1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
3 years ago
10

I want to make a game with a friend. I use visual studio code. How do I work on the game with him? Like can he edit the same tim

e i am?
Computers and Technology
1 answer:
spayn [35]3 years ago
4 0

Answer:

You need to employ some sort of version control system like Git

Explanation:

Websites like Github allow you to manage code repositories to monitor changes and allow simultaneous collaboration.

You might be interested in
Images that are made up of pixels and cannot be resized without losing quality?
Inessa05 [86]

Answer:

there are no known pictures that can be zoomed in and not lose quality. they will all be pixelized. mostly everything on a computer is made of pixels.

Explanation:

hope this helps!

~evita

8 0
3 years ago
How long does a seller have to ship an item on offerup
ra1l [238]

They have up to six days to ship the item after it has been purchased via either the Buy Now option or them accepting an offer.

7 0
2 years ago
HELP PLEASE! What is an acceptable use policy and what is the purpose of the acceptable use policy?
Ostrovityanka [42]
Hai what is the answer choices?? please tell me so I can help u

3 0
3 years ago
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
Microsoft is interested in customers' perceptions of Windows 8, its new PC operating system. Since the research goal is rather s
Fantom [35]

Answer:

The answer is "Option c"

Explanation:

An Online questionnaire is a research study, that can be conducted across the internet by the targeted audience. It is the primary use for web-based ways to store feedback, and analyses by statistical apps and other choices were wrong, which can be described as follows:

  • In option a, It is wrong because experimental is used in factor manipulation.
  • In option b, It is not a secondary part of survey, that's why it is incorrect.
  • Option d and Options e is used to in survey, but it's not correct.  

5 0
3 years ago
Other questions:
  • Marco makes $65,000 a year as a graphic designer. He makes a charitable donation of $1,000 each year. He also has $5,000 of busi
    12·2 answers
  • What three characteristics of a function are described in an IPO chart? What is performed at each characteristic?
    12·1 answer
  • write code to declare variables for s0 with a value of 12.0, v0 with a value of 3.5, a with a value of 9.8, and t with a value o
    13·1 answer
  • What software development model focuses on improving the product in small steps each time through the cycle?
    14·2 answers
  • What method of heat transfer is used when the sun heats the earth?
    14·1 answer
  • PLZ ANSWER THESE QUESTIONS FOR 30 POINTS AND BRAINLIEST!
    9·1 answer
  • Write a program in Cto define a structure Patient that has the following members
    12·1 answer
  • B) Describe the computer processing that is required to maintain the correct growing<br>conditions.​
    13·1 answer
  • Does CLAIRE https://claire-ai.org/vision/ considered a representative of Roy Rotwell's Fifth Generation of innovation?
    7·1 answer
  • Write algorithm and flowchart for the following<br>a.find the sum and average of any four numbers ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!