1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alika [10]
3 years ago
15

How do you design and create video games for what console game That you want To have it in

Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
7 0

Answer

Making a video game is much less daunting than it might seem. While you likely aren’t going to go from having no experience to making the next Grand Theft Auto, it has actually never been easier to get started making games. Game development tools and resources have become increasingly accessible to the average person, even if they have no programming experience. Often these tools are also available for free.

To try to make things easier for those looking to get started making games, we’ve put together a list of 11 game engines / editors. Some are designed for a specific genre of game or to be incredibly easy for newcomers. Others are professional development tools for AAA games, but are effectively free to use for hobbyists and still offer a lot of learning tools to help those with limited programming experience get started.

There are, of course, a lot of things that go into game development — music, animation, sound, writing, texturing, modeling, etc. — however, the game engine / editor you choose is going to have the biggest effect on what kind of game you can make. If you have suggestions for other engines, software, or learning tools for the other aspects of development, post it in the comments.

You might be interested in
Which data validation alert style should you use to prevent the user from entering invalid data?
mario62 [17]

Answer:

stop

Explanation:

If you set the error alert style to Stop, then you are asking Excel to prevent the user from typing in an invalid value.

5 0
2 years ago
To use an automated teller machine (ATM), a customer must enter his or her four-digit Personal Identification Number (PIN). How
schepotkina [342]

Answer:

10000 possible PINs.

Explanation:

Considering the fact that only numbers are permitted (0 - 9) which gives 10 characters and also that the digits can be repeated, the total number of possible PINs that are possible is 10 x 10 x 10 x 10 = 10000

6 0
3 years ago
As the project manager for a software development project, you are helping to develop the project schedule. You decide that writ
Jobisdone [24]

Answer:

The correct answer to the following question will be "Discretionary".

Explanation:

That form of dependency helps the project or development team to maximize the development process via the growth cycle of that same venture.

  • It is used by managers of the project to establish a "balance" on the timeline.
  • It has also been known as the system which makes use of the largest and most successful quality methods dependent on the team experience.

So, using this type of dependency is far better.

7 0
3 years ago
Davis wants to attach a scanner to his computer. How will he do this?
Aleksandr [31]
It would often connect via a universal serial bus (USB) cable, so answer [B].
8 0
3 years ago
Read 2 more answers
The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos
Zepler [3.9K]
<h2>Answer:</h2>

Option b, c, d are true.

The correct statements are as follows:

<h3>b. Can restrict a computer from receiving network traffic </h3><h3>c. Stops attackers when they are outside of the company's internal network </h3><h3>d. Stop a process or application from launching</h3><h3 /><h2>Explanation:</h2>

Firewall can be defined as a wall or checkpoint that checks each entity before it accesses to go inside or outside a network.

A firewall:

  • makes sure that the data inside a private network is safe by building a wall around it.
  • restricts the malicious data to go inside the network.
  • always ask about launching an application which is blocked by it due to suspicious activity.

A firewall can not:

  • prevent a system from being fingerprinted by port scans.
  • Disable an account.

<h3>I hope it will help you!</h3>
3 0
3 years ago
Read 2 more answers
Other questions:
  • Being tired has very similar effects on the body as what
    7·1 answer
  • This is a wise and hard question.....What is the hardest question in the world? I know the answer do you?
    10·1 answer
  • 4) Wilkes continues to discuss the concept of time and how it relates to the type of photography he does. Why do you feel that t
    12·1 answer
  • Joe, a user, has purchased a new mobile device that uses a different OS than his previous one. Joe wants to copy his contacts an
    10·1 answer
  • In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
    13·1 answer
  • What is the easiest way to deploy a C++ program to a user’s computer? a. Copy the source code to the user’s computer and then co
    13·1 answer
  • Which local folder temporarily stores all outgoing emails until the email program successfully sends them to a recipient?
    8·2 answers
  • Direction: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet of paper
    12·1 answer
  • What are the features of the title bar for the Microsoft word application?​
    15·2 answers
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!