1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
3 years ago
9

Need help ASAP Examples of utilities that make it possible for people to create and share multimedia files include _____. audio

recorders encryptors QuickTime RealPlayer remote controllers video players
Computers and Technology
2 answers:
Minchanka [31]3 years ago
6 0

Answer: the Internet vs. the web

internet: interconnected mesh of computers/data lines that connect millions of people

web: multimedia interface to the resources on the internet

access the internet through

ISP (internet service provider)

browsers

programs that provide access to web resources/allow you to explore the web

URL

uniform resource locator

2 parts of URL

protocol & domain name

top level domain

web suffix, ie. .com .org .net .edu

HTML

hypertext markup language

web utilities

specialized utility programs that make using the internet/web safer and easier

examples of web utilities

plug ins, filters, file transfer utilities, internet security suites

plug ins

programs that automatically start and operate as part of your browser- they provide an enhanced browsing experience by enabling special file formats and multimedia elements like QuickTime, Acrobat, Flash, etc

Explanation:hope this helps stay safe:)

a_sh-v [17]3 years ago
5 0

Answer:

Prototype

I think this is the word ur looking for!

You might be interested in
The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
Rudiy27

Answer:

True

Explanation:

Computer security is basically divided into three main areas:

  1. Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
  2. network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
  3. digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.

Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.

8 0
3 years ago
Read 2 more answers
The state licensing bureau recently conducted a survey at Community Hospital. During this review, the surveyors determined that
marshall27 [118]

Answer: Opportunity for Improvement

Explanation:

Any healthcare organization, service, or process that does not reach the established standard or the customer's expectations, is an opportunity for improvement. Furthermore, the Improving Medicare Post-Acute Care Transformation Act (IMPACT) established a quality reporting program aimed to find those opportunities for improvement. Once the problem has been established, is prudent to place an action plan to achieve the desired performance improvement aim.

3 0
3 years ago
Write a program that repeatedly shows the user a menu to select the shape form three main shapes or to print the shapes created
fomenos

Answer:

Explanation:

The following code is written in Python. It creates a program that keeps printing out a menu allowing the user to create shapes. These shapes are saved in an array called shapes. Once the user decides to exit, it prints all of the shapes in the array along with their total area. The output can be seen in the attached picture below. Due to technical difficulties, I have added the code as a txt file below.

3 0
2 years ago
The closing of the letter should have at least
asambeis [7]

Answer:

Im unclear exactly what it is saying but i think its 2

7 0
3 years ago
In GIMP, the ( ) displays the image that the user is currently working on
kotykmax [81]
I don'r know what your trying to use? GIMP is a free photo editing software just upload it to photobucket.
7 0
3 years ago
Other questions:
  • Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of _____ for doing wel
    5·2 answers
  • In Word, tables can be styled much like text can.<br> True<br> False
    6·1 answer
  • A hub or ____ is a central point that connects several devices in a network together.
    11·1 answer
  • If you have a windows 8, but want the features of windows 8 pro, purchase and install _______.
    7·1 answer
  • A computer lab has two printers. Printer I handles 40% of all the jobs. Its printing time is Exponential with the mean of 2 minu
    8·1 answer
  • Why did Hunter gatherers moved into the<br>America's?​
    8·1 answer
  • Which is slower RAM or the CPU?
    11·2 answers
  • Who's YouTube creator?
    10·2 answers
  • Any one know :) please
    9·1 answer
  • Discuss how a lack of infrastructure in poor communities could contribute to ill-health such as the Unrest looting.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!