1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
4 years ago
12

The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interl

eave format.
Computers and Technology
1 answer:
Archy [21]4 years ago
8 0
<span>The answer is mpeg-4.  The most commonly used video formats are the mpeg-4 format, the windows media audio/video format, and the audio visual interleave format.</span>
You might be interested in
In this technique, each attribute is associated with a specific feature of a face, and the attribute value is used to determinet
s344n2d4d5 [400]

Answer:

Chernoff faces.

Explanation:

Chernoff faces is a data visualization technique that was developed by a statistician named Herman Chernoff. He introduced this data visualization technique to the world in 1973 to represent multivariate or multidimensional data containing at least eighteen (18) variables.

In Chernoff faces, each attribute is associated with a specific feature of a face (nose, eyes, ears, hair, mouth, and eyebrows), and the attribute value with respect to size, shape, orientation, colour and placement is used to determine the way a facial feature is expressed.

The Chernoff face is a technique designed and developed to help detect similarities between different items and discern subtle changes in facial expressions from the perspective of an observer.

6 0
3 years ago
P36. In Section 3.5.4, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why
KatRina [158]

Answer:

The Packets can be arrived out of an order from the Internet Protocol layer.  

So, whenever the out of an order packets would be received then, it would be generated the duplicate ACK's, if we perform the re-transmission after the first duplicate ACK would be lead the senders to introduced too many redundant packets in the networks.

Explanation:

  • All the bytes, in the Transmission Control Protocol connections, are the numbered, from the beginning at the randomly choose the initial sequence number (ISN).  
  • The SYN packets consumes the one sequence number, so the data will be actual and it begins at the ISN+1.  
  • The receivers ack's sequences the number x acknowledged the receipts of all the data bytes that is less than byte the number x.
7 0
3 years ago
The browser on which you are viewing web pages is called the
iren2701 [21]

Answer:

client

server

Explanation:

The browser is the client, and the system that sends you the web page is known as the server. And these together form the client-server architecture. A perfect example of a client-server model is, however, a video game that has an app for the client, and a server. And as an example, such set up is established using the socket programming or the SignalR in dot net. Various other technology does support socket programming. And you can find it in fact on all the platforms.

5 0
3 years ago
A reason improper use of netiquette can be risky is that users can
GaryK [48]

Answer:

A) Become vulnerable to online harassment

Explanation:

From my understanding, Netiquette refers to talking to other people, and being rude to others isn't gonna get you very far

4 0
3 years ago
Read 2 more answers
Linux does not provide a gui for its user true​ or false
Musya8 [376]
False

hope this helps
5 0
4 years ago
Other questions:
  • If you want to conserve ink or toner, you can instruct PowerPoint to print ____ documents.
    10·1 answer
  • Assume the integer variable num has been assigned a valid value. What is the purpose of the following code segment?
    14·1 answer
  • a conpany manufacturers computer screens that utilize less electricity. which form of technology would this be classified as​
    5·1 answer
  • Why is brainly not working it say im logged out rn but im not i cant acces anything but this
    12·2 answers
  • A peer-to-peer (p2p) network is an example of ________ administration
    5·1 answer
  • What allow you to write alphas on a computer keyboard
    10·1 answer
  • Which type of financial institution typically has membership requirements?
    11·1 answer
  • The documents created in ms-excel is call what?​
    11·2 answers
  • To simplify input management, you are asked, neglecting the handling of exceptions, to write a keyboard class so that the input
    11·1 answer
  • Which function would you use to make sure all names are prepared for a mailing label? TODAY UPPER PROPER LOWER
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!