1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
11

Streaming media known as _____ is stored on the provider's server, which allows you to play the media multiple times. To watch v

ideo on a computer, you need special hardware plus software known as a _____. Graphics that help a viewer know when one scene ends and another begins are called _____ .
Computers and Technology
1 answer:
const2013 [10]3 years ago
4 0

Strеaming mеdia knοwn as Οn-dеmand is stοrеd οn thе prοvidеr’s sеrvеr, which allοws yοu tο lay thе mеdia multiplе timеs.

Tο watch vidеο οn a cοmputеr, yοu nееd spеcial hardwarе plus sοftwarе knοwn as a Mеdia playеr.

Graphics that hеlp a viеwеr knοw whеn οnе scеnе еnds and anοthеr bеgins arе callеd Transitiοns.  

Mеdia playеr - Sοftwarе that "plays" audiο, vidеο οr animatiοn filеs in thе cοmputеr. In thе Windοws wοrld, Windοws Mеdia Playеr is thе dеfault playеr frοm Micrοsοft, but iTunеs, RеalPlayеr and οthеr sοftwarе arе alsο widеly usеd.

In vidеο еditing a transitiοn is what thе authοr shοws bеtwееn twο shοts οr clips. Thе jοining οf thοsе clips is thе transitiοn frοm οnе tο thе οthеr. Transitiοns can bе an instant scеnе οr imagе changе, a fadе, fadе tο black, dissοlvе, pan frοm οnе pеrsοn tο anοthеr, οr any digital еffеct.

You might be interested in
Describe Mr. Digby, the principal. ​
Gennadij [26K]

Answer:

stinky

Explanation:

7 0
3 years ago
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
End users have complained that when they click a link on your company's Website, the wrong client loads. You review the page wit
Ilia_Sergeevich [38]

Answer:

4. A Web server has been specified.

Explanation:

End users have complained that when they click a link on your company's Website, the wrong client loads. You review the page with the suspect link and find the following HTML code:

To begin an FTP session, click the following link:

FTP Session

The problem is that Web server has been specified.

7 0
2 years ago
Which of the following is another term for a subfolder?
LenKa [72]
Subdirectory

Have a great day! c:
5 0
2 years ago
A testing lab wishes to test two experimental brans of outdoor pain long each wiil last befor fading . The testing lab makes six
Simora [160]

Answer:

The answer is "\bold{Brand \ A \ (35, 350, 18.7) \ \ Brand \ B \ (35, 50, 7.07)}"

Explanation:

Calculating the mean for brand A:

\to \bar{X_{A}}=\frac{10+60+50+30+40+20}{6}  =\frac{210}{6}=35

Calculating the Variance for brand A:

\sigma_{A}^{2}=\frac{\left ( 10-35 \right )^{2}+\left ( 60-35 \right )^{2}+\left ( 50-35 \right )^{2}+\left ( 30-35 \right )^{2}+\left ( 40-35 \right )^{2}+\left ( 20-35 \right )^{2}}{5} \\\\

     =\frac{\left ( -25 \right )^{2}+\left ( 25  \right )^{2}+\left ( 15\right )^{2}+\left ( -5 \right )^{2}+\left ( 5 \right )^{2}+\left ( 15 \right )^{2}}{5} \\\\ =\frac{625+ 625+225+25+25+225}{5} \\\\ =\frac{1750}{50}\\\\=350

Calculating the Standard deviation:

\sigma _{A}=\sqrt{\sigma _{A}^{2}}=18.7

Calculating the Mean for brand B:

\bar{X_{B}}=\frac{35+45+30+35+40+25}{6}=\frac{210}{6}=35

Calculating the Variance for brand B:

\sigma_{B} ^{2}=\frac{\left ( 35-35 \right )^{2}+\left ( 45-35 \right )^{2}+\left ( 30-35 \right )^{2}+\left ( 35-35 \right )^{2}+\left ( 40-35 \right )^{2}+\left ( 25-35 \right )^{2}}{5}

    =\frac{\left ( 0 \right )^{2}+\left ( 10 \right )^{2}+\left ( -5 \right )^{2}+\left (0 \right )^{2}+\left ( 5 \right )^{2}+\left ( -10 \right )^{2}}{5}\\\\=\frac{0+100+25+0+25+100}{5}\\\\=\frac{100+25+25+100}{5}\\\\=\frac{250}{5}\\\\=50

 Calculating the Standard deviation:  

\sigma _{B}=\sqrt{\sigma _{B}^{2}}=7.07

4 0
3 years ago
Other questions:
  • ____ indicates the number of pixels that a computer uses to display the letters, numbers, graphics, and background on a screen.
    12·2 answers
  • Why were mechanical calculators developed?
    8·2 answers
  • PLEASE HELP ME ANSWER AS MUCH AS YOU CAN I ONLY HAVE 3 POINTS LEFT AND IM TIMED. PLEASE TELL ME THE NUMBER AND LETTER. THANK YOU
    5·1 answer
  • Which of the following works on the pay-per-click (PPC) and cost-per-click (CPC) concept? ~ Plato
    9·1 answer
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    12·1 answer
  • Ashton assigned a string value to a variable. Which program statement should he use?
    5·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
  • How do you enter the decimal 73 into the computer?
    11·1 answer
  • An IT department receives a shipment of 20 new computers, and Alice has been assigned the task of preparing them for deployment
    12·1 answer
  • Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!