1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
3 years ago
11

Which type of computer do dedicated gamers and video editors prefer?​

Computers and Technology
1 answer:
Shtirlitz [24]3 years ago
6 0
<span>Notebooks sacrifice processing power and memory for portability. This means games won't reach their maximum potential (lower framerates and graphics settings). Video editing requires a lot of memory. Supercomputers are usually tailored for very specific tasks and no good for gaming or general video editing (they do however excel at rendering 3D scenes). Tablets sacrifice processing power and memory for portability but also trade the mouse and keyboard for a touchscreen. They don't have the memory for video editing and dedicated gamers usually prefer a mouse and keyboard. This leaves the desktop PC as their preferred choice which has room for lots of memory, a fast processor and a fast graphics card.</span>
You might be interested in
Select all examples of proper keyboarding technique.
emmasim [6.3K]
Keep your eyes on the text and aim to make no mistakes
4 0
3 years ago
Read 2 more answers
A program that will read each player’s name and golf score as keyboard input,
PtichkaEL [24]
Use for loop and question inside it
7 0
3 years ago
Which pickaxe in minecraft to use?
Law Incorporation [45]

Answer:

Diamond pickaxe with efficiency 3

Explanation: It will mine quicker and you can just get unbreaking

6 0
3 years ago
your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
nlexa [21]

The protocol that should be used for establishing a secure network connection is SSH.  

The following information is to be considered:  

  • SFTP is secure also it is a protocol for file transferring that applied SSH.
  • IP, FTP, and DHCP should not be for safety purposes as they are not secure.
  • SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

4 0
2 years ago
Sam's take-home pay is $743. His deductions are $25 for OASDI, $5 for Medicare, and $27 for income tax. What is his gross pay? A
Katarina [22]

<u>Answer:</u>

A. $686.00

<u>Reasoning:</u>

25+5+27=57 So the total amount of the deductions is $57

Subtract 57 from 743

743 - 57 = 686

So he is left with 686

5 0
3 years ago
Other questions:
  • QUESTION : John travels a lot and he needs to access his documents and services on the go. Which of these technologies allows hi
    15·1 answer
  • Once the technology for the collection of solar power is in place what will be two benefits of its use
    9·1 answer
  • Brainliest to whoever can guess what year this corvette logo is from. Make your guesses
    11·1 answer
  • Your boss asks you to work through the weekend to install new software on the applications server that serves up applications to
    15·2 answers
  • If you enjoy working with livestock, the best cluster in which to research careers would be: A. Health Science. B. Agriculture,
    11·1 answer
  • How to block someone from watching your youtube videos?
    12·2 answers
  • Read the scenario below and then answer the
    14·1 answer
  • What technique involves graphical methods and nontechnical language that represent the system at various stages of development a
    14·1 answer
  • Which of the following is true of operations within a spreadsheet program’s built-in functions?
    15·2 answers
  • Write an inheritance hierarchy for classes Quadrilateral, Trapezoid, Parallelogram, Rectangle and Square. Use Quadrilateral as t
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!