1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
2 years ago
13

What are best strategies for btd battles

Computers and Technology
2 answers:
alina1380 [7]2 years ago
6 0

Early game: get as much banana farms as you can. (If you can, use a monkey farmer agent)

Mid game: get at least 1 troop of every type to kill every kind of bloon (bomb tower, ninja, wizard)

Late game: try to get a few Temple of the Sun god’s on the field, by this time you should have lots of money to sacrifice upgraded troops.


Then just hold off, the more super monkeys the better (preferably the sun ones, the robots are okay too if you prefer)

DENIUS [597]2 years ago
6 0
Defend and taking out you opponent as fast as possible and save some extra before rushing he might also rush
You might be interested in
I need the answers. i don’t get this
bixtya [17]
Run,lazy,turtles,slow,wandering, jump,45,weird,pigs, cows, cousins, pale,rude,candles

There are many answers for this but this is what first came to my mind

Hope this helps
4 0
2 years ago
List four tasks that humans perform frequently, but which may be difficult for a computerized agent to accomplish. Describe the
denis23 [38]

Answer:

im sorry for that

Explanation:

5 0
2 years ago
When Windows deletes the driver package and driver files, in what situation might it not delete driver files used by the device
musickatia [10]

Answer:

when there is no junk

Explanation:

3 0
3 years ago
Attackers have recently launched several attacks against servers in your organization’s DMZ. You are tasked with identifying a s
kari74 [83]

Answer:

Option B is correct.

Explanation:

Well into the DMZ corporation of the user, intruders have currently conducted numerous attempts toward networks. He is associated with finding any response which would provide the greatest opportunity in the future to avoid such threats.  

The in-band IPS becomes the better approach for the required choices. Traffic moves via the IPS, as well as it has a better probability of avoiding inner processes through entering invasion.

4 0
2 years ago
In Microsoft Access, what happens when you save a query once and run it but then add more to the query? What will happen? a)erro
Usimov [2.4K]
D)When the query is run again, the data that meets the new criteria will be retrieved.
5 0
3 years ago
Other questions:
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • Melissa and Sue want to show a presentation to twenty employees using a presentation while using a projector. They learn that th
    12·2 answers
  • Which of the following is an example of a good listening skill? A. Replying to the caller as "you" rather than using his or her
    9·2 answers
  • What does the action tool allow you to do in Microsoft power point?
    9·1 answer
  • Which tab do you select to change how you see your Word document on screen?
    9·2 answers
  • Please help ASAP! will mark brianliest! 30 points!
    14·1 answer
  • Even though jdoe and jrock have the same password (i.e., hacker), their password hashes in the /etc/shadow file are different. W
    15·1 answer
  • 1. Write a statement that opens the file Customers.dat as a random access file for both reading and writing.
    9·1 answer
  • Which workbook view is used most often in Excel?
    8·1 answer
  • To stored three characters a computer occupies. Bytes memory space
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!