1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
2 years ago
5

Ray owns a gaming cafe where users can play video games on computers. These games involve rich graphics and need high processing

to function. What type of client does ray use for games in the gaming cafe.
Ray uses a(n) _____ client for the video games.
Computers and Technology
1 answer:
tankabanditka [31]2 years ago
6 0

Answer:

thick

Explanation:

i took the test and got it right

You might be interested in
What is the difference between the web and the internet?
Naddika [18.5K]
The Web is just one of the ways that information can be disseminated over the Internet
4 0
3 years ago
4. Select the correct answer.
3241004551 [841]

Answer: B.  PDF

Explanation:

Portable Document Format (PDF) is such an important document that it is considered the international standard for information and document exchange. It is used for letters, resumes and even electronic contracts.

PDF was developed by Adobe to make it independent of the device or application it is being viewed on and combines layers of information into one layer thereby making it a flat document.

7 0
3 years ago
Read the following code carefully and do as directed: int main() { // Initialising starting number int num = 1; int n=7 // Outer
Wittaler [7]

Answer:

81

Explanation:

12734

4 0
3 years ago
On which tab are import and export commands located in Access? A. Home B. Database Tools C. External Data D. Create
Ann [662]

Answer:

C. External Data

Explanation:

On the External Data tab, you can find import and export commands located in Access.

7 0
4 years ago
? An attempt to harm damage or cause threat to a system or network is broadly termed as
Radda [10]

Answer:

A cyber attack or hacking

Explanation:

6 0
3 years ago
Other questions:
  • Will upvote all answers
    7·1 answer
  • 4
    10·1 answer
  • What financial behaviors will typically lead to a low credit score?
    14·1 answer
  • Word 2013 in order to share a document online you must first
    10·1 answer
  • assume that you want to sort an array have 100000 elements which algorithm (insert sort algorithm or quick sort algorithm) is th
    12·1 answer
  • HELP PLZZZZZZZZ!!!!!!!!!!!
    14·1 answer
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • How to convert meters to centimeters in c programming​
    8·1 answer
  • Which group scope can be used to assign permissions to resources only in the domain in which the group is created
    12·1 answer
  • This code --> plt.plot(x,y) is used to draw :
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!