1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady_Fox [76]
4 years ago
11

Which computer is the best for video cutting?

Computers and Technology
2 answers:
____ [38]4 years ago
6 0
There are a lot of type of "computer" or I can say "pc" but the best pc/computer for video cutting is of course the strongest one and the most expensive, the gaming pc/computer or laptop.
ipn [44]4 years ago
5 0
I’d say the computer that can store the most data and work the fastest. Such as a pc or laptop.
You might be interested in
A data flow cannot go directly back to the same process it leaves. There must be at least ________ other process(es) that handle
Flauer [41]

Answer:

Answer is A. One.

Refer below.

Explanation:

A data flow cannot go directly back to the same process it leaves. There must be at least one other process that handle(s) the data flow, produce(s) some other data flow, and return(s) the original data flow to the beginning process.

3 0
3 years ago
The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
igor_vitrenko [27]

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

6 0
3 years ago
____ is a service that hardware and software manufacturers and third-party service companies offer to customers to provide answe
Svet_ta [14]

Answer:

"Technical support" is the correct answer for the abobve question.

Explanation:

  • Technical support is a service that is used to repair the technical system. It is not used to provide training and guidance that how the system is maintained. This type of service is taken by the third party which comes in the categories of the information technology organization.
  • The above question asked about the term which is used to give the repair service to the hardware and the software of the information system and it is taken by the third party. This service is known as "Technical support" which is defined above.
5 0
4 years ago
Which of the following is NOT a team based technique? 1. Joint application development 2. Rapid application development 3. Agile
Aleonysh [2.5K]

Answer: Option (4) is correct.

Explanation:

Object-oriented analysis is referred to as an approach in technical world which is popular for analyzing and also designing an app, system, or organization by applying OOPs or object-oriented programming, also making use of visual modeling in order to cater better stakeholder communication and commodity quality.

7 0
3 years ago
When adding a new record, which key can be pressed to move to the next field?
Anika [276]

Answer:

O Tab

Explanation:

In order to add a new record the key that should be used to move to the next field is tab key

while the other keys are used for the other purpose

But for adding a new field, new record, a tab key should be used

Therefore the last option is correct

8 0
3 years ago
Other questions:
  • In 150 of your own words, please consider how you might use some of the Outlook skills you reviewed and practiced. Evaluate how
    6·1 answer
  • When entering a formula or function into a cell, most spreadsheet programs require that you begin with some type of symbol, usua
    5·1 answer
  • Roman has painstakingly developed the animation for one of the objects on his slide. He can now use the Animation Painter to cop
    13·1 answer
  • Can you find the ip address from a physical address
    13·1 answer
  • What determines how a system will work to meet the business needs defined during system investigation?
    13·1 answer
  • what are examples of conditional formatting tools? check all that apply. color scales, icon sets,data bars,cell styles,themes
    8·1 answer
  • A External hackers have some access to a company's website and made some changes. Customers have submitted multiple complaints v
    11·1 answer
  • A(n) ____ is system software. Group of answer choices word processing program presentation graphics program operating system spr
    6·1 answer
  • An information system will be developed to keep track of a utility company's assets, such as buildings, vehicles, and equipment.
    10·1 answer
  • onsider a file system on a disk that has both logical and physical block sizes of 512 bytes. assume that the information about e
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!