answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
2 years ago
4

Peter would like to create video games for a living. What two skills are necessary?

Computers and Technology
2 answers:
Effectus [21]2 years ago
7 0

Answer:

computer and creativity

Explanation

creating video games you need to be creative and computer skills

lapo4ka [179]2 years ago
3 0

I believe it would be Computer and creativity

You might be interested in
The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
Sonbull [250]

Answer:

The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology ,  extended analysis of all stages

Explanation:

Solution

Penetration testing has several methodologies which include :OSSTMM and PTES  

The comparison between OSSTMM and PTES is stated as follows:

OSSTMM:                                                

Security assessment methodology

More Theoretical  

Metrics based

PTES :

Technology oriented

Penetration testing methodology

Extended analysis of all stages

Now,

There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)

  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

Now,

The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.

The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.

Six areas are covered by OSSTMM which are:

  • Information security
  • Process security
  • Internet technology security
  • Communications security
  • Wireless security
  • Physical security
7 0
2 years ago
Write multiple if statements. If car_year is 1969 or earlier, print "Few safety features." If 1970 or later, print "Probably has
Kazeer [188]

Answer:

<em>import java.util.Scanner;</em>

<em>public class Hggg {</em>

<em>        public static void main (String [] args) {</em>

<em>            System.out.println("Enter the car make year");</em>

<em>            Scanner in = new Scanner(System.in);</em>

<em>            int car_year = in.nextInt();</em>

<em>            if (car_year<1969){</em>

<em>             System.out.println("Few safety features.");</em>

<em>            }</em>

<em>            else if (car_year>=1970 && car_year<1990){</em>

<em>                System.out.println("Probably has seat belts.");</em>

<em>            }</em>

<em>            else if (car_year>=1990 && car_year<2000){</em>

<em>                System.out.println("Probably has seat belts.");</em>

<em>                System.out.println("Probably has antilock brakes.");</em>

<em>            }</em>

<em>            else if (car_year>=2000){</em>

<em>                System.out.println("Probably has seat belts.");</em>

<em>                System.out.println("Probably has antilock brakes.");</em>

<em>                System.out.println("Probably has airbags.");</em>

<em>            }</em>

<em>        }</em>

<em>    }</em>

Explanation:

In this solution, multiple if statements have been used to accomplish each step. Observe that there are more than one print statements when year is greater than 1990 because the condition applied to year greater than 1970 holds true for every year greater than 1970 (1990, 2000 etc)

3 0
2 years ago
What does the following function return? void index_of_smallest(const double all, int startindex, int numberOfSlots); A. a doubl
Flauer [41]

Answer:

nothing

Explanation:

Because the return type of the function is void. void means does not return any thing.

The syntax of the function:

type name( argument_1, argument_2,......)

{

  statement;

}

in the declaration the type define the return type of the function.

it can be int, float, double, char, void etc.

For example:

int count( int index);

the return type of above function is int. So, it return integer.

similarly,

void count(int index);

it return type is void. So, it does not return any thing.

7 0
2 years ago
When a range of IP addresses is set aside for client devices, and one of these IPs is issued to these devices when they request
Pepsi [2]

Answer:

The answer is "Dynamic".

Explanation:

The dynamic allocation of the IP address describes the difference from once in a while, unlike with a static IP address.  

  • In this many residential networks are work on different IP addresses, which requires, and provides clarification.
  • It is also known as an economical, Provides by "ISP" to allocate a dynamic IP address to certain subscribers.
7 0
2 years ago
Which role is delegated to personnel of the IT department and is responsible for maintaining the integrity and security of the d
enyata [817]

Correct question.

Which role is delegated to personnel of the IT department and how is responsible for maintaining the integrity and security of the data?

Answer:

<u>data custodian</u>

<u>Explanation:</u>

Remember, every organization generates data, and large organizations generate even larger data.

Hence, the role of a data custodian in an organization requires He implements measures to protect the organization's data, store and backup the data, as well as granting access to the data to authorized persons when needed.

3 0
2 years ago
Other questions:
  • Shirley was unsure about what career to go into. Her high school counselor suggested a personal assessment to point out Shirley’
    12·2 answers
  • Mr. Cooper would like to customize his Excel software so his students can create an electronic graph in Excel for their lab repo
    6·1 answer
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • Write a program that simulates the functionality of a vending machine having the following characteristics:• The vending machine
    11·1 answer
  • Write measurable performance objectives.Suppose that a trainer has identified as a generalgoal for a training module,"Able to fo
    13·1 answer
  • 2 Name the package that contains scanner class?​
    10·1 answer
  • Assume you have a variable, budget, that is associated with a positive integer. Assume you have another variable, shopping_list,
    11·1 answer
  • Team A found 342 errors during the software engineering process prior to release. Team B found 184 errors. What additional measu
    12·1 answer
  • Java Programming home &gt; 1.14: zylab training: Interleaved input/output Н zyBooks catalog Try submitting it for grading (click
    6·1 answer
  • Ali has created a small program in Python, but he wants to store his data in a multi-dimensional array. He would like to use adv
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!