Hello,Can you please help me with the following questions:
3. You enjoy technical matters, have a background in computer science and enjoy coding and playing video games in your free time. Which video game industry job would best match your profile?
a. Game tester
b. Producer
c. Programmer
d. Video game artist

6. Which of the following is an essential skill for game testers?
a. Thorough understanding of Java and C++
b. Technical drawing
c. Technical writing
d. Project management

9. Which of the following skills is the most important when applying for a game artist job?
a. Degree in arts
b. Strong art portfolio
c. Previous game testing experience
d, knowledge of scripting and codeing

10. The Stencyl program is recommended for ______.
a. creating 2D games
b. creating 3D games
c. Starting to learn to program
d. creating gaming art

11. You are passionate about video games, have spent part of your life in different countries and are fluent in their languages. You are considering looking for a job in video games. Which of the following jobs could you be qualified for, considering your skills and experience?
a. Game programming with a focus on languages
b. Translation
c. Game localization
d. Cultural gaming

12. Because it is one of the main programming languages used in some of the most popular game engines in the industry, which programming language does the author of the textbook recommend learning first?
a. Java
b. C Sharp
c. C++
d. SQL

13. Which of the following statements is NOT true about internships?
a. internships offer great opportunity to create and build connections within the industry.
b. Internships lead to a job offer upon successful completion
c. Internships offer an opportunity to get first-hand experience of the industry
d. Internships can be paid or unpaid

15. What is the best approach to take if you have not heard back from a company after applying for a job?
a. Wait, sometimes it takes time to process application and impatience can give a bad impression
b. Visit the company site personally to inquire about the status of your application
c. Try to find out on which side the process may be stalling and take appropriate steps to get the process moving forward, when possible
d. Reapply

18. You are applying for a game programmer job at a reputable gaming company. Your application may stand the best chance of being noticed if you include which of the following in your application?
a. List of all degrees and courses you have taken to acquire and hone your programming skills
b. Portfolio including samples of codes you have created
c. Portfolio including playable video game demo.
d. Portfolio of your artwork.

19. Which of the following is the most important item to include in your CV?
a. All gaming projects you have worked on, paid or unpaid.
b. Extracurricular activities related to gaming.
c. Major accomplishments
d. Short samples of code or technical writing samples.

20. Which of the following job hunting practices is the least effective?
a. Posting CV on job boards.
b. Searching for jobs on job posting sites
c. Doing an internship
d. Applying for a specific job posting via company website

Answers

Answer 1
Answer:

Answer:

C, C, B, C, C, B, B or D, D, A or C, A, D

Explanation:

I am not taking whatever course you are taking, but I would like to know what you're taking. I have only answered the questions to the best of my abilities, so they might be wrong. Next time please award more points for a question so long.


Related Questions

(5 pt.) The name of a variable in the C programming language is a string that can contain uppercase letters, lowercase letters, digits, or underscores. Furthermore, the first character in the string must be a letter, either uppercase or lowercase, or an underscore. If the name of a variable is determined by its first 8 characters, how many different variables can be named in C
Write an algorithm which gets a number N, and prints all the natural numbers less than or equal N. 3.
The string expression strVar.____________________ starts at index pos, replaces the next n characters of strVar with all the characters of str.
. How are returnspredicted in modern microprocessors?
What two benefits are a result of configuring a wireless mesh network? Check all that apply. 1. Performance 2. Range 3. WiFi protected setup4. Ad-hoc configuration​

Broker Ray is closely acquainted with the Subdivision Heights neighborhood of his town. Over the year, Ray has made it a practice to contact homeowners in person and also to send them quarterly mailings. This method of finding listings is known as:

Answers

No multiple choice?

98 POINTS HELP ASAP PLEASE!!!!You have been asked to create a program for an online store that sells their items in bundles of five. Select the appropriate code that would display how many bundles are available for sale.

A.print(5 // totalItems)
B.print(totalItems // 5)
C.print(totalItems(5) )
D.print(5(totalitems) )

Answers

B. Print(totalitems // 5)

Answer:

B. Print Totalltems // 5

Explanation:

Well, if you learn how to create bundles on Amazon, you can eliminate the competition, set your price, and offer customers a product they’ll absolutely love.

Poor quality lateral communication will result in which ofthefollowing?
a. Lack of direction
b. Lack of coordination
c. Lack of delegation
d. Lack of control

Answers

Answer:

b. Lack of coordination

Explanation:

LAteral communication in human resources and organizational communication is known as the communication that exists between peers and colleagues, so that wouldn cause a lack of cirection, delegation or control because its not between bosses and employees, what it would cause would be a lack of coordination between the employees.

Answer:

b

Explanation:

b, lack of coordination

An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned network can be seen sending packets to the wrong gateway. Which of the following network devices is misconfigured and which of the following should be done to remediate the issue? A. Firewall; implement an ACL on the interface B. Router; place the correct subnet on the interface C. Switch; modify the access port to trunk port D. Proxy; add the correct transparent interface

Answers

Answer: (A)  Firewall; implement an ACL on the interface

Explanation:

 According to the question, for re-mediate the issue firewall should be implemented the ACL (Access control list) on the given interface. The access control list is one of the type of logic which selectively give permission or deny the number of packet in the system which to through the interface.

Firewall is the type of device that basically examine the traffic in the network system and also make several decisions in the system. ACL is the set of rule which mainly define the route of the packet in the router interface state.

Write a program that prompts the user to enter a Social Security number in the format ddd-dd-dddd, where d is a digit. The program displays Valid SSN for a correct Social Security number or Invalid SSN otherwise.

Answers

The program that prompts the user to enter a Social Security number in the format ddd-dd-dddd, where d is a digit can be implemented in Python using regular expressions. The regular expression pattern for the SSN format can be used to validate the input.

Pythons code:

```python

import re

ssn_pattern = re.compile(r'^\d{3}-\d{2}-\d{4}$')

ssn = input("Enter your Social Security Number (format: ddd-dd-dddd): ")

if ssn_pattern.match(ssn):

print("Valid SSN")

else:

print("Invalid SSN")

```

In the above code, we first import the `re` module to work with regular expressions.

We then define the regular expression pattern for the SSN format as `^\d{3}-\d{2}-\d{4}$`. This pattern matches any string that starts with three digits, followed by a hyphen, then two digits, another hyphen, and finally, four digits.

We then prompt the user to enter their SSN using the `input()` function. We then check if the entered SSN matches the pattern using the `match()` function of the regular expression object `ssn_pattern`.

If the SSN matches the pattern, we print "Valid SSN". Otherwise, we print "Invalid SSN".

Know more about SSN,

brainly.com/question/31778617

#SPJ4

ssn = input("Enter a valid Social Security number: ")

dashes = 0

nums = 0

message = "Invalid SSN"

if len(ssn) == 11:

   for x in ssn:

       if x.isdigit():

           nums += 1

       elif x == "-":

           dashes += 1

if nums == 9 and dashes == 2:

   message = "Valid SSN"

print(message)

I wrote my code in python 3.8. I hope this helps!

your manager ask you to set up a secure network connection at a remote site which protocol would you use

Answers

Answer:

Remote Access Protocols

Explanation:

Considering the situation above, the most appropriate protocol to use is known as the Remote Access Protocol.

This is because Remote Access Protocol is a combination of techniques and sets of instructions that are used in managing the connection between a remote access server and a remote computer. For example, some of the Remote Access Protocols that can be used are Serial Line Internet Protocol, Point-to-Point Protocol, Point-to-Point Protocol over Ethernet, etc.

Hence, given that a trusted Remote Access Protocol allows people to access a steady, secure connection between desktop sharing and remote access for help desk activities.

Therefore, the Remote Access Protocol can be utilized in setting up a secure network connection at a remote site