Is it possible to code your own game and if so then where should I go to learn and how to publish it?

Answers

Answer 1

Answer:

Yes there is

Explanation:

It is scratch a coding game to do almost anything you can also code flappybird

Hope this helps.

Have fun with scratch

Answer 2

Answer:

Explanation:

Yes, it is absolutely possible to code your own game. As a beginner, it will be easier to start with something simple like on R-o-b-l-o-x; instead of trying to write a full PC game. It runs Lua and its code is run as scripts which means you can put it anywhere.


Related Questions

Two support services supervisors disagree about a position description for a new help desk position. One said, “The position description should be written as general as possible so we can choose any applicant we want.” The other said, “The position description should be as specific as we can make it so applicants will know whether or not they meet our requirements.” With which supervisor do you agree? Explain why?​

Answers

I aggree with the one that says "The position description should be as specific as we can make it so applicants will know whether or not they meet our requirements.”

Note that when the  specific requirements about a position is made known, it makes the applicant to known if they are fit for that position or not

What is a position description?

The term  position description is also known as "PD" . This is known to be a fact or a statement that talks about the key duties, responsibilities, and role etc. of a position.

It helps to indicates the work to be carried out by the position and when it is specific, one can know if they can do the work or not.

Learn more about position description from

https://brainly.com/question/4677114

write an assembly program that uses the output compare function of a timer to toggle an led every second

Answers

; Set up output compare function

movlw 0x3E

movwf TOCON

; Set up LED port as output

bcf TRISB, 0

; Set up timer

movlw 0xFF

movwf TMR1

movlw 0x60

movwf PR1

; Enable timer and output compare function

bsf T1CON, TMR1ON

bsf T1CON, T1OSCEN

; Main loop

loop:

   ; Wait for output compare event

   btfss T1CON, OCF1

   goto loop

   ; Toggle LED

   bcf PORTB, 0

   btfss PORTB, 0

   bsf PORTB, 0

   ; Clear output compare flag

   bcf T1CON, OCF1

   ; Repeat

   goto loop

Which item is used in Excel to identify the row of a particular cell?
letter
number
type
sheet

The answer is B) number

Answers

Answer:

B) number

Explanation:

you are correct! for instance the cell E3 has the column E and the row 3

A system that stores transactions in a single database, but processes them at various sites is referred to as

a. Centralized system.

b. Database management normalization system.

c. Decentralized system.

d. Distributed system

Answers

Answer:

d. Distributed system

Explanation:

this answer is taken from the book Wiley CPAexcel Exam Review 2015 Study Guide July: Business Environment

its important to remember that it is a single database however the processing takes place off-site. this off-site is the key to remembering it is DISTRIBUTED through various sites

What is the scope of AS-26

A. All of these
B.Rights and Expenditure on the exploration for or development of Minerals
C. Financial Assets
D. Intangible Assets that are covered by another as

Answers

Answer:

is held for use in the production or supply of goods and services or for rentals to others etc

[ASAP!] What is a widget?

1. a part of a GUI that allows a specific type of interaction with the user
2. an action taken by the user or a process, such as a user clicking a mouse or pressing a key on a keyboard
3. an algorithm for handling an error
4. a part of a program that responds to an event​

Answers

Answer:

A

Explanation:

A part of a GUI is the basic definition of a widget.

Comment any additional questions!

Answer:

A or number 1

Explanation:

I took the test and got a 100%, and this answer makes the most sense

What are three ways digital identity is created and kept up? (open answer)

Answers

Answer:

Capture attributes as ID documents or biometric data

Explanation:

Examples of such attributes include biometrics, verified identification documents, and third-party verification procedures. To create a trusted digital ID, there are typically three steps: capturing verified attributes, verification of the documents, and digitization of the ID.

Great day :) toodles

The IT staff at a hospital shares genetic information about specific patients with a life insurance company. Which ethical standard was violated?

Answers

The ethical standard which was violated by the IT staff at a hospital is: confidentiality.

What is PHI?

PHI is an acronym for protected health information and it can be defined as any form of health information for a patient that mustn't be disclosed without the patient's knowledge, approval (consent) or used for the payment of health care insurance for employees.

This ultimately implies that, it is an ethical standard for all health workers to keep and protect protected health information under normal working conditions because they are confidential in nature with respect to Health Insurance Portability and Accountability Act (HIPAA).

Read more on PHI here: https://brainly.com/question/24439144

Which string method returns true if the character is a lowercase letter?

letter = input("Enter a letter: ")

islower(letter)

isLower(letter)

letter.islower() * is correct

letter.isLower()

Answers

The right answer is : is.lower(letter)

Answer: islower(letter)

Explanation: got it right on edgen

The quickest way to change a word is to double
click it.
Select the correct answer
O True
False

Answers

Answer:

I don't think that the fastest way to change a word is to double click it. Even though it highlights it super fast, then you just press backspace once, it doesn't compare to the one where you press the "ctrl" and "backspace" key at the same time, and it makes the whole entire word disappear in the blink of an eye. But, I am not sure if anybody really knows about this trick. So, it is 50/50.

Explanation:

:)

Explain the relationship between one’s point of view and understanding spoken text

Answers

In spoken and audio texts the tone and accompanying sounds convey a point of view. Point of view therefore constructs an attitude towards the subject matter in a text which the reader, listener or viewer is invited to adopt.

Please have a wonderful day <3

explain the measures put in place in order to maintain each of the element of computer security

Answers

Answer:

Contains a firewall.

Try's to keep all software up to date.

Able to use antivirus software and keep it current.

Allows you to use a password

Explanation:

Computer security is important because it keeps your information protected. It's also important for your computer's overall health

Please have a great day <3

(40 PTS) Be specific
Imagine that your computer came to life, grew some arms and legs, and wants to work as your faithful butler. It only understands the most basic commands, and its only desire is to make you delicious food.
You have a jar of peanut butter, a jar of grape jelly, a loaf of bread, and a knife. How would you explain to your computer the process of making a peanut butter and jelly sandwich? Write the commands below as precisely as possible. (Be sure to use definitions if you’re using functions to complete more than one action!

Answers

Answer:

Take a knife. Cut the bread. Open the jar of peanut butter and jelly. Scope of a big chunk of peanut butter and


________ can contain stacked images, text, and other elements which collectively comprise a Photoshop file.

Answers

If you don’t mind can u add the picture it helps me Answer the question better

The ages of ELEVEN(11) students on Environmental Awareness Camp are:
12 9 11 7 10 10 9 9 8 9 11
Find the mean and standard deviation
A. Mean = 9.545; Standard deviation = 1.440
B. Mean = 9.545; Standard deviation = 2.073
C. Mean = 10.5; Standard deviation = 1.440
D. Mean = 10.5; Standard deviation = 2.073

Answers

Answer:

Gonna be smart. This took me a long time.

Explanation:

Result Standard Deviation, σ: 1.3726971700492

Count, N: 11

Sum, Σx: 105

Mean, μ: 9.5454545454545

Variance, σ2:  1.8842975206612

Steps

σ2 =  Σ(xi - μ)2

N=  (12 - 9.5454545454545)2 + ... + (11 - 9.5454545454545)2

11

=  

20.727272727273

11

=  1.8842975206612

σ =  √1.8842975206612

=  1.3726971700492

In simple words. A.

help meeeeeeeeeeeeeeeee

Answers

Answer:

The advantages include much access to photos, digital functions like games and contacts with friends, videos, and you can search questions to anything you like. Disadvantages include things like too much screen time affecting sleep, health, and other physical problems. There is also exposure to explicit content and hatred from strangers.

There are hundreds of editing software for you to try, and many are free to use and are even compatible offline. They can make content related to or look like something in a movie or can be used to make things look nicer and cooler.

RAM is like a computer’s ______________, while a hard drive is like a computer’s ______________

Answers

Explanation:

RAM is what the computer and the applications run on and hard drive is the type of memory all your files and apps are located on

anyone know how to answer questions

Answers

Answer:

yes

Explanation:

what are your questions though? when posting on here you should include the question you would want answered so someone can help you

Psuedo code and flow charts

Answers

Answer:

pseudo is an informal high level description of the operating principle of an algorithm while a flow chart is a diagrammatic representation that illustrates a solution model to a given problem.

You have been asked to investigate a web server for possible intrusion. You identify a script with the following code. What language is the code in and does it seem likely to be malicious? import os, sockets, syslog def r_conn(ip) s=socket.socket(socket.AF_INET,socket.SOCK_DGRAM) s.connect(("logging.trusted.foo",514))

Answers

The code below is written in JavaScript and does not seem malicious.

What is a Malicious Code?

A Malicious code is one that is not designed for any productive end but to cause disruptions in the computer with the objective of

harming the workstation; or destroying the data stored therein.

There are numerous classifications of malicious codes and they can be identified and removed by an application called an Anti-Virus or malicious app remover.

Learn more about JavaScript at:
https://brainly.com/question/16698901

You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you do this

Answers

The option is to Deselect (blank) in the pull-down menu for Customer Sales in the dataset.

How do one delete these rows completely?

If a person is working in the Query Editor (that is the place where one can get data, before you close and apply).

The right thing to do is to select the column that  you want to use to check for nulls and when  the values you are looking at is really blank, you can then click the drop-down and delete Rows in the ribbon, then one can click the option of Remove Blank Rows.

See full options below

Select an answer:

Deselect (null) in the pull-down menu for Customer Sales in the Power Query Editor.

Deselect (blank) in the pull-down menu for Customer Sales in the dataset.

Change the filter so null value rows are not displayed.

Place your cursor to the left of the rows, and then select Delete.

Learn more about dataset from

https://brainly.com/question/24309209

Should new technology be created if there is a chance it will be misused?

Answers

Answer:

yes

Explanation:

sometime great things can happen out of terrible things.

Answer:

No, because if there is a chance that it will be misused, then it should not be created. Also, we are not told exactly how it may be misused - it could have catastrophic impacts, and cause harm.  

Explanation:

Does anyone who uses Visual Studios 2022 know what tool name it is for the pop up menu? Do not send me links please.​

Answers

Answer:

The Commands and Menu Bar

Explanation:

Answer:

are u using a laptop? if so click the window botton if u download the visual studio code 2022 if u didnt download it use the search bar at the bottom of your screen "type here to search" and type in visual studio code 2022 and it will show up so click on it.

For optimum computer performance, what features and or characteristics should a
computer possess to efficiently copy any material from an external device?

Answers

A computer should be compactible and possess a good cache memory size, so as to efficiently copy any material from an external device.

What is a computer?

A computer refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

For optimum computer performance, some of the features and or characteristics that a computer should possess, so as to efficiently copy any material from an external device (hard-disk drive) are:

CompatibilityCache memory size.The computer should have a USB 3.0 port.

Read more on computer here: brainly.com/question/959479

Woulf you rather :
Be a Alpha Wolf
or
Be a Alpha Shark

Answers

Answer:

Alpha wolf

Explanation:

Their superior

(also what is this question? lol)

Answer:

don't know just wanted my points you stole

Explanation:

Please help me answer this in c++, I'm having problems trying to complete this program, thank you!
Modify the mortgage program to display 3 mortgage loans: 7 year at 5.35%, 15 year at 5.5 %, and 30 year at 5.75%. Use an array for the different loans. Display the mortgage payment amount for each loan. Do not use a graphical user interface

Answers

The program is an illustration of loops, and loops are used for iterative purposes

The complete program in C++

The main program is not given, so I will write the new program from scratch.

The program written in C++, where comments are used to explain each action is as follows:

#include<iostream>

using namespace std;

int main(){

   //This declares the required variables

   float monthlyPayment, rate, principalAmount, f;

   int years;    f=1;

.................

See attachment for the complete program

}

Read more about loops at:

https://brainly.com/question/24833629

please answer this question​

Answers

The salary calculator program is an illustration of a sequential program

What are sequential programs?

Sequential programs are programs that do not require loops, iterations or conditional statements

How to write the main program

The program written in Python, where comments are used to explain each action is as follows:

#This initializes the base number of hours

baseHours = 40

#This initializes the base payment

basePay = 600

#This initializes the overtime payment

overtimePay = 300

#This initializes the total hours worked

hoursWorked = 45

#This calculates the total payment

totalPay = baseHours * basePay + (hoursWorked - baseHours) * overtimePay

#This prints the total payment

print(totalPay)

Read more about sequential programs at:

https://brainly.com/question/26642771

List and describe in detail any four power management tools that were developed by at
least two manufacturers to prevent and/or reduce the damage of processors from the
process of overclocking. Your answer must also include the manufacturers name

Answers

Power management tools is a kind of technology that enables the efficient and optimized management of the power that is consumed by computer hardware.

What is the purpose of a power management tool?

The key purpose of a power management tool is to help:

minimize power consumption;save costspreserve the optimal performance of the system.

Examples of power management tools are:

Signal chain PowerADI Power StudioLTpowerPlay, etc.

Learn more about Power management tools at:
https://brainly.com/question/12816781

the difference between tool bar and status bar​

Answers

Answer:

A toolbar offers easier access to tasks typically conducted within the application whereas in the status bar it is displayed at the lower side of the web browser screens and other application windows.

Explanation:

Is hacking always wrong? Creating viruses?

Answers

Answer:

yes

Explanation:

Answer:

Not every “hack” is bad, and not every hacker is a criminal. In fact, many hackers secure websites and companies from malicious actors.

creating viruses is done by negative intention hackers

Other Questions
Differentiate between the scheduling techniques known as CPM and PERT What was once a pond filled with bass fish on Tom's parent's farm is now significantly decreased in population. Which of the following could explain the reason for the decrease in the bass population?a. Drainage from sugar farms has decreased the reproductive rate in fish. b. Fertilizer runoff contains endocrine disruptors that affect reproduction in fish. c. Increased photosynthesis causes competition for food resources. d. Planting sugar cane along the riverbank has created a mass emigration of fish 2. Jada fills her aquarium with water.The graph shows the height of the water, in cm, in the aquarium as a function of time in minutes. Invent a story of how Jada fills the aquarium that fits the graph. Find the missing number if the average is 7.6 and _____A) 8B) 10C) 12D) none of the above Agnes has $1,000 and she wants to have $1,100 accrued after 5 years. what rate does she need to have to meet her goal? 1. according to this article, what caused the demand for insect repellent products to increase during february 2016? In question 8 from Problems 2, you calculated that an archery arrow shot with an initial velocity of 45 m/s at an angle of 10 degrees would travel 70.67 m (2 d.p.) before hitting a target at the same height from which it was released. If the archery target was moved further away from the archer, discuss some kinematic-based strategies that the archer could adopt to ensure that the arrow reaches the target. Ensure that the variables discussed are relevant to your answer. Assume air resistance is negligible. How to describe a changing facial expressions in writing what value of x makes this inequality true? x + 16 < 43 WILL GIVE BRAINLIEST! Calculate the length of AB Larry earns $5.25 per hour helping his neighbor. Last month he earned $220.50. How manyhours did Larry work? The expression 0.09x+(x30) models the final price of a bicycle with an instant rebate in a state that charges a sales tax. The tax is on the original price.Which expression represents the amount of tax that is paid on the bicycle? ument Analysis1. What's the difference between a primary & secondary sourcea 50 points!!Solve |y + 2|>6 A. {y|y4}B. {y|y6} C. {y|y4} One of the acute angles in a right triangle measures 62. What is the measure of the other acute angle in the triangle? Which expression is equivalent to 8(a+3) A plant can produce either purple flowers or white flowers. The purple flower color is dominant over the white flower color. What is the ratio of the offspring with purple flowers to the total number of offspring if two plants that are heterozygous for purple flowers are crossed?1:42:43:44:4 What the value of q? what is the purpose of an online Lowes is having a Customer Appreciation Day Sale. Everything in the store is 25% off. The final purchase for the consumer is $2021.63. What is the cost to the consumer? Sales tax is 5%.