?
amm1812
Probably not, I also don't think it's the best idea either.
3 0
3 years ago
Read 2 more answers
The meta element is coded in the ___________ section of a web page document.
lilavasa [31]
Hi!

The meta element is included in the <head> tag section. It's something that you can't visibly see on your website.

Hopefully, this helps! =)
4 0
3 years ago
Other questions:
  • True or false? Opinionated websites can still be credible. A. True B. False
    15·2 answers
  • What is an audit trial
    8·1 answer
  • What is a router in computer networks?
    8·1 answer
  • The carbon-14 isotope is important because it allows scientists to determine the ___________ of an organic sample.
    14·1 answer
  • A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
    7·1 answer
  • The best presentations try to include as much text as possible on each slide true or false ​
    13·1 answer
  • What is a valid response when identity theft occurs
    10·1 answer
  • 1. If we want define style for an unique element, then which css selector will
    14·1 answer
  • Why do you need to learn about engineering and technology.
    13·2 answers
  • ___ is the most important variable that is measured and controlled in a commercial hvac system.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!