1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
2 years ago
12

Match the elements of a web page with their descriptions.

Computers and Technology
1 answer:
jonny [76]2 years ago
5 0

Answer:

video - includes file formats AVI and WMV

graphics - includes maps and photographs  

animation - includes a rapid display of a sequence of static images

audio - includes file formats WAV and MPEG 3

Explanation:

The given elements of a web page have correctly been matched with their descriptions in order to define them adequately. The element that characterizes video data involves a common format of files like AVI(in Microsoft) and WMV(windows media video). While Graphics are described as the pictorial representation and manipulation of data and hence, it involves pictures, along with, photos. Animation involves the process of giving inanimate objects or drawings a motion form and hence, it includes a series of static images to show the movement. While audio lays focus on audible sound with formats like MPEG 3(audio file).

You might be interested in
What is a document?read.Miércoles, 19 de agosto ¡Saludos Mario! ¿Cómo estás amigo? ¿Cómo está tu familia en Caracas? Mi familia
natka813 [3]

Answer:

A Document is a virtual paper that you can type on

Explanation:

A piece of written or electronic paper that provides information or evidence or that serves as an record.

7 0
3 years ago
From your fist impression, write down what first comes to mind as to what is good and bad about the way the device works.
nalin [4]

Answer:

xczczxczx

Explanation:

6 0
3 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
____ are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its par
Bad White [126]
<span>Truth tables are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its parts.

A truth table shows all the possible combinations (outputs) that can be produced from the given inputs. They are mainly used in Boolean algebra.</span>
4 0
3 years ago
How do you innovate or improve a product?
In-s [12.5K]

Answer:in order to innovate or improve a product you need to have an idea

Explanation:

5 0
3 years ago
Other questions:
  • In computer logic what is order of instructions
    13·1 answer
  • What is the main feature of chat rooms?
    9·2 answers
  • Where can i watch bnha movie 2 online for free, with no sign up or pay?
    6·2 answers
  • What framework provides a simple API for performing web tasks?
    13·1 answer
  • Universal Containers uses a custom object within the product development team. Product development, executives, and System Admin
    11·1 answer
  • Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
    15·1 answer
  • What will you see on the next line? &gt;&gt;&gt; int(6.5)
    12·2 answers
  • A ____________ is a collection of commands given a name.
    11·1 answer
  • Do yall think I should be lonely and quit life!!
    8·2 answers
  • susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct state
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!