1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DochEvi [55]
3 years ago
9

How is a sound file downloaded from the internet different to a sound file on a cd

Computers and Technology
1 answer:
e-lub [12.9K]3 years ago
5 0

An audio file format is a file format for storing digital audio data on a computer system. The bit layout of the audio data (excluding metadata) is called the audio coding format and can be uncompressed, or compressed to reduce the file size, often using lossy compression. The data can be a raw bitstream in an audio coding format, but it is usually embedded in a container format or an audio data format with a defined storage layer.

You might be interested in
Which stage of the waterfall model is most like the simple model's stage 5?
Tema [17]
Maintenance, Output requirements, Forking. This one is tricky because one would think "input", but everything that is inputted must be outputted, so they are combined. The simple model of development. It's pretty self explanatory. Communications between programmers who are working on related features. Version control is all about communication--- so this is the most logical option. Even though "The features that are currently being development. 
8 0
3 years ago
Work with a partner to answer the following question: How might learning the language
AysviL [449]

Answer:

easy to learn is one similarity

longer experience needed is on difference

HOPE THIS HELPS .......

4 0
3 years ago
Data warehousing is a(n) __________, and data mining is a(n) ____________.
Maksim231197 [3]

Answer:

B. Process, group of techniques

Explanation:

Data warehousing simply means storing large amounts of data from multiple sources to a central "warehouse" to be analyzed or simply stored for later. Data mining on the other hand involves discovering patterns in sets of data to make better decisions. Analyzing data with a group of techniques like statistics and machine learning.

8 0
3 years ago
Fill in the blanks:(a)Every Java program must have at least one ______________.(b)The Java program is executed from _________ me
ivann1987 [24]

Answer:

A two

B system unit

C Computer

Game

4 0
4 years ago
For this assignment, you will follow detailed instructions to format an Excel worksheet demonstrating your knowledge of how to m
Vadim26 [7]

A date function in Excel is a function that enables one to enter the various values for a date such that it comprises the values for:

  • Year
  • Month
  • Day.

<h3>What is a Nested Date Function?</h3>

A nested date function is a formula that uses a date function in carrying out a calculation.

In this case, we used nested the dates of purchase in the function that calculated the expiry date of the items purchased using the following formula:

=DATE(YEAR(A2)+5,MONTH(A2),DAY(A2))-1

Learn more about Nested Formulas at:

brainly.com/question/17041438

#SPJ1

Download xlsx
8 0
3 years ago
Other questions:
  • Platon says, when taking a photo you should:<br> (Photography class)
    5·1 answer
  • Why is Bot_Seth Trash at video games?
    13·2 answers
  • Which option will enable Mina to apply several formats to the spreadsheet cells at the same time?
    5·1 answer
  • Why are laptops usually more expensive than desktop computers with comparable power and features?
    10·1 answer
  • Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
    6·1 answer
  • What device is used to transmit what is effectively a type of Morse code between stations?
    11·1 answer
  • Which industry did the Interstate Commerce Act primarily affect? A. coal B. airplane C. steel D. oil E. railroad
    6·2 answers
  • What is the primary means by which attackers infect computers with these attacks? How do these attacks commonly occur?
    8·1 answer
  • Three materials needed to stream video video content
    10·2 answers
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!