1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
10

DLucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for market

ing purposes. Which of the following apps can she use to mix and match the clips?
a. FilmoraGo
b. Google photos
c. Adobe Premiere Clid. Audacity
Computers and Technology
1 answer:
KIM [24]3 years ago
6 0

Answer:

A. FilmoraGo; C. Adobe Premiere

Explanation:

Many video editing software exists out there, but their function is pretty much the same. They edit, mix and customize clips to create beautiful multimedia content for different purposes (advertisements, podcasts, movies, comedy clips, etc.). This software used are different as some may contain more functions and setting than the other.

Let us take a brief dive into the options:

  1. FilmoraGo: is a video editing software that runs on Andriod and iOS. It contains many effects and it is pretty basic to use and understand.
  2. Google Photos: Created by Google, helps to organize your photo albums and stores them for you.
  3. Adobe Premiere: is also a video editing software, it was first launched in 2003 and has since evolved to contain more sophisticated video editing tools.
  4. Audacity: is an audio editor available for Windows, Mac OS, and Linux. This software is completely free and open source.

Hence, dLucy can use the FilmoraGo or the Adobe Premiere to edit her video clips.

You might be interested in
In your own words, what is your definition of cybercrime and computer forensics?
mr_godi [17]

Answer:  

Cyber crime is also known as computer crime in which the illegal activities are done by the computer and many mobile devices. There are many types of crime but the cyber crime are associated with the computer crime by hacking personal documents and email spamming.

To resolve these type of cyber crime there is special type of police which is known as cyber cell. Data theft, cyber stalking and accessing other user data without there permission is all comes under the cyber crime.

Computer forensics is type of application that are used in investigation purpose and gathering the information from the computer.

The main aim of computer forensic is to perform and maintain the various type structured investigation and also maintain the systematic documents for the evidence.

7 0
3 years ago
The router can deliver packets directly over interfaces 0 and 1 or it can forward packets to Routers R2, R3, or R4. Describe wha
ra1l [238]

Answer:

Following are the solution to this question:

Explanation:

In point A:

It applies the AND operation with the subnet-mask that is  

=128.96.39.00001010 \ \ AND \ \ 255.255.255.10000000 \\\\= 128.96.39.0000000 \\\\= 128.96.39.0 \\\

This corresponds to a 128.96.39.0 subnet. This is why the router sent the packet to 0.

In point B:  

It applies the AND operation with the subnet-mask that is 255.255.255.128

= 128.96.40.00001100\  AND \ 255.255.255.10000000 \\\\ = 128.96.40.0000000\\\\= 128.96.40.0

This suits the 128.96.40.0 subnet. The router then sent R2 to the packet. The packet.

In point C:  

It  applies the AND operation with the subnet-mask that is 255.255.255.128

=128.96.40.10010111 \ AND \ 255.255.255.10000000 \\\\= 128.96.40.1000000\\\\= 128.96.40.128

It  applies the AND operation with the subnet-mask  that is 255.255.255.192

= 128.96.40.10010111 \ AND \ 255.255.255.11000000 \\\\= 128.96.40.1000000 \\\\= 128.96.40.128\\

All of the matches of its sublinks above.  

Its default R4 router was therefore sent to the router by router.

In point D:

It  applies the AND operation with the subnet-mask  that is 255.255.255.192

= 192.4.153.00010001 \ AND \ 255.255.255.11000000\\\\ = 192.4.153.0000000 \\\\= 192.4.153.0 \\\\

It matches the 192.4.153.0 subnet. It router has sent packet to R3 then.

In point E:

It  applies the AND operation with the subnet-mask  that is 255.255.255.128

= 192.4.153.01011010\  AND \ 255.255.255.10000000 \\\\= 192.4.153.0000000 \\\\= 192.4.153.0

There, neither of the subnet inputs correlate with the ip address with the same subnet mask.

It  applies the AND operation with the subnet-mask  that is 255.255.255.192

=192.4.153.01011010\ AND \ 255.255.255.11000000 \\\\ = 192.4.153.0100000 \\\\= 192.4.153.64

It does not correlate to the subnet entries for same subnet mask, and therefore neither of the entries matches their corresponding ip address entries.  

Mask of the subnet.  That packet would therefore be sent to the default R4 router by the router.

4 0
3 years ago
All of the following are standards that enable programs to receive data from and display data to a variety of mobile and desktop
svp [43]

Answer:

AOL

Explanation:

Some of the standards that enable programs to receive data from and display data to a variety of mobile and desktop devices includes;

I. CSS 3: it is a framework used for providing various styles used in web design.

II. HTML 5: this is a hypertext markup language used for creating web pages or website.

III. Javascript: it is a software framework that allows software components to send and receive data through a database.

IV. Service oriented architecture (SOA): this is an architectural pattern which allows various software application components to provide specific services to other applications through a network.

All of the following standards listed above enable programs to receive data from and display data to a variety of mobile and desktop devices except AOL. AOL is an acronym for American Online and it is typically used for providing internet connection through a dial-up.

3 0
3 years ago
Read 2 more answers
an IPv6 packet has a 40 byte base header, a 20 byte destination options extension header (which is not used for routing) and 200
NISA [10]

Answer:

Explanation:

Given, total payload is: 2000 bytes

 MTU is: 1500 bytes

 Header is: 20 bytes

 Base header is: 40 bytes

Total number of fragments = Total Payload / MTU

                                            = 2500 / 1500

                                            = 2 fragments

Fragment     Base header    Fragmentation header     Authentication  

                                                                                                     header + Data

1                  40 bytes                  8 bytes                              20 bytes +772bytes

2                 40 bytes                   8 bytes                                 792 bytes

7 0
3 years ago
Using your digital camera, frame a well-lit scene with the following settings:
yan [13]

Answer:(Answers may vary.)

Initial shutter speed: 1/50 second

Initial aperture: f/8

Result: Dark/light image

Shutter speed: 1/30 second (if the original image is dark)

Aperture: f/8

Result: A lighter image

Shutter speed: 1/80 second (if the original image is light)

Aperture: f/8

Result: A darker image

Initial shutter speed: 1/50 second

Initial aperture: f/8

Result: Dark/light image

ISO: 400, 200, 100  (if the earlier image is overexposed)

ISO: 100, 200, 400 (if the earlier image is underexposed)

Explanation:

6 0
3 years ago
Other questions:
  • Assume that grade is a variable whose value is a letter grade-- any one of the following letters: 'A', 'B', 'C', 'D', 'E', 'F',
    9·1 answer
  • You are the administrator for the contoso.com website. recently, the server hosting the website had a failure that caused it to
    13·1 answer
  • Using an LCD projector to show an online video to a group of people is an example of:
    14·1 answer
  • What part of the computer gives access to the internet
    10·1 answer
  • Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
    12·1 answer
  • Describing light years
    7·1 answer
  • Give an O(log m + log n)-time algorithm that takes two sorted lists of sizes m and n, respectively, as input and returns the ith
    7·1 answer
  • The small gear that is driven by the motor shaft of a rotisserie is called a?
    9·1 answer
  • Type the correct answer in the box.
    15·1 answer
  • Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends mon
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!