Where can I learn how to make my own video game for free?

Answers

Answer 1
game’s top rack not top pop
Answer 2

Answer:

I dont really think you can make a video game for "free" but i found this website:Ads

www.buildbox.com/

The power to create 2d & 3d mobile games without coding.


Related Questions

How many hours does the average American child spend on the computer? a 7 hours a day b 5 hours a day c 3 hours a day

Answers

Answer:

the estimated time is 7 hours, especially middle school and high school

Explanation:

you need to finish all your classes plus your homework

Answer:

thanks it's A) 7 hours a day

Explanation:

thank you... I got on the test.

Pixel Data
Assume your friend just sent you 32 bits of pixel data (just the Os and is for black and white pixels) that were encoded after sampling an image.
Choose the two statements that are true. ⬇️

The 32 bits of pixel data is enough to produce the image using the widget. Nothing else is needed.

The digital image would be an exact copy of the analog image.

The correct width and height must be input into the pixelation widget to produce the image.

The fact that only 32 bits were used to represent the image Indicates relatively large sample squares were used. The digital Image may vary from the analog
image significantly

Answers

Answer:

-The correct width and height must be input into the pixelation widget to produce the image.

- The fact that only 32 bits were used to represent the image indicates relatively large sample squares were used. The digital image may vary from the analog image significantly.

Explanation:

What is the difference between being an affiliate and an independent station ?what are the benefits to being an affiliate

Answers

Answer:

So the difference is one does its own thing the other is someone who is working with another.The benifits are that if it is something good done you both get the reward the bad part is that if its bad then you both get in trouble for it.

Explanation:I hope this helps

Describe how the process of sampling, RGB pixels, and binary sequences work together to display a digital color image.

Answers

Sampling the RBG pixels, and binary sequences collaborate to produce a digital color picture, enabling the PC to know the RBG pixel and the opacity for that pixel. The mixture of these elements gives users digital photography.It is a way to transform the analog image into a digital one. These analog images using binary sequences using models of 0's and 1's, and the RGB pixels appear on our screen when we sample our analog images.They function together because you have to utilize binary sequences to display the color photo and also to convert the analog to what you would like it to be. This digital photograph you want produces RGB pixels.

Learn more:

brainly.com/question/17653156

What is the meaning of creating??​

Answers

Answer:

You can make or produce

Explanation:

You can put anything together and make anything together as long as it is not harmful

The "Core of Marketing" is?
A.Perceived Value
B.Real Value
C.Social Media
D.Utility

Answers

Answer :

C. Social Media.

B Perceived Value

Explanation:

I took the test

NoSQL databases:________.
a) are geared toward transaction consistency; not performance.
b) support only small amounts of sparse data.
c) provide fault tolerance.
d) are based on the relational model.

Answers

Answer:

Option c (provide fault tolerance) is the appropriate choice.

Explanation:

NoSQL databases often recently attracted considerable attention as they would be easier to configure, provide enhancing understanding as well as appear to always have quicker data recovery intervals. They become quicker and simpler to manage but also have not the same standards and monitoring methods.

Some other options in question are not relevant to something like a particular circumstance. So that the option above will be the appropriate one.

Answer:

c) provide fault tolerance.

Explanation:

Fault tolerance means the ability of a computer or network to continue working without any interruption when any of its components fail. Fault tolerant systems use backup components that takes place of the failed components so that there is no loss of service. In cases of failure the system can continue at a reduces level instead of failing completely. SQL database is not fault tolerant so it willl not function in case of interruption or system failure.

In your opinion, what is an example of an innovative solution to an engineering problem? Explain briefly why you chose this answer.

Answers

Explanation:

One of the things I’ve been writing and talking about a lot lately is the fact that solving problems collaboratively is an incremental process. In fact, in my book, Lost at School, I made mention of the fact that the model could just as easily have been called Incremental Problem Solving or Progressive Problem Solving. I thought the collaborative aspect of the model was the most important to emphasize, but that doesn’t mean that the incremental component isn’t almost as crucial. Often people who are new to the model enter the process of resolving a problem as if it’s a one-shot deal. If you have experience in using Plan B, you already know that most problems require more than one visit to Plan B to resolve. In other words, longstanding, complicated problems aren’t likely to be resolved the first time you try to discuss them. There’s a lot of information to be processed before a given problem can be solved. You need to gather information so as to achieve the clearest possible understanding of the kid’s concern or perspective on the problem (for the unfamiliar, that’s called the Empathy step). Then, you need to be clear about and articulate your own concern (that’s the Define the Problem step). Then, you’ll want to brainstorm with the kid so as to consider the array of potential solutions that could be applied to the problem and consider whether each solution truly addresses the concerns of both parties (that’s the Invitation). There’s a good chance you won’t even make it through all three steps of Plan B in the first attempt on a given unsolved problem (nor should you necessarily even try). If Plan B were a “technique,” then disappointment over not making it through all three steps in one conversation would be understandable. But Plan B is not a technique, it’s a process. As I’ve often emphasized, if you only make it through the Empathy step in the first attempt at Plan B on a given problem but you emerge with a clear sense of a kid’s concern or perspective on a problem that’s been causing significant angst or conflict, that’s quite an accomplishment. You’ll get back to the remaining steps at your earliest opportunity. There’s also an excellent chance the first solution you and the kid agree on won’t solve the problem durably. As you may know, this is usually because the original solution wasn’t as realistic and mutually satisfactory as the two parties first thought. But it could also be because the concerns weren’t as clear or simple as it first seemed. If a solution doesn’t stand the test of time, your goal is to figure out why, which means gathering additional information about the concerns of the two parties and why the solution may not be working so well. Plan B should always conclude with both parties agreeing to return to the problem if the solution being agreed upon doesn’t solve the problem durably. So if your enthusiasm for Plan B waned because your first solution didn’t stand the test of time, take heart: that’s not unusual. Many people enter Plan B with great hope, eager to see their new approach to helping a challenging kid pay quick dividends. In fact, Plan B may well pay quick dividends…not necessarily because the problem is yet durably solved, but because of the relationship- and communication-enhancing that occurs. And while the occasional problem – often simple ones – can be resolved with one visit to Plan B, now you know that several repetitions of Plan B may be necessary on each unsolved problem. Thanks for reading.

Can some one help sorry I just so confused on this and I keep failing it I just need the help So choose the best answers

Answers

Answer:

i7tyerged

Explanation:

which form of communication is extremely private​

Answers

Intrapersonal Communication

Your Turn
Complete the statement below, and then click "Submit" to compare
your work with an example,
According to the Employee Manual, e-mail accounts...
Submit
2008 Gol
< PREVIOUS
NEXT >
SAM
Clin

Answers

Explanation:

what grade yoou in

To interact with the World Wide Web, a client computer needs an application layer software package called a:

Answers

Answer:

web browser

Explanation:

The internet is a network, the www is a system of websites and webpages that uses the internet. A browser makes sense of the data of webpages.

You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before extracting them. Which of the following commands would you use to do this?
A. tar uvf data79.tar
B. tar cvf data79.tar
C. tar xvf data79.tar
D. tar rvf data79.tar
E. tar tvf data79.tar

Answers

Answer:

D. tar rvf data79.tar

Sarah Jones is a coder who is working with a team to create a new mobile operating system. At their last meeting, the team discussed whether to make the code open source or closed source. What are benefits to each for the developer and for the user? What responsibility does the developer have to ensure the quality of an open source program?

Answers

Explanation:

Open-source software in simple terms refers to software whose source code can be changed by another developer other than the original developer (the original creator).

Benefits:

it allows improvementsit is easy to get tutorials about the software from several developers.fewer usage restrictions

A Closed-source software does not allow modification, in other words, it means programmers cannot improve the program expect if given permission by the creators.

To ensure the quality of the program the developer needs to perform periodic internal testing.

The benefits to each for the developer and for the user are:

It allows for modifications.It is easy to learnThere are few restrictions.

What is an Open Source Software?

This refers to the type of software in which the source code can be modified by another developer.

With this in mind, we can see that a closed source software is rigid and does not allow modifications which leads to the writing of code from scratch.

Read more about open source software here:

https://brainly.com/question/4593389

Laura joins a company as a wireless network engineer What will be some of her tasks and responsibilities?

Answers

Answer:Design and implement WLANs and other wireless networksWrite manuals and document current network proceduresDesign and validate the performance, quality, and reliability of the RF link.Handhold other in-house engineers to train them on wireless technologies, besides guiding other non-technical people.Understand client requirements to be able to cater to their appropriate needsManage firewalls, such as Palo Alto, Juniper or Cisco ASA.Have extensive knowledge of routing protocols (OSPF, EIGRP, and BGP).Make sure that all equipment, including servers and the other network products, are well-connectedEnable data and system protection by developing and maintaining mechanisms for backing up and retrieval.Proactively handle all network security solutions.Make use of testing and diagnostic tools to assess and modify equipment

What would be the best solution for the customer to share the monitor, mouse, and keyboard between the two computers quzlet

Answers

Answer:

A KVM switch.

Explanation:

A KVM switch would be the best solution for a customer to share the monitor, mouse, and keyboard between the two computers assuming he or she has one computer specifically for web services and another for a different purpose.

A KVM is an acronym for keyboard, video and mouse.

Basically, it is a hardware device which enables computer users to connect a keyboard, mouse and monitor (video display device) to several other computers and as such facilitates the sharing of these devices between multiple computers.

When running a spelling and grammar check, which of these buttons does Nora need to press when she wants to fix
an error after selecting the correct option in the Not in Dictionary/Suggestion area?
O Click the OK button to accept the change.
Click the Autocorrect button to accept the chantie.
Click the Add to Dictionary button to accept the change.
Click the Change button to accept the change.

Answers

Answer:

The answer is D

Explanation:

The buttons that  Nora need to press when she wants to fix an error is to click the Change button to accept the change.

What is grammar checking?

A lot of Writers are known to often make use of grammar checker to know if the tenses of their language is correct and to also check for grammatical correctness of their work.

Conclusively, The buttons that  Nora need to press when she wants to fix an error is to click the Change button to accept the change as it will quickly effect the change she desires.

Learn more about grammar check from

https://brainly.com/question/10810979

#SPJ2

The part of a screen that holds its own document or message.
a) Pointers
b) Menu
d) Icons
c) Windows

Answers

The icons is the answer

The part of a screen that holds its own document or message is called; Icons

Icons

The correct answer here is Icons. This is because In computing, an icon is defined as a pictogram or ideogram that is usually displayed on a computer screen to aid the user in navigating a computer system.

Now, the icons are easily comprehensible symbols of a software tool, function, or a data file, that can be accessible on the system and is just like a traffic sign.

The icons can serve as an electronic hyperlink or even file shortcut to access a program or even data. The user can activate an icon using a mouse or even voice commands

Read more about Icons at; https://brainly.com/question/1968358

Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFile = open("games.txt", "w") You write two lines to the file in the program. How many lines are in the file when you close your file?
A. 2
B. 82
C. 80
D. 0

Answers

Answer:

2

Explanation:

Edge 2021

The number of  lines are in the file when you close your file is 82 lines. Hence option B is correct.

What is program?

Program is defined as a series of instructions written in a programming language that a computer may follow. Software, which also contains documentation and other intangible components, comprises computer programs as one of its components.  Programs are collections of instructions that a computer follows.

The line, character, word, and byte counts of a file can be discovered with the wc program. To count the number of lines, we add the -l option to wc. This will provide the file's name and the total amount of lines.

Thus, the number of  lines are in the file when you close your file is 82 lines. Hence option B is correct.

To learn more about program, refer to the link below:

https://brainly.com/question/3224396

#SPJ2

where are some places that cyberbullying occurs? check all that apply

Answers

Answer:

social media like  snap chat twitter  and face book .it can even happen over email.or in school chats.

Explanation:

social media and school

A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?A. 192.168.0.55B. 192.168.1.0C. 192.168.1.1D. 192.168.5.5E. 255.255.255.0

Answers

Answer:

The answer is "Option C".

Explanation:

This IP address is used as a local network or gateway by devices like d-link as well as other system products. In this address companies operating router access permission to enable the system administrator to set up one's systems and adapters, that's why in this question, the "option c" that is "192.168.1.1" is correct.

Is (x.y)' and x'.y' the same? Boolean Algebra

Answers

No its not the same

x+y, x'+y, x.y, and x. (y+z') are all Boolean expressions • xyz+x'yz'+xyz'+(x+y)(x'+z) is a Boolean expression • x/y is not a Boolean expression • xy is not a Boolean expression.

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Answers

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Another term for slow motion, where time appears to be moving slowly in a video is

Answers

Answer:

Slow motion (commonly abbreviated as slo-mo or slow-mo) is an effect in film-making whereby time appears to be slowed down. It was invented by the Austrian priest August Musger in the early 20th century.

Explanation:

The slow motion means the movement of object /body with respective to its surrounding but with a relative slower speed. The fast motion means the movement of object /body with respective to its surroundings but with relative greater speed.

2.7 Code Practice: Question 1

Write a program that takes three numbers as input from the user and prints the largest

Can someone please help me with this because I’ve been struggling all day

Answers

Answer:

You didn't specify the programming language

I'll answer using Python

nums = []

for i in range(1,4):

     inp = int(input("User Input: "))

     nums.append(inp)

nums.sort()

print(nums[-1])

Explanation:

I made use of list in answering this question.

Start by declaring an empty list

nums = []

Use iteration to enter the list elements

for i in range(1,4):

     inp = int(input("User Input: "))

     nums.append(inp)

Sort the list

nums.sort()

Then print the element on the last index

print(nums[-1])

The code below is in Java

It uses if-else structure to find out the largest number among three numbers given by the user.

Comments are used to explain each line of the code

//Main.java

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    //Create a Scanner object to be able to get input

    Scanner input = new Scanner(System.in);

   

    //Declare the variables

    int number1, number2, number3, largest;

   

    //Ask the user to enter three numbers

 System.out.print("Enter the first number: ");

 number1 = input.nextInt();

 System.out.print("Enter the second number: ");

 number2 = input.nextInt();

 System.out.print("Enter the third number: ");

 number3 = input.nextInt();

 

 /*

     Check if the first number is greater than or equal to the second and third number.

     If it is, the largest is the first one.

     Otherwise, check if the second number is greater than or equal to the first and third number.

     If it is, the largest is the second one.

     If the previous conditions are not satisfied that means third is the largest one

 */

 if(number1 >= number2 && number1 >= number3)

     largest = number1;

 else if(number2 >= number1 && number2 >= number3)

     largest = number2;

 else

     largest = number3;

 

 //Print the largest number  

 System.out.println("The largest number is " + largest);

}

}

You may see a similar question in the following link:

brainly.com/question/17132559

A computer application such as Microsoft Access that is used to store data and convert it into information is a ________________________.

Answers

All data is stored in table

Which of the following statements is true regarding Bell Labs? Select 3 options.

Researchers from Bell Labs are responsible for the invention of the transistor.

They were responsible for developing the first mechanical computer, called the Analytical Engine.

They developed the first cross country network to connect academic institutions.

Work from their researchers resulted in nine Nobel prizes.

They are credited with creating the Unix operating system and solar cells.

Answers

Answer:

They are credited with creating the Unix operating system and solar cells.

Work from their researchers resulted in nine Nobel prizes.

Researchers from Bell Labs are responsible for the invention of the transistor.

Explanation:

Which business filing process puts documents or data in the order by date? a. Linear
b. Reverse chronological
c. Nonlinear
d. Chronological

Answers

Answer:

d. Chronological

Explanation:

Chronological can be defined as an arrangement of data, items or documents in the order in which they occurred or happened (in time), from the earliest to the most recent or latest.

Hence, chronological order is a business filing process which puts documents or data in the order by date.

For instance, the arrangement of documents in a shelf from January to December.

How do all apple phones work?

Answers

Answer:

The OS also lets you multitask and move through multiple open applications, just like you can on a laptop or desktop computer. But instead of using a mouse or a physical keyboard, the iPhone uses virtual buttons and controls that appear on its screen.

Explanation:

How might an inventory of activities be different from an inventory of objects? *(I don’t understand this question. )*

Answers

I inferred you are referring to a business case, not computer and technology.

Explanation:

Put simply, an inventory of activities involves a record of the business routine activites such as last maintainance, last purchase of supplies etc.

However, the inventory of objects is diffrent as it records specifically how much inventory (objects; goods) a business have on hand.

Other Questions
55 POINTS!!! 3. Samantha conjectures that for , it is true that . Is her conjecture correct? Why or why not? Answer: Which short-term financial managers are involved with selling on credit and are directly responsible to the vice president of finance? How did the transatlantic slave trade cause an increase in wars in Africa? a marble is shot horizontally from a table .8 m High, and it lands, 1.2 meters away horizontally. what was the initial velocity of the marble as it left the table label the components of systems theory In which fields were Mississippian artisans noted for their work? Check all that apply. beading featherwork metalwork painting silversmithing weaving WILL GIVE BRAINLIEST Read the passage. From Morte DArthur by Sir Thomas Malory And so they met as their pointment was and were agreed and accorded thoroughly. And wine was fetched and they drank together. Right so came an adder out of a little heathbush, and it stung a knight in the foot. And so when the knight felt him so stung, he looked down and saw the adder. And anon he drew his sword to slay the adder, and thought none other harm. And when the host on both parties saw that sword drawn, then they blew beams, trumpets, horns, and shouted grimly. And so both hosts dressed them together. And King Arthur took his horse and said, Alas, this unhappy day! and so rode to his party, and Sir Mordred in like wise. What is the main idea of this passage? A) Sir Mordred fatally wounds King Arthur. B) A knight kills a snake with his sword. C) King Arthur attempts to slay, or kill, Sir Mordred. D) King Arthur and Sir Mordred are expressing their distrust of each other. Jose Escalante worked at a skateboard shop for 40 hours at his regular wage of $7.50. He then worked for 8 hours at his overtime wage of time and a half. What is the total amount Jose earned? how did the classical liberal principles influence the United States(name reasons why) Calculate the change in time for each quarter of the track. Record the change in time in Table E of your Student Guide. The change in time for the first quarter is seconds. The change in time for the second quarter is seconds. The change in time for the third quarter is seconds. The change in time for the fourth quarter is seconds. Essay on exploration J&H Corp. recently hired Jeffrey. His immediate mandate was to analyze the company. He has to submit a report on the company's operational efficiency and estimate potential investment in working capital. He has the income statement from last year and the following information from the company's financial reports as well as some indust averages Last year, J&H Corp. reported a book value of $650 million in current assets, of which 30% is cash, 32% is short-term investments, and the rest is accounts receivable and inventory The company reported $552.5 million of current liabilities including accounts payable and accruals. Interestingly, the company had no notes payable claims last year. There were no changes in the accounts payables during the reporting period.The company, however, invested heavily in plant and equipment to support its operations. It reported a book value of $1,040 million in long-term assets last year Income Statement For the Year Ended on December 31 (Millions of dollars) Industry Average J&H Corp Net sales $2,700 2,160 108 2,268 $432 $3,375 2,700 135 2,835 $540 81 $459 184 $275 Operating costs, except depreciation and amortization Depreciation and amortization Total operating costs Operating income (or EBIT) Less: Interest Earnings before taxes (EBT) Less: Taxes (40%) Net income $389 156 $233 Based on the information given to Jeffrey, he submits a report on January 1 with some important calculations for management to use, both for analysis and to devise an action plan. Which of the following statements in his report are true? Check all that apply a) J&H Corp. has-$110.5 million of noninterest-bearing current assets net of noninterest-charging liabilities b) The company has $442.0 million in operating assets and $552.5 million in operating liabilities c) J&H Corp. has $148.7 million of net operating capital d) The firm uses $929.5 million of total net operating capital to run the business e) Based on the information on industry averages, other players in the industry would generate higher profits 2.4+10m=6.89 what does m equal A fast Humvee drove from desert A to desert B. For the first 12hours, it travelled at an average speed of 185 km/h. For thenext 13 hours, it travelled at an average speed of 160 km/h.What was the average speed of the whole journey?km/h Normally used for small digital displays Nitrogen-fixing bacteria in soil can convert excess nitrogen into _______, which can contaminate groundwater. A/An _______ forms around a well when the water table begins to slope toward the well. The water in an artesian well comes from a/an _______ aquifer. A well not only has to reach the _______ but also has to go deeper. _______ aquifers are more prone to pollution. The two primary components of a septic system are a septic tank and a/an _______. Groundwater that comes to the surface naturally is known as a/an _______. What is the Absolute value of |-9-8|? A group of 4 children and 8 adults are going to the zoo. Each child tickets cost $10, and each adult tickets cost $15. How much will the group spend on tickets to the zoo? Periodic Table: Which families are highly reactive? Which family is unreactive? Can you please please help me with this pleas i will give you a branlist