1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
15

Rom a game design perspective, including some risks in your game can help make it both exciting and challenging, but also what e

lse?
A.
humorous

B.
frustrating

C.
confusing

D.
rewarding
Computers and Technology
1 answer:
wolverine [178]3 years ago
8 0

Answer:

Depends on the player base

Explanation:

I would say rewarding to be honest because people like rewards and if they look cool people might play even at their bedtime but humorous might make players play the game more to see the jokes but I kind of doubt it, frustrating... they either rage or try to beat the quest or whatever it is to flex or something I don't know and confusing, like the frustrating one but people are into mystery so I think C would be better then B but I don't know about the other 2 so In my opinion I would say D

You might be interested in
This assignment is based on Exercise 8.4 from your textbook. Each of the following Python functions is supposed to check whether
Svetradugi [14.3K]

Explanation:

#1 is wrong because if the first character is not lowercase, it stops and returns false, ignoring all the other characters. It can be fixed by removing the else: statement and moving the return False statement outside of the loop.

This is efficient; if one lowercase character is encountered, the function 'knows enough' and can return true. Only if no lowercase is encountered it has to loop all the way to the end.

You can try this out on repl.it.

Many of the others functions have problems in them. #4 looks OK.

4 0
3 years ago
PLEASE HELP WITH THESE QUESTIONS!!!! 19 POINTS!!!!!
Anton [14]
1. C.) Macintosh
2. B.) Semiconductor
3. D.) Microchip
8 0
3 years ago
Read 2 more answers
The expressionvecCont.empty() empties the vector container of allelements.
Semenov [28]

Answer:

False

Explanation:

vector is like a dynamic array that has a special ability to resize automatically when it required.

vector has several functions:

like, insert() to insert the element in the vector.

delete() for delete the one element at a time.

empty() is also the function used in the vector. It is used for checking the vector is empty or not.

it gives the Boolean value (TRUE or FALSE), if the vector is empty it gives the output TRUE if the vector is not empty it gives the output FALSE.

It is not used for empty or deletes all elements of the vector.

Therefore, the answer is False.

4 0
3 years ago
What is the significance of the following terms A A L U control unit in the CPU​
WARRIOR [948]

Answer:

Explanation:

The function of ALU is to perform arithmetic operations(add,subtract, multiply,division) as well as logical operations(compare values).

The function of CU is to control and coordinate the activities of the computer.

8 0
3 years ago
A third party intercepting a packet and downloading its information before it is sent onward toward its destination is called
SSSSS [86.1K]

Answer:

Explanation:

<u>Packet sniffing</u> is the process of capturing each packet that is transmitted over the network and analyzing its content. Most of the time, packet sniffing is used to troubleshoot network problems or to gather network statistics. The software or device used for capturing packet data is called packet sniffer, packet analyzer, network sniffer or simply network analyzer.

The Packet Sniffer Sensor monitors, among other things:

• Total traffic

• Port sniffer

• Web traffic (HTTP, HTTPS)

• Mail traffic (IMAP, POP3, SMTP)

• File transfer traffic (FTP, P2P)

• Infrastructure traffic (DHCP, DNS, ICMP, SNMP)

• Remote control (RDP, SSH, VNC)

• Other UDP and TCP traffic

Third party intercepting a packet and downloading it information before it is sent onward toward its destination is called <u>Packet Sniffer</u>

4 0
3 years ago
Other questions:
  • john wants to view sarah's assignment files on his computer. but he cannot open them because of version problems. which upgrade
    14·2 answers
  • You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. Wh
    10·1 answer
  • When a communication exchange that does not verify the identity of the endpoints of a communication and accepts any properly for
    10·1 answer
  • What is a non-example for job application???
    11·1 answer
  • Animation affects can be applied on both................ and................ on a slide​
    5·1 answer
  • What is the difference between a debit card and<br> a smart card?
    15·1 answer
  • Take points for free who are new and enjoye them
    9·2 answers
  • Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. Wh
    7·1 answer
  • You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and
    14·2 answers
  • A constraint that is concerned with cost and must be considered when designing is Group of answer choices Economic Aesthetic Pol
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!