1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
3 years ago
7

A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a devic

e with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
Computers and Technology
1 answer:
ale4655 [162]3 years ago
5 0

Answer: Server

Explanation:

Options include:

A.Laptop

B.Server

C.Game console

D.Workstation

A server is referred to as a computer that helps in the provision of services, data or resources to other systems over a particular network.

Since the game developer wants a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded, the server is the best option for this.

You might be interested in
Your IT manager wants you to set up three computers to appear to users as one powerful Windows Server 2016 server. What capabili
Marina86 [1]

Answer:

The answer is "Clustering"

Explanation:

Clustering is a technique, which includes the Microsoft Windows and the coordination with an individual multi-PC's, that is mostly connected to the local area network, as a single platform.

  • It is cheaper than one device.
  • It enables you to greater machine performance and increases usability and reliability, that's why the answer to this question is "Clustering".
4 0
3 years ago
If ClassC is derived from ClassB which is derived from ClassA, this would be an example of ________.
finlep [7]

Answer:

Inheritance

Explanation:

8 0
3 years ago
Daisy, an HR executive at Matrix-Solutions, was given the responsibility to conduct induction training for the newly hired emplo
sasho [114]

Answer:

The answer is Presentation Software.

Explanation:

The application that best suits her purpose is a Presentation Software. Such as: powerpoint, google presentations, keynote,  OpenOffice Impress, Media Shout, Harvard Graphics, Adobe Persuasion.

These are excellent tools for Daisy's purpose.

8 0
3 years ago
Which descnptons are examples of Logistics Planning and Management Services workers? Check all that apply.
Aleksandr-060686 [28]

Answer:

The following below are descriptions of Logistics Planning and Management Services workers:

a. Lucreta supervises workers who organize the products in a warehouse

c. Beatrice sells tickets to passengers for trips, and advises them about travel routes

d.Stephane inspects vencies and equipment to make sure they meet safety standards

d. Marcel oversees the transportation activities of an organization

Explanation:

5 0
3 years ago
In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process
SOVA2 [1]

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

4 0
2 years ago
Other questions:
  • The acronym ________ is used by programmers to refer to the fact that computers cannot tell difference between good and bad data
    8·2 answers
  • Which camera options shows time to be slowly
    5·1 answer
  • What is internal storage device
    14·1 answer
  • One way that Intuit handles the ________ of its TurboTax and other financial software is through its websites. The site includes
    11·2 answers
  • __________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of
    11·1 answer
  • Telecommunications and software development are examples of information technology careers.
    5·1 answer
  • Comments should Your answer: rephrase the code it explains in English be insightful and explain what the instruction's intention
    15·1 answer
  • What is the first step in finding a solution to a problem? Choose a solution. Think of options to solve the problem. Try the sol
    6·1 answer
  • Who used the term" software" first?
    8·2 answers
  • You can enter the following things in cells
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!