1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
5

What happens when your project is rendered?

Computers and Technology
1 answer:
jok3333 [9.3K]3 years ago
4 0

Answer:

B

Explanation:

when your rendering video project your computer is processing all the data that goes into creating images you experience video rendering every time you look at your computer the images on your screen has all been rendered to produce the website photo or video you are looking at

You might be interested in
You knew that you had to take this quiz so you logged into Blackboard and went to the quizzes section. In this scenario your com
jok3333 [9.3K]

Answer:

The answer is "Client, Server".

Explanation:

In the given statement some information is missing, which can be described as follows:

A) Client, Server

B) serve, software

C) serve, hardware

D) client, software

The client-server is a method, that explains how well a database supports one or more users with services and support. In operating systems, terminal servers and file servers examples are resources, including desktops, notebooks, and smartphones, and certain option was wrong, which can be described as follows:

  • In option B, It is used to manage the computer server.
  • In option C, It is used to manage the network.
  • In option D, The client uses software to request to the server.
4 0
3 years ago
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
Damm [24]

Answer: white hat hacker

Explanation:

Like other forms of hacker, white hat hackers also have wide range of knowledge of breaking into systems, overriding firewalls, bypassing security protocols and can also do all other things hackers do. But what differentiates white hat hackers is the motive behind what they do, in that they carry out all this test not for their personal gain but for the benefit of the owners and also with the approval of the owners. Because after carrying out tests on the ways of exploiting the loop holes in the system they reveal it to the manufacturer or system owners for correction.

4 0
4 years ago
Which type of protocol provides a way to transfer files from one computer to another over any tcp/ip network, such as a lan or t
Alexxandr [17]

Answer:

FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over Transmission Control Protocol/Internet Protocol (TCP/IP) connections. Within the TCP/IP suite, FTP is considered an application layer protocol.

Explanation:

hope it helps you mark me as brainlist and follow me

4 0
2 years ago
Which precaution should you take while working on a computer
Ksivusya [100]

Answer: Maintain a cool temperature to avoid sweating

Explanation:

7 0
3 years ago
Draw directed graphs representing relations of the following types.
mixas84 [53]

Answer:

The first graph in the picture describes a relation that is (a) Reflexive, transitive, and anti-symmetric.

Because a, b, c, d all are related to itself, so reflexive.

where (a, b) and (b, d) are in the relation, (a,d) is in the relation,    

for (c,a) and (a,b) there is (c,b).

so it's transitive.

for all a,b in the relation, (a,b) there is no (b,a) with a ≠b.

The second graph in the picture describes a relation that is (b) Reflexive, transitive, and neither symmetric nor anti-symmetric.

Because a, b, c, d all are related to itself, so reflexive.

where (a, b) and (b, a) are in the relation, (a,a) is in the relation,                                                    

where (c, d) and (d, d) are in the relation, (c,d) is in the relation,                                                    

so it's transitive.

Because, (a,b) and (b.a) are there, but for (c,d) there is no (d,c) in relation.

So, the relation is not symmetric.

(a,b) and (b,a) is in relation but, a≠b, so not anti symmetric.

Explanation:

For all a in a set,  if (a,a) in a relation then the relation is reflexive.

For all (a,b) in relation R, if (b,a) is also in R, then R is symmetric.

For all (a,b), (b,c) in relation R, if (a,c) is also in R, then R is transitive.

For all (a,b), (b,a) in R, a = b,  then R is an anti- symmetric relation.

3 0
3 years ago
Other questions:
  • Write statementsto show how finding the length of a character array char [ ] differs from finding the length of a String object
    9·1 answer
  • In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
    5·1 answer
  • A​ ________ is a component in the computer system data hierarchy that includes content such as Student ID​ 100; Course IS​ 101,
    15·1 answer
  • 20 PTS URGENT!!! Derek’s organization uses an emerging technology that uses specialized software to place an image on an object,
    6·2 answers
  • Which of the following is not a component of Google Display ads' value proposition?
    9·1 answer
  • Having a conversation with someone using a cellular phone is an example of _____ transmission.A. full-duplexB. half-duplexC. ana
    14·1 answer
  • 35 POINTS
    10·1 answer
  • How much money did Uta initially invest?$180.00$320.00$352.48$471.70
    14·1 answer
  • How does the internet works
    14·1 answer
  • Technological advancements during the industrial age provided Americans with:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!