1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
8

Discuss how the use of digital formats for audio-visual recording and editing has

Computers and Technology
1 answer:
Zolol [24]3 years ago
4 0

Answer:

Digital formats allow for lossless data storage, fast editing (without the loss of original source material, ie having to manually clip pieces of film), and made collaboration easier.

You might be interested in
what are the three parts to physical security standards for various types of army equipment and the risk level
zzz [600]

The three parts to physical security standards for various types of army equipment and the risk level is access control, surveillance, and security testing.

<h3>Further explanation</h3>

Physical security is the part of security concerned with physical measures designed to protect the assets and facilities of the organization.  

The three parts to physical security standards for various types of army equipment and the risk level is access control, surveillance, and security testing.

Access control is a security technique in which regulates who/what can view/use resources in a computing environment. The example of physical access control is the locks, badge system, and security guard.

Surveillance is the condition in which the architects seek to build spaces that are more open to security personnel and authorized users. It is also the continuous monitoring of, for example, the disease occurrence. The example of surveillance is Closed-circuit television cameras (CCTV) placed in the streets.

Security testing is the evaluation and testing the information security of hardware, software, networks, and IT environment. Error handling and specific risky functionalities are examples of security testing

<h3>Learn more</h3>

1. Learn more about the security practice in electronic banking brainly.com/question/7668763

 

<h3>Answer details</h3>

Grade:  9

Subject: Computers and Technology

Chapter:  Physical security standards

Keywords:  physical security, access control, surveillance, security testing

3 0
3 years ago
To build a framework for security policies and controls, one can use the following approach: 1) document the concepts and princi
serious [3.7K]

Answer:

n/a

Explanation:

4 0
3 years ago
What is an example of using the Internet of Things (IoT) to deliver innovative Cloud based solutions to customers?
VladimirAG [237]

An example of using the Internet of Things (IoT) to deliver innovative Cloud-based solutions to customers is: A. wearable technology that provides customers with on-the-spot personalized experiences.

<h3>What is cloud computing?</h3>

Cloud computing can be defined as a Cloud-based solutions that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives to provide various services to customers.

In Computer technology, a good example of an application of the Internet of Things (IoT) to deliver innovative Cloud-based solutions to end users is wearable technology that is designed and developed to provide users with on-the-spot personalized experiences.

Read more on cloud computing here: brainly.com/question/19057393

#SPJ1

<u>Complete Question:</u>

What is an example of using the Internet of Things (IoT) to deliver innovative Cloud-based solutions to customers?

A. wearable technology that provides customers with on-the-spot personalized experiences

B. scheduled conferences with brand ambassadors to pitch customers on new offers

C. customers using a PC connected to a local network to search for recommendations

D. online surveys that gather customer input to improve services in the future

E. I don't know this yet.

8 0
2 years ago
Windows explorer has a pane located on the left side which can display the directory structure of one or more drives. what is th
Triss [41]
It is called the Navigation Pane
4 0
4 years ago
A computer with a domain name is called a what
Irina18 [472]
A domain refers to a group of computers that are part of a network and share network resources, like your home<span> computers all linked together sharing a printer. The user logs in to the domain and gains access to the resources. Several systems may be involved. The computer itself is referred to as a server.</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Can the redirection shell metacharacter be used to redirect between a command and another command?
    8·1 answer
  • Including quotes in your paper can bring additional meaning to the content True are false
    11·2 answers
  • ____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it
    8·1 answer
  • WILL UPVOTE ALL plz
    11·1 answer
  • Consider the following high-level recursive procedure: long long int flong long int n, long long int k long long int b b k+2; if
    9·1 answer
  • Why are renewable natural resources important? A.fossil fuels can be replaced quickly.
    10·1 answer
  • In recent years, the amount of time people spend using electronic devices has sharply increased. What are the benefits and downs
    7·1 answer
  • Provide three examples of software projects that would be amenable to the waterfall model. Be specific.
    11·1 answer
  • PLZ ANSWER THESE QUESTIONS FOR 30 POINTS AND BRAINLIEST!
    9·1 answer
  • What is an overview of your opinion of Digital Etiquette? Do not look it up bc I will know!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!