1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
3 years ago
6

Match the types of camcorders to their features.

Computers and Technology
1 answer:
Natali5045456 [20]3 years ago
7 0
Mini dv records hd footage
DVD has a built in hard drive
HDD transfers footage using firewire
And combo uses a hdd/ flash drive for recording
You might be interested in
All network operating systems today use the ____ protocol suite for internet communication.
Firdavs [7]
TCP/IP protocols........
4 0
3 years ago
Hi there. I need to know that if I take computer fundamentals, will that class teach anything about graphic design or digital de
Vedmedyk [2.9K]
Hi there!

I have taken a computer fundamentals class before and they did skim over the topic, but they did not go into depth on it at all. If you really want to learn about that stuff I suggest you find a course that is specifically on that topic or something that is closer related then a general <span>computer fundamentals course.

-Your friend in tech,
</span>ASIAX <span>  </span><span>Frequent Answerer</span>
8 0
3 years ago
A user purchased a new smart home device with embedded software and connected the device to a home network. The user then regist
Rzqust [24]

Answer:

C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm account password by clicking on a link in the e-mail and entering password on the resulting page.

Explanation:

Phishing attack is a cyber atttack in which user is sent an email which he thinks is useful. When the user open the email and does as instructed in the email his account gets locked. His personal information is haccked and then rannsom is demanded to release that information. The hacckers usually steal credit card information and bank details of the user which are misused.

7 0
3 years ago
ASAP PLEASE
notka56 [123]
1st blank:task
2nd blank:transparency
6 0
3 years ago
Read 2 more answers
Given the following data definition
Mashcka [7]

Answer:

Array + 36.

Explanation:

The array contains the address of the first element or the starting address.So to find the address of an element we to add the size*position to the starting address of the array.Which is stored in the variable or word in this case.

There are 9 elements in the array and the size of integer is 4 bytes.So to access the last element we have to write

array + 4*9

array+36

4 0
3 years ago
Other questions:
  • Need help with this C++ question
    5·1 answer
  • Are video games considered information technology
    9·2 answers
  • For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (circle one)
    10·1 answer
  • All resources are limited. Which of the following is NOT a resource?
    11·1 answer
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • Give two reasons you should be aware of your computer's system components and their characteristics.
    10·1 answer
  • Ict quiz I attached a picture
    11·2 answers
  • Given three packets of size 2,500 Bytes (caution this is Bytes not bits) each are ready inside computer 1 to be transmitted onto
    14·1 answer
  • 1. If we want define style for an unique element, then which css selector will
    14·1 answer
  • What is one way object-oriented programming differs from procedural programming?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!