1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
5

Which element can a composer use to lengthen the duration of tone

Computers and Technology
2 answers:
N76 [4]3 years ago
6 0

Answer:

The element is called "Dotted Note"

Explanation:

The dotted note is used to increase the duration of the basic note by half of it's original value. Dotted note consist of a small dot that is written after it.

It is basically use to represent the change in the duration of the note.

We have the following types of dotted note

Dotted whole not, for 6 beats

Dotted half note for 3 beats and so on.

The type of dotted note to use depends on the duration of tone you desire.

sweet-ann [11.9K]3 years ago
5 0
The answer is the element can be used by a composer to lengthen the duration of a tone is dotted note one dot represents the increase in duration of a basic note by half of it's original value
You might be interested in
Which technological innovation was most important for early-nineteenth-century economic development?
Sonbull [250]

Answer:

Electricity

Explanation:

Innovation is the ability to create a new device or process, resulting from study and experiments. There were a couple innovations that came into existence in the early-nineteenth-century, but the most important is electricity.

The birth of electricity brought about a totally different means to solve man-powered labor. Hence, saving time and achieving more.

This also led to the innovation of various devices and processes that further paved way for more economic growth.

4 0
3 years ago
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
​_____ refers to​ internet-based platforms that allow users to create their own content and share it with others who access thes
liberstina [14]
This would be considered a social media platform due to it allowing people to share content.<span />
6 0
3 years ago
5. Something that has a value 2 points<br>is called a/an<br>O<br>NODE<br>POWER<br>O<br>ATOM​
morpeh [17]

Answer:

it's ONPOA

Explanation:

try use a board game by some of the pins or any type that is part of the game and see if that helps out.

6 0
4 years ago
Write a function called is_even that takes one parameter and returns a boolean value. It should return True if the argument is e
Nikitich [7]

def is_even_number(n):

   return True if n % 2 == 0 else False

while True:

   number = int(input("Enter a number: "))

   if number == 0:

       break

   else:

       if is_even_number(number):

           print("Even")

       else:

           print("Odd")

I wrote my code in python 3.8. I hope this helps.

6 0
3 years ago
Other questions:
  • Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key
    7·2 answers
  • Why does hamlet want to kill himself and what stops him from doing that?
    10·1 answer
  • Which option should u select to ignore all tracked changes in a document
    8·1 answer
  • PowerPoint’s _____ feature can assist you in finding answers to questions such as “How can I specify which slides to print?” a.
    6·1 answer
  • Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
    5·1 answer
  • 5) [4 points] Suppose you have a simple computer that is capable of storing only the months of the year. The number of bits avai
    12·1 answer
  • Windows XPProfessional and Windows Vista Both have same devicedrivers.<br> True<br> False
    5·1 answer
  • Write the definition of a function named newbie that receives no parameters and returns 1 the first time it is invoked (when it
    7·1 answer
  • How to transfer bookmarks from one computer to another.
    13·1 answer
  • What dod instruction implements the dod cui program
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!