1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
3 years ago
7

In a video, a motionless image is called

Computers and Technology
2 answers:
Amanda [17]3 years ago
7 0

Answer:

A still

Explanation:

This is the only answer that makes sense, a dialogue is words, sound element is well sound, and an animation would be moving.

Alik [6]3 years ago
3 0
C. a still because it is motionless
You might be interested in
The ideal body position for your legs after you've adjusted your seat is with your knee ___.
Kipish [7]

Answer:

is slightly crooked when pressing the pedals. This answer has been confirmed as correct and helpful

Explanation:

Hope it helps

7 0
2 years ago
Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly deliv
omeli [17]

Answer:

Proxy Server

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request. This speeds up the delivery of resources to the users.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
Which date formats are allowed in Excel for February 14, 2018? Check all that apply.
bonufazy [111]
The answers are 3,5, and 6
4 0
3 years ago
Which of these domains is frequently researched based? A. .edu B. .com C. .org D. .gov
Mademuasel [1]
Is it where you can pick multiple answers

6 0
3 years ago
Read 2 more answers
A file system which used tables to store data is called ?
ira [324]

Answer:

The filesystem table is an array of entries that describe each filesystem implementation that is part of the system image. ... The data field contains any private data that the filesystem needs, perhaps the root of its data structures

5 0
3 years ago
Read 2 more answers
Other questions:
  • You are responsible for performing all routine maintenance on your company's laser printers. Which of the following maintenance
    15·1 answer
  • The _____ unit is the preferred style unit for web page text because it makes it easy to develop pages in which different page e
    10·2 answers
  • Write a shell script called SpellOutDate that prints the detail of the current date in separate lines. For example if the curren
    13·1 answer
  • Create a class Str that subclasses str. Add a method to the subclass that checks if the string does not start with a given strin
    15·1 answer
  • Front wheel drive vehicles typically use​
    5·1 answer
  • Match the careers with the education required for each job
    5·1 answer
  • Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
    5·1 answer
  • what is the molarity of a solution prepared by dissolving 15.0g of sodium hydroxide in enough water to make a total of 225 ml of
    13·1 answer
  • A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engin
    7·1 answer
  • Send link for a qc or paddle
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!