1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
3 years ago
12

True or false?

Computers and Technology
1 answer:
AnnZ [28]3 years ago
7 0

Answer:

True

Explanation:

Media coding is the procedure of defining the Media codes, written symbolic and technical tools that are applied to construct or come up with the meaning in various media products or forms. It includes the proper use of the camera, setting, acting, editing, special effects, sound, color, text, visual composition, graphics, typography, and mise en scene. Hence, the fact mentioned in the question is true.

You might be interested in
In social networking websites such as twitter, people leave narrow minded and subjective remarks and upload unacceptable videos.
koban [17]
The advice is That you Message Them To remind Them Those Type of posts are not appropriate if people on social Media say bad Things To you you block Them if people don’t Treat you nice
8 0
3 years ago
Which one of these is a mem?
sweet [91]
If you are referring to a meme then the answer would be B. This is because memes are pictures that spread throughout the internet. The answer choice A would be a username. I was not able to find anything on the word mem that relates to computers but I did learn that it is the 13th letter of the Hebrew alphabet.
8 0
3 years ago
I think these might be the answers but im not to sure, so am I right? or wrong? please help
mina [271]
Number 1 and 4 are the same? I agree with your answers.
4 0
3 years ago
Read 2 more answers
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
Allisa [31]

Answer:

distributed denial of service

Explanation:

5 0
3 years ago
Read 2 more answers
The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:__________.
Phantasy [73]

Answer:

Port scan targeting 192.168.1.106.

Explanation:

In the following question, there is some part of the question and options is missing.

In the following statement, when a file log is taken from the computer system which has Internet Protocol address is given in the statement and by the further details of the statement in which time and the port destination by examine those details of the Internet Protocol, the following port scan targeting the IP address 192.168.1.106.

3 0
3 years ago
Other questions:
  • Why is it helpful hat the ribbon tabs can collapse
    10·1 answer
  • You can deselect multiple selected sheets beginning with the sheet1 tab by pressing the ____ key and clicking the sheet1 tab.
    15·1 answer
  • Which technological innovations along history allowed the appearance of the computer
    9·2 answers
  • The ability to anticipate and determine upcoming driving hazards and conditions are adversely affected by stress.
    10·1 answer
  • What must be done to translate a posttest loop expressed in the form
    9·1 answer
  • What are computers used for?
    14·2 answers
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • You cannot legally install macOS on a PC that originally came with Windows<br> True or false
    13·2 answers
  • Using simplified language and numbers, using large font type with more spacing between questions, and having students record ans
    9·1 answer
  • Need help with these plss correct answers
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!