1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
5

Which element can a composer use to lengthen the duration of tone

Computers and Technology
2 answers:
N76 [4]3 years ago
6 0

Answer:

The element is called "Dotted Note"

Explanation:

The dotted note is used to increase the duration of the basic note by half of it's original value. Dotted note consist of a small dot that is written after it.

It is basically use to represent the change in the duration of the note.

We have the following types of dotted note

Dotted whole not, for 6 beats

Dotted half note for 3 beats and so on.

The type of dotted note to use depends on the duration of tone you desire.

sweet-ann [11.9K]3 years ago
5 0
The answer is the element can be used by a composer to lengthen the duration of a tone is dotted note one dot represents the increase in duration of a basic note by half of it's original value
You might be interested in
Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
Sav [38]

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
8 0
3 years ago
List five kinds of view in the computer and briefly define each​
mr Goodwill [35]

Answer:

It responds to a specific set of instructions in a well-defined manner. It can execute a prerecorded list of instructions (a program).

5 0
2 years ago
_____ is the unauthorized entry into a computer system via any means
Montano1993 [528]
Hi,

The word you are looking for is "Hacking".

"Hacking is unauthorized entry into a computer system via any means."

Hope this helps.
r3t40
4 0
3 years ago
Which is a common problem caused by the widespread use of computers?
Andru [333]
Hacking would be a widespread problem.
8 0
3 years ago
Wich command converts a number to a string​
AfilCa [17]

Answer:

okay yes i agree

Explanation:

8 0
3 years ago
Other questions:
  • Why do we need the Domain Name System (DNS)? Given the domain name www.flamingflamingos.eu, what is the top level domain in this
    5·1 answer
  • Why is there more content on youtube in 4k then there is on cable, satellite, and digital tv combined?
    6·2 answers
  • Is anyone really good at immerse 2 learn??
    9·1 answer
  • If you need seamless access to the OS, ________ is better.
    8·1 answer
  • You can count on everything online to be 100% accurate. <br> A. FALSE <br> B. TRUE
    11·2 answers
  • Write the algorithm and draw a flowchart to display the greatest number among any two different numbers....
    5·1 answer
  • Which best describes how a supporting database will be structured?
    10·1 answer
  • NEED HELP ASAP!!!!!!!!!!!
    7·1 answer
  • write code that removes the first and last elements from a list stored in a variable named my_list. assume that the list has bee
    13·1 answer
  • • Do you think documentaries are best delivered in media such as films or documentary?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!