1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
4 years ago
7

Which software is used to play, create, and modify audio and video files?

Computers and Technology
2 answers:
Alenkasestr [34]4 years ago
8 0
Windows Movie Maker, iMovie, Final Cut Pro (x), QuickTime?
solniwko [45]4 years ago
3 0
IMovie works best for my brother and dad
You might be interested in
Why were low quality video so often use when Internet connection we’re poorer than they are today
kakasveta [241]
What do you mean? I’m confused with the question, it doesn’t make sense:)
8 0
3 years ago
Is USA TestPrep a test-taking site that won't let you access other windows without kicking you off?
olga_2 [115]

Answer:

usatestprep literally just does what the name says; it prepares you for tests in america. it doesn't kick you off if you access other windows

Explanation:

3 0
4 years ago
What is the function of the GUI?
topjm [15]
C. Provides an interface between user and OS.
The GUI, or Graphical User Interface, is just about everything you generally see with a common computer or smartphone.  You rarely run an application or program from the command itself, as clicking an icon in the GUI runs the software for you.
6 0
4 years ago
Read 2 more answers
Where should the VPN concentrator be installed?
zmey [24]
C, using a firewall make sures no viruses enter your device while setting up the vpn
7 0
2 years ago
Read 2 more answers
An example of phishing is: Select one: a. flooding a web server with thousands of requests for service. b. setting up a fake med
tigry1 [53]

Answer:

Option(b) is the correct answer to the given question.

Explanation:

The main objective of the Phishing to posing as a legitimate entity and trick the individuals to sharing her confidential information like information of banking details such as credit card number  and passwords etc.

Phishing is done with the help of email, telephone or etc. Sometime phishing is done by the web page and stolen the website password. Phishing provides financial loss to the individual as well as the organization.

Except for option(b) all the options are not examples of Phishing that's why they are incorrect Options.

7 0
4 years ago
Read 2 more answers
Other questions:
  • The code below uses the Space macro which simply displays the number of blank spaces specified by its argument. What is the firs
    9·1 answer
  • Which error produces incorrect results but does not prevent the program from running?
    7·1 answer
  • A computer system has 9,850 processes and 172 of them were suspended while 276 of them were terminated. Explain why some of the
    12·1 answer
  • What is the general form of an internet email address<br>​
    5·1 answer
  • Write a function that parses a binary number into a hex number. The function header is:def binaryToHex(binaryValue)Write a test
    11·1 answer
  • Class secretType { public: static int count; static int z; secretType(); secretType(int a); void print(); static void incrementY
    8·1 answer
  • Question 3
    13·1 answer
  • Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell
    8·1 answer
  • Select the correct text in the passage.
    15·1 answer
  • What enforces the location in which an app can function by tracking the location of the mobile device?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!