1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
3 years ago
9

What does engine r0blox players use to make r0blox games

Computers and Technology
1 answer:
vovangra [49]3 years ago
5 0

Answer: Lua programming

Explanation: i hope im right ?

You might be interested in
In java, c or c++ code, when a number begins with a leading 0, what do you know about that number: (example: int zzz = 012;) in
Katarina [22]
A leading 0 denotes octal notation, so the digits 8 and 9 are not used.
In normal decimal notation 12 means 1*10+2, in octal, it means 1*8+2.

The leading 0x denotes hexadecimal notation, here the digits are extended with 6 letters, a through f. 0x12 means 1*16+2.

Without any prefix, we have normal decimal notation.
5 0
4 years ago
A network of people and services with which we share ties and which provide support is.
docker41 [41]

A network of people and services with which we share ties and which provide support is social support.

<h3>What is Social support?</h3>

This is known to be a form of “support that is opened to any body as a result of social ties to other people, groups, and the bigger community.

Note that A network of people and services with which we share ties and which provide support is social support.

Learn more about social support from

brainly.com/question/7463943

#SPJ1

5 0
2 years ago
Help!! Best answer will get Brainliest!!
Eddi Din [679]

Answer:

answer(s):

-set goals

-select a topic

-write down research questions

Hope this helped and sorry for the bold. <3

Explanation:

6 0
3 years ago
Read 2 more answers
A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.
notka56 [123]

Answer:

Intrusion detection system

Explanation:

An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

4 0
3 years ago
Is it legal to build cellphone tower
Marat540 [252]
If you build a cellphone tower without proper building permits and equipment without permission from local government than it would be illegal
3 0
3 years ago
Other questions:
  • Consider the situation you addressed in the previous question. Create numeric cost estimates for each of the costs you listed. C
    10·1 answer
  • In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
    14·1 answer
  • Which acronym describes technology in which all or most of a deviceâs electronic circuitry is on a single microchip?
    12·1 answer
  • A word that has a specific, predefined meaning in a programming language is called
    8·1 answer
  • Using illustration how input, process and output in latest wearable devices
    10·1 answer
  • 100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from
    6·1 answer
  • Pat practices on the keyboard to improve his typing speed. When he typed the sentence It was a rainy day, he missed typing the l
    6·1 answer
  • Create a dynamic array of 100 integer values named myNums. Use a pointer variable (like ptr) which points to this array. Use thi
    6·1 answer
  • Discuss the term internal control​
    12·1 answer
  • What purpose does encryption on the internet serve? Why is it so important?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!