1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
4 years ago
7

Suppose you wanted to save your master audio recording in an uncompressed format. Which of the following audio file formats shou

ld you use? MP3 PCM AIFF WMA Ogg Vorbis
Computers and Technology
2 answers:
faust18 [17]4 years ago
5 0

Answer:

MP3

Explanation:

It is MP3 because it is the best audio to use for audio input

Katyanochek1 [597]4 years ago
3 0

Answer:

B) PCM AIFF

  is the correct answer I did it on assignment

Trust me!

Explanation:

You might be interested in
Name:
Elanso [62]
1 6gb of ram
inteel
500gb
500gb
4 0
3 years ago
Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
yarga [219]

Scripting languages are unique computer languages because they automate task that could be done by human operator and are easy to use.

<h3>What is a scripting language?</h3>

Scripting languages are programming languages that is interpreted.

They are programming languages that automates the task that will originally be performed by a human operator.

Scripting languages are used to give instruction to other software to run accordingly to how you want it.

The scripting language is different form other language base on the fact that its interpreted . This means the code are translated to machine code when it is run.

The major advantage of scripting languages is that it is human readable and understandable.

Examples of scripting languages are Python and JavaScript.

learn more on scripting here: brainly.com/question/12763341

#SPJ1

3 0
2 years ago
You must configure a certificate authority on your network to use EFS. True or False?
Westkost [7]

You do not need to configure a certificate authority on your network to use EFS.

<em>EFS</em> is the short form for<em> Encryption File System</em>. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using <em>logon authentication</em> and <em>NTFS file permissions</em>), EFS allows to add another layer of security to data.

To <em>encrypt</em> and <em>decrypt</em> data files and folders in EFS, a <em>certificate authority (CA)</em> could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, <em>EFS will generate its own certificate</em> if none does not exist.

<em>The following are other things to note about EFS</em>

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: brainly.com/question/10410730

6 0
2 years ago
What's ur favorite color and your dream car
alex41 [277]

Answer:

blue and jeep wrangler or a hellcat widebody :)

Explanation:

5 0
3 years ago
Read 2 more answers
Please help me with these questions please
sp2606 [1]

Answer: i think its 30.

4 0
3 years ago
Other questions:
  • Write a function with two parameters, prefix (a string, using the string class from ) and levels (an unsigned integer). The func
    14·1 answer
  • Microprocessors can’t directly understand programming languages, so programs have to be converted into _____________ that corres
    15·1 answer
  • If you can log into a website to add, edit, or delete content that has been added by you or another user, you are most likely us
    6·1 answer
  • What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for
    10·1 answer
  • Cerința
    6·1 answer
  • If a variable uses more than one byte of memory, for pointer purposes its address is: Group of answer choices the address of the
    12·1 answer
  • You created a database related to computer hardware parts and their details. You'd like to view the names of the parts in alphab
    9·1 answer
  • Write the issue related to the cyber ethnic. ​
    7·2 answers
  • Which option will be used to attach email messages ​
    6·1 answer
  • An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!