1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krok68 [10]
3 years ago
15

An invisible object that is used to create a game mechanic is called?

Computers and Technology
2 answers:
viva [34]3 years ago
8 0

D. dummy object......

             

denpristay [2]3 years ago
3 0
It’s C , Ghost Object
You might be interested in
To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the tec
puteri [66]

In order to assist an end user, a help desk technician can use the network protocol with a default TCP/IP port number of <u>3389</u>.

<h3>What is the TCP/IP protocol suite?</h3>

The TCP/IP protocol suite is an abbreviation for Transmission Control Protocol and Internet Protocol and it's a standard framework for the transmission (prepare and forward) of information on digital computers over the Internet.

In the Transmission Control Protocol and Internet Protocol (TCP/IP) suite, a help desk technician can use the network protocol with a default TCP/IP port number of <u>3389</u> to assist an end user by opening a graphical user interface to connect with the end user's Windows computer.

Read more on TCP here: brainly.com/question/17387945

#SPJ1

7 0
2 years ago
Which of the following translates packets so that the node can understand them once they enter through a port?
FinnZ [79.3K]
A cluster compute server includes nodes coupled in a network ... Each VNIC typically is assigned its own MAC address by the VMM or VM, ... translation or mapping storage at the NIC of each node in the cluster ...... a wired or wireless network (e.g., network accessible storage (NAS)). .... Google Translate ...
5 0
4 years ago
Read 2 more answers
The ____ loop can be used to process each element of an array.?
salantis [7]
The "For each" loop can be used to process each element of an array.?
4 0
3 years ago
Harold included an excerpt from an Internet magazine in an article he wrote for the school newspaper. However, he did not ask pe
neonofarm [45]

Could be all of the above. But for school i'd assume only a suspension.

3 0
3 years ago
Read 2 more answers
Imagine that you have just been given a super high-tech, life-sized robot that can communicate with you and accomplish tasks. De
Svetlanka [38]

Answer:

The robot has several inputs for speech recognition and sight like a microphone (as its ears) and cameras for sight. The robot has neural networks of programmed instructions in its processor which is used to process data received from the input devices and the result comes out as a response (like the robot speaking with a speaker as its mouth). This clearly defines the robot as a computer system.

Explanation:

A computer system is an electronic device that accepts input from a user or its surrounding, processes the data received and returns the output of the processed data.

The robot is able to receive data, process the data with its processor and responds or sends feedback to the user.

4 0
3 years ago
Other questions:
  • Use Python programming (or Excel) to analyze and plot a real equilibrium sedimentation equilibrium experiment. The data are from
    7·1 answer
  • To collect data using Google Analytics, which steps must be completed? (select all answers that apply)
    9·1 answer
  • What is <br> Warehouse schema.
    14·1 answer
  • Alisha's teacher usually includes lots of comments on student tests to help them understand why their answers were
    8·2 answers
  • Select the examples that best demonstrate likely employers for Journalism and Broadcasting workers. Check all that apply.
    11·2 answers
  • If you suspect corrupted system files are causing issues, what command can be run to search for and replace the corrupted files?
    13·1 answer
  • Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open o
    6·1 answer
  • To insert text from a separate file into your Word document
    10·1 answer
  • PYTHON CODING QUESTION
    10·1 answer
  • What are the differences and similarities of computer virus and biological virus. Give 4 examples
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!