1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
12

What are two constraints that continuous-media files have that conventional data files generally do not have?

Computers and Technology
1 answer:
musickatia [10]3 years ago
4 0

Answer:dATA space and gb

Explanation:

You might be interested in
After you divide the viewfinder appropriately you locate the subject? PLZ ANSWER MY TEST DO BY TONIGHT
Sloan [31]
The Answer is A: <span>along one of the division lines. </span>
4 0
3 years ago
Which of the following is an example of constructive criticism for a friend who speaks too softly?
Dmitry [639]
C is correct..

Please vote my answer branliest! Thanks.
8 0
3 years ago
Read 2 more answers
What is the purpose of the fit to size feature in Word?
Olegator [25]

Answer : computer

Explanation:

please mark me as brilliant

3 0
3 years ago
Name two features that would be useful to potential customers
Dmitry [639]

Answer:

  1. How your business is unique
  2. A clear sense of what your company offers

Explanation:

Respond the subject "Who are you and What your business represents?" as interestingly and compellingly as feasible. This involves recording administration bios that state your expertise, times of struggle and various different qualities or details that may make you special from others.

"It's unbelievable how many businesses you visit and you're unsure something the organization offers". Execute it a superiority on your homepage to present at least comprehensive information regarding your outcomes and/or co-operation.

6 0
3 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
Other questions:
  • Which social networking function came first?
    9·2 answers
  • Which of the following is not true about search engine advertising?
    15·1 answer
  • What are the pros and cons of using ICT
    5·1 answer
  • Consider an application that transmits data at a steady rate (for example, the sender generates N-bit unit of data every k time
    7·1 answer
  • PLEASE HELP I FAILED TWICE AND HAVE ONLY ONE MORE TRY BEFORE MY GRADE ARE SET I AM CRYINGGGGG PLEASEEE IM BEGGINGGGGG
    10·1 answer
  • Edhesive 8.5 code Practice help me pls
    15·1 answer
  • How dose society use computer in government?​
    5·1 answer
  • The merge and center
    14·1 answer
  • .....is used to save project in Visual basic .net from file menu
    6·1 answer
  • Write a function named swapFrontBack that takes as input a vector of integers. The function should swap the first element in the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!