1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
8

ANSWER ASAP!!!!!!!

Computers and Technology
1 answer:
vladimir1956 [14]3 years ago
5 0

Answer:

E.  They offer plenty of time for players to reflect.

Explanation:

  • A real-time strategy game is a game in which the players don't progress in incremental in turns. As it involves the gamers to simultaneously take thor turns and make real-time moves.
  • These are large-dimensional games such as 3-dimensional ones that have real-time tracking and strategy formulations. Create a dual later map and allows for real-time tactics. The main focus of the real-time games is on resource collection and gather of players' data.
You might be interested in
A personal computer uses a number of chips mounted on a circuit board called microprocessor. system board. daughter board. mothe
AveGali [126]
I am almost 100% sure that it is called a microprocessor 
8 0
3 years ago
Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% o
insens350 [35]

Answer:

The requirement of the virtualization in the operating system:

• The virtualization of the resources from single systems input can be partitioned into a small virtual environment in multiple system data processes.

• Virtualization can collect the physical system's hardware and software data, they can transfer the virtualization process and also verify that the working system is running properly.

• Virtualization has to determine the specific components such as workload, file location, network traffic and console administration process. The requirement for moving into the virtual environment must be selected based on windows for the operating system(32-bit), windows host operating system(4-bit) and Linux operating system.

7 0
4 years ago
What is computer with figure​
GenaCL600 [577]

Answer:

A computer is an electronic device that accept raw data and instructions and process it to give meaningful results.

5 0
3 years ago
What are the three different types of hard drives? Briefly describe each, and list the possible configurations and device files
Lady_Fox [76]

The three different types of hard drives are:

  • SATA
  • SSD
  • NVMe

<h3>What is the SATA drive?</h3>

This was said to be Introduced in the year 2003, SATA (or Serial Advanced Technology Attachment) is known to be a kind of a default interface that was made for a lot of desktop and laptop hard drives.

Hence, The three different types of hard drives are:

  • SATA
  • SSD
  • NVMe

Learn more about hard drives from

brainly.com/question/1558359

#SPJ1

5 0
3 years ago
Ishmael would like to capture a selected potion of his screen and then capture action he performs on that selected portion. What
Natalija [7]

Answer: User the insert screen recording control

Explanation:

Since Ishmael wants to capture a selected potion of his screen l, after which he'll then capture the action that he performs on that selected portion, he should use the insert screen recording control.

It should be noted that on most keyboards, there's an "insert screen" button. Also, Ishmael can simply open the window that he wants to screenshot and then click the screenshot button.

Therefore, the correct option is B.

6 0
3 years ago
Other questions:
  • Mobile devices typically come pre installed with standard apps like web browsers , media players, and mapping programs true or f
    9·1 answer
  • Given parameters b and h which stand for the base and the height of an isosceles triangle (i.e., a triangle that has two equal s
    8·1 answer
  • What identifies available computers through the internet?
    14·1 answer
  • The _____ helps the project team to identify the main functions or features of the system and the different users or external sy
    15·1 answer
  • In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
    6·2 answers
  • Help!!!! ASAP TIMED TEST 50 points!!!!
    7·1 answer
  • What is the output of 1101 x 10 == 11000 + 10?
    12·1 answer
  • Write a function that will alphabetize a string WITHOUT using the sort function :
    7·1 answer
  • How do you mark answers brainliest?<br> it looks like they changed it and now idk how to
    12·1 answer
  • Why is it important to follow a consistent naming convention for variables?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!