1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Westkost [7]
3 years ago
8

Which file type is typically used for videos? GIF MPEG MP3 PDF

Computers and Technology
1 answer:
Sav [38]3 years ago
6 0

Answer:

MPEG

Explanation:

A GIF is a short repeating low-quality video clip

A MP3 file is an audio file

A PDF file is a text document

MPEG is the international standard for encoding and compressing video images

Hope this helps!

(Please mark Brainliest!)

You might be interested in
A computer on a network that is not the server​
katrin [286]

Answer:

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. ... A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.

5 0
3 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulatio
svet-max [94.6K]

Answer:

a. HIPAA

Explanation:

HIPPA represents the Health Insurance Portability and Accountability Act that of the United States which becomes mandatory for protecting the medical data in any form.

Also in the case of data protection that represent the general regulations, PCI DSS, GDPR etc would be used

So the option a is correct

hence, all the other options are wrong

8 0
3 years ago
Ranges of IP address that anyone can use for their internal networks are known as ______.
Rama09 [41]
Since no answer choices, have to deduce it is Private Networks
8 0
3 years ago
Read 2 more answers
Which of the following sets of data would be presented best in a histogram.
anastassius [24]
I do not believe you answer is right. I believe it would be B the average montly sales for the big toy company. Only documenting the last month is not enough information to make a histogram, and a histogram asks for information based on one subject not multiple subjects. Asking for the number of each type of candy sold last month would make a normal graph comparing the difference in how much each candy sold, so your answer should be B.
3 0
3 years ago
Other questions:
  • When you first start your computer, which software will have to start first?
    5·2 answers
  • Data arranged and stored in a data set
    9·1 answer
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    12·1 answer
  • Which resources could be used a lot when installing a desktop app for synchronization purposes? Choose two answers.
    5·1 answer
  • A microphone, a track ball, and speakers are all examples of ____. hardware software
    6·2 answers
  • Which of these files, when included in a program, will provide user assistance?
    5·2 answers
  • How would you reduce or minimize the size of a "file"?
    5·1 answer
  • Do you think it’s better for a young designer to use free, open-source art programs or to pay for commercial programs? Explain y
    14·1 answer
  • Is windows CUI operating system??<br><br><br>What is the main purpose of folder ????<br><br><br>​
    15·1 answer
  • Consider the following code using the posix pthreads api:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!