Which API gives higher performance and low graphics?
OpenGL?
Vulkan?
Direct3D11?
Metal?
pls suggest your answer

Answers

Answer 1
I believe Vulkan Ubisoft uses it for there large scale game for them to work on computer that can’t handle them

Related Questions

What is a disadvantage of network-based ips devices?

Answers

A disadvantage of network-based IPS devices is that they cannot detect attacks that are launched using encrypted packets.

What is an IPS devices?

An intrusion prevention system (IPS) is known to be a kind of network security tool which helps to constantly look into a network for malicious activity and they often takes action to hinder it.

Note that in the case above, A demerit of network-based IPS devices is that they cannot detect attacks that are launched using encrypted packets.

See full question below

What is a disadvantage of network-based IPS devices?

They use signature-based detection only.

They cannot detect attacks that are launched using encrypted packets.

They are implemented in expensive dedicated appliances.

They cannot take immediate actions when an attack is detected.

I don't know what IPS means, I was day dreaming

Learn more about  IPS devices from

https://brainly.com/question/20490376

#SPJ12

The it components of an erp system architecture include the hardware, software and the ________

Answers

The components of an ERP system architecture is made up of the hardware, software and the Data.

What is an ERP system?

Enterprise resource planning (ERP) is known to be a kind of  software that firms often use to handle or manage day-to-day business works such as accounting and others.

Note that The components of an ERP system architecture is made up of the hardware, software and the Data.

Learn more about  ERP system from

https://brainly.com/question/14635097

#SPJ12

In the /etc/shadow file, which character in the password field indicates that a standard user account is locked?

Answers

The character in the password field that tells that a standard user account is locked is "!".

What is password field?

This is known to be a kind of security precaution, where a password field is said to save its value as an array of characters, instead of a string.

Note that the exclamation mark In the file, is said to be the character in the password field that tells that a standard user account is locked.

Learn more about  password field from

https://brainly.com/question/17174600

#SPJ12

What options are available for storing backups, physically?

Answers

The options are available for storing backups, physically are:

In both on site and off site,, a person can backup data to a given system that is located on-site, or the backups can be sent to any  remote system that is off-site.

What is a backup?

This is known to be a device that helps to save information or data temporarily or permanently.

Note that in the above, The options are available for storing backups, physically are:

In both on site and off site,, a person can backup data to a given system that is located on-site, or the backups can be sent to any  remote system that is off-site.

Learn more about backups from

https://brainly.com/question/17355457

#SPJ12

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an example for.

Answers

An example of a security misconfiguration is the absence of adequate security hardening throughout the application stack or incorrectly set permissions.

What are security misconfigurations?

Security measures that are incorrectly set or left unsecured are known as security misconfigurations,

They, put your systems and data at risk. Basically, a misconfiguration might result from any poorly described configuration changes, default settings, or a technical problem with any component in your endpoints.

Cross-Origin resource sharing (CORS), and verbose error messages are a few instances of security misconfigurations.

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an example of security misconfigurations.

Hence, security misconfigurations are the correct answer.

To learn more about the security misconfigurations refer to:

https://brainly.com/question/14613247

#SPJ1

Technology is defined as human ________________ in action that involves the generation of knowledge and processes to develop systems that solve problems and extend human capabilities.

Answers

Answer:

Innovation:

Explanation:

Technology is defined as human innovation in action that involves the generation of knowledge and processes to develop systems that solve problems and extend human capabilities.

To innovate is to make changes in something established, especially by introducing new methods, ideas, or products.

why blu rays store more data than dvd

Answers

A Blu-ray disk stores more data than DVD because it uses a blue laser that has a shorter wavelength (405 nm) rather than a red laser (650 nm).

What is a Blu-ray disk?

A Blu-ray disk can be defined as a high-capacity optical disk storage medium that is designed and developed by Sony, Blu-ray Disc Association, so as to record (store), rewrite and play back high definition (HD) video formats.

Based on scientific information, the reason why a Blu-ray disk stores more data than DVD is simply because it uses a blue laser that has a shorter wavelength (405 nm) rather than a red laser with a wavelength of 650 nm used on DVDs.

Read more on Blu-ray disk here: https://brainly.com/question/26699008

#SPJ12

at the data link layer, which type of network address is used to identify the receiving node?

Answers

Answer:

MAC address

Explanation:

The MAC address is a local 48 bit address that is unique to every device. It is found at the Data link layer unlike IP address that is found at the Network layer, the MAC address will not change.

The MAC address, type of network address is used to identify the receiving node.

What is A MAC address?

This is known to be a kind of physical address that is often given to each network adapter in a computer, or any kind of mobile device.

This is made up of twelve hexadecimal characters and as such, The MAC address, type of network address is used to identify the receiving node.

Learn more about MAC address  from

https://brainly.com/question/13267309

#SPJ11

what does the acronym siem stand for in a cybersecurity context?

Answers

Siem is an acronym which stands for Security Information Event Management.

From a cybersecurity context, Siem is a term used for generalized tools that help an organization monitor their IT systems in other to detect potential cyberattacks.

In other words, Siem helps companies monitor and detail security events that occur within an organization's IT infrastructure.

You can learn more about Siem here https://brainly.com/question/25720881

#SPJ9

What specialized network device is commonly used to load balance traffic across multiple servers in a group?

Answers

A content switch is a specialized network device that's commonly used by network engineers to load balance network traffic across multiple servers in a group.

What is a content switch?

A content switch can be defined as a class of switch which is designed and developed for the programmatic redirection of request traffic of a client from one server, which was initially selected by load balancing to another server selected based on the content of the request or header.

Thus, a content switch is a specialized network device that's commonly used by network engineers to load balance network traffic across multiple servers in a group.

Read more on switches here: https://brainly.com/question/14850209

#SPJ12

Which is the best/proper way to declare that your page uses the html5 protocol?

Answers

The best/proper way to declare that your page uses the html5 protocol is <DOCTYPE HTML>

What is HTML?

It should be noted that HTML5 is a markup language that is used for structuring band presenting content on the world wide web.

In this case, the best/proper way to declare that your page uses the html5 protocol is <DOCTYPE HTML>.

Learn more about HTML on:

brainly.com/question/4056554

#SPJ12

Part B
Select a student organization belonging to the Career and Technical Student Organizations (CTSO) of your choice in which you would like to
participate. You should choose a CTSO related to the field of computers. Research online and create a brief report on the mission of the
organization, and state the reason why you want to participate in this organization.
You roay use online resources to find information about the organization

Answers

My choice of the  student organization that is belonging to the Career and Technical Student Organizations (CTSO) is DECA.

What is DECA about?

DECA is known to be a type of CTSO that is said to allow or aid students to be able to create college and career readiness form of skills.

Note that DECA is based  on helping students to be very prepared for careers in in areas of:

Business Management and AdministrationFinanceHospitality & TourismMarketing

Learn more about CTSO from

https://brainly.com/question/10917703

#SPJ1

Which hardware component interprets and carries out the instructions contained in the software.

Answers

Answer:

Processor

A processor interprets and carries out basic instructions that operate a computer.

whts the mistake in this
pls do help me out

Answers

Explanation:

i don't even know it's uclear what the mistake is

the hyperledger fabric framework only offers blockchain services?

Answers

The hyperledger fabric framework only offer blockchain services. Therefore, it's true.

What does the hyperledger fabric offer?

It should be noted the hyperledger frameworks are used for building blockchain for organizations.

It should be noted that they're also used for open source development. Therefore, the correct option is true.

Learn more about blockchain on:

brainly.com/question/25700270

#SPJ12

30 POINTS FOR THE ANSWER FAST
For this discussion, you are going to walk through the process of completing an estimate to come up with a budget and timeline for a logo, letterhead, envelope, and invoice. Your client is a pet sitter who operates out of her home. She walks, boards, and grooms dogs. What would you charge your client? How long do you think it will take you? What programs will you use? Where will you print it?

Answers

Answer:

Sorry I don't know the answer.

Danielle has been asked to configure virtualization at her company. She recommends that her manager buy multicore processors. What justification should she give as to why virtualization workstations require as many CPU cores as possible

Answers

The justification should she give as to why virtualization workstations require as many CPU cores as possible are the Each virtual machine makes use of actual CPU resources for processing instructions and data (pg227, 228).

What justification need to she deliver as to why virtualization workstations require as many CPU cores as possible?

Because every visitor's working device runs in its personal space, a couple of cores are required to shop the collective data.

Footprint discount is the primary goal, go together with a bigger wide variety of cores over quicker clock speeds. However, if workload overall performance is a larger concern, quicker clock speeds and less cores would possibly make greater sense.

Read more about the virtualization :

https://brainly.com/question/25110079

#SPJ1

Quickbooks online accountant firm users can use the quickbooks online advanced desktop app to access what types of client subscriptions?.

Answers

The type of the client subscription used is paid subscription.

What is Paid Subscription?

Paid Subscription refers to the payment made already on the product purchased or the services received. It is a kind of the recurring payment whose transactions repeat after a regular basis.

If the customer continue to receive  the service then he or she has to pay the subscription.

After paying the membership costs, customers of Quickbooks Online for accountancy firms can access the Quickbooks Online Advanced desktop application.

Learn more about Paid Subscription here:

https://brainly.com/question/13508895

#SPJ1

you want to implement a protocol on your network that allows computers to find the ip address of a host from a logical name. which protocol should you implement?

Answers

The protocol that should be implemented is that one needs to enable hosts on the network to find the IP address.

What is IP address?

It should be noted that IP address simply means a unique address that defines a device on the internet.

In this case, the protocol that should be implemented is that one needs to enable hosts on the network to find the IP address.

Learn more about IP address on:

brainly.com/question/24930846

#SPJ12

Ignore this it a temporary note for me: SPSstudents

Answers

Answer:

okk

Explanation:

What is the relationship between a product owner (po) and product management (pm)

Answers

A product owner (po) is a designated title to an individual assigned to make decisions for the product as a whole.

Product owner

There are a lot of responsibilities attached to this role, such as detailed planning and assigning tasks to capable team members. It also involves setting task deadlines and then reviewing the task when they're completed.
However, product management is not a designated work title like product owner, it is a term that simply describes the set of activities performed by the product owner as well as other authorized members of the team. But is important to note that when it comes to decisions about the whole direction of the product, the product owner alone bears this responsibility.

You can learn more about the product owner here https://brainly.com/question/16412628

#SPJ9

Due to a fire at ABC Software Solutions, all
documentation for a product is destroyed just before it is
delivered. What is the impact of the resulting lack of
documentation?

Answers

Answer:

chaos among people who worked in the company.

Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea tells Dean is that it is very important for him to ____ all of his important data on a regular basis to avoid data loss in the case of a problem with the computer. He can use a(n) ____ utility to do this.

Answers

Andrea tells Dean is that it is very important for him to save all of his important data on a regular basis to avoid data loss in the case of a problem with the computer. He can use an install utility to do this

What is a computer?

It should be noted that a computer simply means an electronic machine that can be used to make one's work easier.

In this case, Andrea tells Dean is that it is very important for him to save all of his important data on a regular basis to avoid data loss in the case of a problem with the computer. He can use an install utility to do this.

Learn more about computer on:

brainly.com/question/24540334

#SPJ12

15 POINTS FOR THE ANSWERS ASAP
Which type of portfolio would you prefer to have? Why did you pick that portfolio?

Answers

Answer:

Aggressive Portfolio

Explanation:An aggressive portfolio takes on great risks in search of great returns.

what do you mean by computer ethics?​

Answers

Answer:

Computer ethics is a field of applied ethics that addresses ethical issues in the use, design and management of information technology and in the formulation of ethical policies for its regulation in society.

Add an option for Green with value of Green, id of green, and associated of Green. Then, add option: Black

Answers

The code statement illustrates the use of radio buttons in HTML

How to add green and black options?

The complete question is added as an attachment.

From the complete question, we can see that the instructions are written in HTML.

In the existing HTML code, the color yellow is represented using a radio button.

So, we continue by using radio buttons for color green and black

The code statements that add green and black options are:

<input type="radio" name="color" value = "Green" id = "green"><label for "green">Green</label>

<input type="radio" name="color" value = "Yellow" id = "yellow"><label for "yellow">Yellow</label>

Read more about HTML at:

https://brainly.com/question/14311038

#SPJ11

how memory and storage space are managed in gaming application

Answers

Answer:

it depends on which type of game you play like GTA series consume 68 GB ! normal games like poker . and all this sh*t

the formula to compute the direct material quantity variance is to calculate the difference between

Answers

The formula to compute the direct material quantity variance is to calculate the difference between option c. (actual quantity * standard price) - standard costs.

What is Direct material quantity variance?

This is known to be  the difference that exist between the standard cost of standard material which is said to be allowed for actual production, and also the standard cost of material that is said to be really  used in production.

Therefore, The formula to compute the direct material quantity variance is to calculate the difference between option c. (actual quantity * standard price) - standard costs.

See options below

The formula to compute direct material quantity variance is to calculate the difference between

a. actual costs - standard costs

b. standard costs - actual costs

c. (actual quantity * standard price) - standard costs

d. actual costs - (standard price * standard costs)

Learn more about  direct material quantity from

https://brainly.com/question/26245657

#SPJ11

describe the difference between serial and parallel processing.

Answers

Serial processing is a type of single task processing but Parallel processing is a type of multiple tasks processing.

What is the difference between serial and parallel processing?

Serial processing gives room for only one object at a time that is said to be processed, but parallel processing often takes in a lot of objects to be  processed simultaneously.

Therefore, Serial processing is a type of single task processing but Parallel processing is a type of multiple tasks processing.

Learn more about Serial processing from

https://brainly.com/question/21304847

#SPJ11

You can use what utility to convert two or more basic disks to dynamic disks?

Answers

Disk Management is a utility that can be used to convert two or more basic disks to dynamic disks.

What is Disk Management?

Disk Management can be defined as a type of utility that is designed and developed to avail end users an ability to convert two or more basic disks on a computer system to dynamic disks.

This ultimately implies that, Disk Management is a utility that is typically used to convert two or more basic disks to dynamic disks, for the sake of disk redundancy and mirroring.

Read more on Disk Management here: https://brainly.com/question/6990307

#SPJ12

Other Questions
Ms. Gates has recently become dually eligible for medicare and medicaid. She is very concerned about how this will affect her prescription drug coverage. What should you tell her?. Josefin is 32 years younger than Annete. How many years ago was Annetes age twice Josefins age if Annete is 74 now. Create a budget that will allow you to save at least $100 by the end of October.Remember, your old budget reflected a net income of $1850.00 and included these expenses:$600 for your rent$475 for your car payment, car insurance, and gas$230 for your utilities, phone, and Internet$300 for your groceries$50 for your entertainment$20 for your renters insurance$75 for discretionary spendingA final net total of $100 saved per monthCreating a New Budget to Meet Your Saving and Spending NeedsYour new budget needs to include these changes:A new line to budget $50 per month toward a new computerOther expenses may be modified as you choose.A final net total of at least $300 saved per month Which answer choice shows the decimal 23.476 written in expanded form? What do you consider to be the advantages of the numerical values? What do you consider to be the advantages of the visual representations? Which do you prefer working with, and why? Fresh water fishing is the most popular hobby in the Uk . Its the nations most treasured pass time fact or opinion Somebody help me with this question please thank you 4 hours minus 1 hour, 59 minutes, 58 sec-onds equalsA. 2 hours, 2 seconds.B. 3 hours, 1 minute, 2 seconds.C. 2 hours, 1 minute, I second.D. 3 hours, 2 seconds. x + 4 is prime x2 9 can be factored using the formula. what is the measure of 4? Match each source to the correct type of source A fairly large number of people who live in the same territory, are relatively independent of people outside it, and participate in a common culture are referred to as a Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional questions. Online Content: Site 1 In a paragraph, summarize how immunizations can prevent certain diseases. (Site 1) why would north america will not be able to view the eclipse What economic concept is applied in this statement?By earning higher levels of education, students learn skills and are more likely to be employed. In their jobs, they use their skills to provide goods and services to others.A. equilibriumB. law of demandC. law of supplyD. negative externalityE. positive externalityReset Next Im not good at math PLEASE HELP why would president bush pass such a massive tax cut? what is the percent composition of each element within the compound which is the following is a complete sentence which one is the answer A. no one asked me B. were best friends C. The prosecution. D.The ocean smell in the air. A plane flies at 350 mph in the direction 40 north of east, with a wind blowing at 40 mph in the direction 30 south of east. What is the planes drift angle?5.906.3845.8946.38