1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
4 years ago
9

Discuss ONE critical event in the development of photography. Make sure to explain when the event occurred and WHY this event wa

s important.
Computers and Technology
1 answer:
marin [14]4 years ago
8 0

Answer:

Answer:

Explanation:

Explanation:

You might be interested in
Select the software which is used to convert audio data to text .
gladu [14]

Answer:

The process of converting an audio file into a text file is audio transcription. That can include any audio recording like a conference recording, an interview, an academic study, a music video clip. A lot of scenarios exist where it is easier to have a text file than to record audio.

Explanation:

These are the three main ways to transcribe audio into text.

  • Transcribe our transcription editor manually to the audio (FREE).
  • Use our software for automatic transcription.
  • Book our Services for Human Transcript.

1. If you have no trouble transcribing your files for a little more, you can use our online transcription software. You can listen to the audio file while it is being transcribed by this free interactive editor so that the audio is replayed as many times as necessary. You can use both your dashboard and directly from the editor page to our free transcription editor.

2. First, by using automatic transcription software you can convert an audio file to a readable. To convert any sound recordings into a text file, Happy Scribe uses speech-to-text algorithms.

3. Another option is to hire a freelancing transcriber or to use transcription services such as Happy Scribe when converting audio to text. In order to provide highly effective transcripts, we work with the best transcripts in the world. In English, French, Spanish, and German, our human transcription is available.

8 0
3 years ago
Which type of security personnel may work for government as well as for private security agencies?
monitta

Answer: A security guard

Explanation:

3 0
3 years ago
Read 2 more answers
Consider the following threats to Web security, and describe how each is countered by a particular feature of SSL.
kondor19780726 [428]

Answer:

There is no protection given by any particular feature of SSL.

Explanation:

A SYN flood (half-open attack) is a type of denial-of-service (DDoS) attack which aims to make a server unavailable to legitimate traffic by consuming all available server resources. The aim of the SYN flood is to exploit the handshake process of a TCP connection. This is because the SSL protocol starts only after a successful TCP handshake. The SYN flood attacks try to exhaust a system so that no successful TCP handshakes can be done. Therefore, SSL can no provide any protection against SYN flooding.

3 0
3 years ago
Which of the file names below follows standard file naming convention
svetlana [45]

A File Naming Convention (FNC) is a framework for naming your files in a way that describes what they contain and how they relate to other files. Developing an FNC is done through identifying the key elements of the project, the important differences and commonalities between your files.

To ensure that files are sorted in proper chronological order the most significant date and time components should appear first followed with the least significant components. If all the other words in the filename are the same, this convention will allow us to sort by year, then month, then date.

Files should be named consistently
File names should be short but descriptive (<25 characters) (Briney)
Avoid special characters or spaces in a file name
Use capitals and underscores instead of periods or spaces or slashes
Use date format ISO 8601: YYYYMMDD
Include a version number (Creamer et al.)
Write down naming convention in data management plan
5 0
3 years ago
What is the purpose of heading tags?
Svetllana [295]
All of the above (A,B,C,D)
6 0
2 years ago
Other questions:
  • Which function can you use to abbreviate the lengthy expression, A1+A2+A3+A3...+A19+A20?  MAX COUNT SUM ROUND
    10·2 answers
  • You are in charge of designing a menu tree for navigating 1,250 books in a digital library. Present an argument of whether the m
    12·1 answer
  • What is the accounting equation?
    12·1 answer
  • An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed pro
    10·1 answer
  • Which of the following is not true about VOIP?
    9·1 answer
  • What is the correct html for referring to an external style sheet?
    11·1 answer
  • Write a program, called compute_stats.c, which opens a data file, called numbers.txt, which contains of a list of positive integ
    10·1 answer
  • The code on the side is a software solution to the mutual exclusion problem for two processes. It shares two variables:
    11·1 answer
  • X274: Recursion Programming Exercise: Cannonballs Spherical objects, such as cannonballs, can be stacked to form a pyramid with
    7·1 answer
  • Difference between electrical and electronic devices
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!