1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
12

What are two constraints that continuous-media files have that conventional data files generally do not have?

Computers and Technology
1 answer:
musickatia [10]3 years ago
4 0

Answer:dATA space and gb

Explanation:

You might be interested in
write code to print out all combinations of pairs of numbers 1 through m and 1 through n, separated by a comma
Julli [10]

Answer:

bsnsj jsjs ieisis ieies ejsiis ejsiiw ejieis uruen

Explanation:

bsjsjs sjeisibeieie 388393 wi9q9wnss jsjsjs ejeuisbskwoa

5 0
2 years ago
What are input masks most useful for in data validation? moving data from one field to another hiding parts of a value that are
tia_tia [17]

Answer:

Ensuring Consistent Formatting of Values in a Specific Field

Explanation:

6 0
3 years ago
Read 2 more answers
If your pulse is higher than your Target Heart Rate during exercise, what should you do?
vodomira [7]
If your heart rate exceeds 185 beats per minute during exercise, it is dangerous for you. Your target heart rate zone is the range of heart rate that you should aim for if you want to become physically fit. It is calculated as 60 to 80 percent of your maximum heart rate.
8 0
2 years ago
Read 2 more answers
Assume the user types in 7 for x and 2 for y. What is output by the
vladimir1956 [14]

Answer:

49

Explanation:

3 0
2 years ago
Is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking
aleksandr82 [10.1K]
The answer would be software exploitation
4 0
3 years ago
Other questions:
  • Pete Jones, a bait shop owner, incorporates ______ within a webpage to entice customers to buy a new lure.
    7·1 answer
  • Which elements in a web page require a visitor’s action?
    15·1 answer
  • Solve system of equations. <br>x+2y-z=4<br>2x-y+3z=8 <br>-2x+3y-2z=10
    12·1 answer
  • How do you design video games
    5·1 answer
  • By which method is heat transferred through a metal <br> spoon?
    9·2 answers
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • What is a traffic controller?what are its functions?
    13·1 answer
  • Which of the following statements is correct?
    11·1 answer
  • Como se diseña y produce un material audiovisual
    5·1 answer
  • Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!