1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
3 years ago
12

What is movie viewer, such as quicktime windows media player,an example of

Computers and Technology
1 answer:
Karo-lina-s [1.5K]3 years ago
5 0
It is called the Databse
You might be interested in
Several families are planning a shared car trip on scenic drives in New Hampshire's White Mountains. To minimize the possibility
Rus_ich [418]

Answer:

Following are the response to the given question:  

Explanation:

Build a spring, sink, vertices, and vertices for each car for a household. Every unit in the stream is a human. Attach the source from each vertical of a family with such a capacity line equivalent to the family size; this sets the number of members in each household. Attach every car vertices to the sink with the edge of the car's passenger belt; this assures the correct number of people for every vehicle. Connecting every vertex in your household to any vertex in your vehicle with a capacity 1 border guarantees that one family member joins a single car. The link between both the acceptable allocation of people to vehicles as well as the maximum flow inside the graph seems clear to notice.

5 0
3 years ago
Which selection below lists two operating systems that include BitLocker? A. Windows XP Professional and Windows 7 Professional
Leona [35]
It will be the windows 8 professional
3 0
3 years ago
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability
Tresset [83]
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
7 0
3 years ago
When both inputs of a J-K edge-triggered FF are high and the clock cycles, the output will ________.
shutvik [7]

Answer:

Explanation:

Toggle

5 0
3 years ago
Write a program that fills a list with 100 random numbers between 0 and 200, inclusive. Traverse through the list and only print
svet-max [94.6K]

Answer:

Follows are the code to this question:

import random as ra#import package  

r=[ra.randint(0, 200) for x in range(100)]#defining a variable r that use rand method to add value in list  

j= [i for i in r if i < 99]#defining j variable that checks list value is less than 99

print (j)#print list value

Output:

[20, 23, 66, 47, 89, 7, 18, 13, 92, 31, 23, 60, 3, 52, 18, 20, 85, 64, 55, 98, 14, 80, 80, 14, 57, 92, 76, 14, 91, 83, 87, 80, 16, 50, 7, 88, 19, 4, 72, 23, 27, 79, 23]

Explanation:

In this code, package random is imported, in the next step, the r variable is declared, that uses the randit method, and use for loop that adds value in the list. In the next step, the j variable is declared, which uses a for loop and a conditional statement to check its value is less than 99, add print its value.

7 0
3 years ago
Other questions:
  • Web pages often have built-in connections, or links, to other documents, graphics, other web pages, or web sites. true or false?
    9·1 answer
  • A​ ___________ identifies the content and purpose of the​ visual, along with whatever label and number​ you're using to refer to
    15·1 answer
  • Write a program that asks for the names of three runners and the time, in minutes (no seconds, etc.), it took each of them to fi
    7·1 answer
  • Hey system has defined specific Quetion that describe how signals are sent over connections. Which layer of the transmission con
    11·1 answer
  • 4.8 code practice question 2 edhesive
    12·1 answer
  • Please tell fast plzzzzzz.​
    7·1 answer
  • Davingould1115...................answer 3​
    11·1 answer
  • Describe accessibility in Windows 7 ​
    13·1 answer
  • OSI layer for HDLC??​
    13·1 answer
  • Which statement best describes one reason why assembly language is easier
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!