1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
4 years ago
14

To record your own audio, you must have _____.

Computers and Technology
2 answers:
dsp734 years ago
8 0
Well i feel like is A. Or C. The first thing that I will need is a recording software and then a mic phone..
zhannawk [14.2K]4 years ago
5 0

Hi,

Answer: C) A microphone

<u>My work:</u> To be able to record your voice you must have a microphone to input the sounds.

I Hope I Help!

You might be interested in
________ software helps run the computer and coordinates instructions between other software and the hardware devices.
Tema [17]
The answer is coded without coding we would not have instructions and sequences to start operations like games videos music and so on
6 0
3 years ago
Which of the following networks had these two goals: a) allowing scientists to work together on scientific projects; and, b) fun
mrs_skeptik [129]

Answer:

ARPANET

Explanation:

It was the ARPANET sponsored by the US Department of Defense to enable scientists collaborate on research.

5 0
3 years ago
Read 2 more answers
____ occurs when data is entered into the computer.
tangare [24]
I would personally say input.
5 0
4 years ago
A chief Information Officer (CISO) is working with a consultant to perform a gap assessment prior to an upcoming audit. It is de
artcher [175]

Answer: (D) Vendor management plan

Explanation:

 The chief information officer (CISO) is basically explain about areas of the improvement to the vendors so that is why vendor management plan should be implemented to address the gap assessment in the upcoming audit.

Chief information officer basically managed all the report that are provided to the department of the audit on the monthly bases.

The vendor management are basically responsible for managing all the upcoming assessment in the audit in an organization.

8 0
3 years ago
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
Other questions:
  • Binary search requires that data to search be in order. true or false
    5·1 answer
  • ____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a netw
    12·1 answer
  • Tom installs a Telnet application on his Windows Vista system. When he first starts the program, Windows Firewall pops up with a
    10·1 answer
  • Which custom configuration is most likely to include a raid array?
    14·1 answer
  • Software that tries to monitor and track the way you use your computer.​
    10·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    12·2 answers
  • How to write conclusion of hard disk​
    11·1 answer
  • What do you understand by the term input, output, processing and storage.​
    12·2 answers
  • Government entities may pressure upstream Internet service providers to _____. a. track and monitor the Internet activities of i
    11·1 answer
  • How have the computers contributed in the banking ?<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!