1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vilka [71]
3 years ago
9

How do you make a ringtone on earsketch

Computers and Technology
1 answer:
RoseWind [281]3 years ago
4 0

Haven't used earsketch, but here we go.

Answer:

1). Make a track in earsketch, make it like 6/7 seconds

2.) export your track as an .mp3, .wav, or  .ogg (your choice!)

3.) (If on android) Navigate to settings, now search for an entry for ringtone.

4.) If you have no luck, look up how to set ringtone on your desired phone brand (iOS, Android, etc.)

5.) Test out your new ringtone

6.)Profit

You might be interested in
Which binary signaling technique uses a scheme in which zero voltage represents a 0 bit and the voltage for a 1 bit does not dro
prisoha [69]

Answer:

In binary signaling, Non Return to Zero (NRZ) is the technique in which zero voltage is represented by 0 bit while high voltage is represented by 1 until the voltage level change from high to low.

Explanation:

There are different techniques to encode the signal for transmission between transmitter and receiver. These techniques includes return to zero, non return to zero. In return to zero technique, the if the voltage is high the signal will become 1 for half of the time period and then after half time period it return to 0.

In NRZ the signal is 0 if the voltage level is zero. In case of high voltage of the signal the binary bit remains 1 until the next zero voltage level arrive in the signal until the end of the time period of bit.

6 0
4 years ago
Disuss the roles of hardware,software and databases in regard to computer based information systems
forsale [732]

Explanation:

Data bases; interpretation and presentation of data in useful formats by transforming raw data into information, data storage management.

Hardware: helps to get to the physical and tangible part of computer.

Software; helps to access the word processor, spreadsheet's and social media platforms and general operations in a computer.

6 0
3 years ago
The value of the expression 20.0 * (9/5) + 32.0 is
Rama09 [41]

Answer:

68

Explanation:

9/5 = 1.8

20 * 1.8 + 32

20 * 1.8 = 36

36 + 32 = 68

7 0
3 years ago
Pls help me, it's due today​
Leviafan [203]

Answer:

1. Electronic devices

2. B= Headphones, C= projector, d= computer, e= speakers, g= printer

Explanation:

i dont know  what A and F are sorry

6 0
3 years ago
Read 2 more answers
what is musical technology specifically, the origins of its genesis & its importance to the baroque era
ki77a [65]

Answer:

There were three important features to Baroque music: a focus on upper and lower tones; a focus on layered melodies; an increase in orchestra size. Johann Sebastian Bach was better known in his day as an organist. George Frideric Handel wrote Messiah as a counterargument against the Catholic Church

3 0
3 years ago
Other questions:
  • _______________________ is a short-term program, typically 30 hours long, in which a therapist, social worker, or trained probat
    5·1 answer
  • Which of the following things should you do first when planning your career?
    15·2 answers
  • PLEASE HELP!!!!!!!!!!!!!!!!!!!!
    13·1 answer
  • Write a function strlen_recursive which accepts a pointer to a string and recursively counts the number of characters in the pro
    6·1 answer
  • 3.
    5·1 answer
  • which of these variable declarations will the variable remain uninitialized unless it is explicitly initialized?1)Declaration of
    5·1 answer
  • In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
    5·1 answer
  • Zahra's softball team needs money for team T-shirts. The coach makes some fundraising suggestions, while team members brainstorm
    5·2 answers
  • Describe the operation of IPv6 Neighbor Discovery. ​
    7·1 answer
  • What is the best description of an unbound control?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!