1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
8

A(n) __________ is a recording of a motion picture, or television program for playing through a television.

Computers and Technology
2 answers:
Mamont248 [21]3 years ago
7 0

The answer is C: Video.

A video is anything that is considered to be recorded, broadcasted, or a display of moving visual images. Most videos must be visual. A video transmits a signal to a screen and might vary depending on a number of factors such as the aspect ratio, display resolution, color capabilities, and refresh rate among others. Things like TV shows, music videos, movies, and video games are always considered videos.

lisabon 2012 [21]3 years ago
3 0
A video is a recording of a motion, or television program for playing through a television. A camcorder is a device or gadget that is used to record a video. audio is the sounds that we hear and mix media is a tool used to edit the video.
You might be interested in
Quick please, URGENT
Serjik [45]

Answer: it is the code it is wrong

Explanation:

8 0
2 years ago
In this problem. we consider the delay introduced by the tcp slow-start phase. consider a client and a web server directly conne
Tatiana [17]

The time that is required to retrieve the object (including TCP connection establishment) when 4S/R > S/R > RTT > 2S/R is equal to \frac{14S}{R}+4RTT

<h3>How to calculate the time needed to receive all objects.</h3>

In this scenario, we would denote the round-trip time that exist between the web server and the client with RTT and assume that it is constant.

The time that is required to retrieve the object when 4S/R > S/R > RTT > 2S/R would be calculated by adding the round trip of sender and reciever together as follows:

Round trip = RTT + RTT

Next, we would determine the delay in packet transmission:

<u>Note:</u> \frac{8S}{R}+\frac{4S}{R}=\frac{12S}{R}

Time = (\frac{S}{R} +RTT)+(\frac{S}{R} +RTT)+(\frac{12S}{R}) +RTT+RTT\\\\Time = \frac{14S}{R}+4RTT

When S/R +RTT > 4S/R, we have:

The time that is required to retrieve the object would be calculated by adding the round trip of sender and reciever together as follows:

Time = (\frac{S}{R} +RTT)+(\frac{S}{R} +RTT)+(\frac{8S}{R}) +RTT+RTT\\\\Time = \frac{11S}{R}+5RTT

The time that is required to retrieve the object when S/R > RTT would be calculated by adding the round trip of sender and reciever together as follows:

Time = (\frac{S}{R} +RTT)+(\frac{14S}{R}) +RTT\\\\Time = \frac{15S}{R}+3RTT

Read more on round trip here: brainly.com/question/6884622

5 0
2 years ago
What is the term that refers to an Internet marketing technique in which you pay for high search engine results by advertising o
kakasveta [241]
Im afraid if i give u an answer u’ll get confused
4 0
3 years ago
If you put your tik down below I'll tell them to follow
VikaD [51]

Answer:

oreo._.thecat7

Explanation:

...................

4 0
3 years ago
Read 2 more answers
A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is viola
wel

Answer:

Confidentiality

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.

In this scenario, a hacker gains access to a web server and reads the credit card numbers stored on that server. Thus, the security principle which is violated is confidentiality.

Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.

This ultimately implies that, confidentiality requires that access to collected data be limited only to authorized staffs or persons.

3 0
3 years ago
Other questions:
  • CompX Inc. is an online retailer of electronic products, including laptops and tablets. The company is known for its unique appr
    15·1 answer
  • Where should a "deny all catch all" rule be positioned and why?<br> pleaseeee help!
    15·2 answers
  • What options does the Table Tools Layout contextual tab contain? Select three options.
    13·2 answers
  • Select the correct answer.
    13·2 answers
  • What is sum after the following loop terminates? int sum = 0; int item = 0; do { item ; sum = item; if (sum &gt; 4) break; } whi
    8·2 answers
  • There are four types of characteristics attributed to a flow: reliability, delay, jitter, and bandwidth. Explain how each of the
    8·1 answer
  • Translate We get up at 8 o'clock into Spanish in the box below:​
    9·1 answer
  • 1. It is acceptable to use a jack that has been
    13·1 answer
  • What is the different between compilers and interpreters?​
    15·1 answer
  • Given the following class, Book, Write code for the following:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!