Statement two and three is correct.
Statement 1 is incorrect. A relative reference changes when a formula is copied to another cell while Absolute references remain constant. However, it is safe to say that an absolute address can be preceded by a $ sign before both the row and the column values. It is designated by the addition of a dollar sign either before the column reference, the row reference, or both. Statement C is also correct. A mixed reference is a combination of relative and absolute reference and the formula (= A1 + $B$2) is an example of a mixed cell reference.
Game design document is the term used for the initial document that includes the necessary information to build a game
Explanation:
A game design document serves as a nexus and core to combine and list all features of a game. It consists of written descriptions, images, graphs, charts and lists of data relevant to specific parts of improvement, and is usually formed by what characteristics will be in the game, and sets out how they will all fit together.
Creating a GDD will assist the team's designer in knowing what the fragrance of the game is and the intended range of its overarching world. Holding all the game factors in one well-organized document will help the designer easily communicate their idea to the rest of the team, and also healing to pinpoint deficiencies or missing components of the game. The GDD should serve as your master checklist.
Answer:
It is important so your computer can function properly. the two things that might happen if they are not compatible are that it might crash your computer and that your computer might not function properly.
The correct word here is BANDWIDTH. Bandwidth refers to the quantity of information that a connection to the internet can handle in a given time. For digital devices, the unit of bandwidth is bytes per second. For analog devices it is expressed as cycle per second or Hertz.
Answer War Chalking
Explanation: War chalking is the technique for presenting the WiFi network publicly. This signifies about the WiFi is present but not describes the manner of it , that is whether it is open connection or closed connection.
It can be used by the people in general as well as hackers . Hackers usually tend to attack and hack its security that is present.Hackers then use the WiFi network is then used for their own work after being hacked.