1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
muminat
3 years ago
10

MIDI is a A.technology based on placing brief digital recordings of live sounds under the control of a synthesizer keyboard. B.t

echnology based on representing data in terms of measurable physical quantities. C.standard adopted by manufacturers for interfacing synthesizer equipment. D.technology based on representing physical quantities as numbers
Computers and Technology
1 answer:
dalvyx [7]3 years ago
5 0

Answer:

The answer is "Option C".

Explanation:

MIDI is a way of collecting and playing music on wireless acoustic instruments. It's a multitasking software system sponsored by various home computer manufacturers. Initially designed to handle one mouse, it was used for Mac easily, and other choices are not correct, which can be described as follows:

  • In option A, It is not used to control keyboard, that's why it is wrong.
  • In option B, It doesn't represent data, that's why it is incorrect.
  • In option D, It isn't used to represent physical quantity, that's why it is wrong.  
You might be interested in
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Which one is the correct answer
STatiana [176]

the right anwser is d


3 0
3 years ago
When pasting a circle drawn by the presentation software drawing tool into a spreadsheet, that circle will go into the selected
ivann1987 [24]
The answer is ............................ False
6 0
3 years ago
Read 2 more answers
Identifiy the impact of new technology for your organizations <br>​
Len [333]

Answer:

1)The Sleepwalker Effect. This effect has several dimensions. ...

2)The Transparency Effect. ...

3)The Black Box Effect. ...

4)The Splintering Effect.

7 0
2 years ago
What is a programming method that provides for interactive modules to a website?
Veseljchak [2.6K]

Answer:

Java?

Explanation:

8 0
4 years ago
Other questions:
  • To specify grouping and sorting for a report, click the ____ button on the design tab in layout view.
    14·1 answer
  • Contextual targeting method mean
    11·1 answer
  • nside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in th
    6·1 answer
  • Why would an IT technician ever have to change out a computer’s motherboard?
    5·2 answers
  • Drag each label to the correct location on the image List the do’s and don’ts of safeguarding your password.
    14·1 answer
  • How does the speaker feel about traditional forms of poetry
    14·2 answers
  • Which two tasks are associated with router hardening? (choose two.)?
    6·1 answer
  • In the code snippet, what is the “win” part called in programming?
    12·1 answer
  • Public class Square extends Shape{
    13·1 answer
  • What is the vibrating or buzzing of a hand controller known as?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!