1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tamaranim1 [39]
3 years ago
10

HELP ASAP Encoding a video format and then decoding it during playback is one of the functions of MPEG-4 and H.264 file players.

MPEG-4 and H.264 are known as. (A) video editors. (B) video codecs. (C) video streamers. (D) video monitors. GIVING 7 or 14 points for brainliest
Computers and Technology
2 answers:
Mademuasel [1]3 years ago
5 0

Answer: video codects

Explanation:

Nataly_w [17]3 years ago
5 0

Answer:

B

Explanation:

edg21

You might be interested in
Ian is working as a sales manager. He has to generate sales reports using mathematical data that his team has collected. Which c
lakkis [162]

Answer:

Application is Excel

Soft Skill is Problem Solving and Critical Thinking

Explanation:

Excel is used to collect and daily data of sales, and problem solving and critical thinking are the soft skill that a sales manger should have to analyze the data.

8 0
3 years ago
Explain why professional software that is developed for a customer is not simply the programs that have been developed and deliv
denpristay [2]

Answer:

1. Professional Software is not just the program developed for a customer

2. The software is meant for a specific purpose

Explanation:

Professional software is not just the program developed for a customer. Infact professional software along with executable code will also contain documentation, configuration of data - all that is required to make the operation of programs correct and accurate. Generally such a software do contain separate files for program and configuration purposes. Documentation of the professional software consists of several topics such as structure of the system, user documentation with all the information required for user to work on that. Hence professional software is not just a set of programs developed for customer - but it is a comprehensive information collection and set up tool set designed for the usage of a customer as well.

2. Custom software development are commisssioned by a specific customer for his specific requirements. Whereas Generic software products are general software applicable for diverse customers for their requirements and hence can be sold in open market for any customer. And hence the aplication development of both the software products mentioned above also do vary, in the first case specifications will be completely provided by the customer and will be controlled as well by the cusotmer

8 0
3 years ago
What is the first step in the exchange between a web browser and a database?
bezimeni [28]
<span>The client browser requests a page from a Web server.</span>
3 0
3 years ago
Traceability of requirements is helpful in the followingexcept
larisa86 [58]

Answer: D)  Identifying GUI's for a particular requirement

Explanation:

 Traceability of requirements is helpful except identifying GUI's for a particular requirements as, traceability in project management describe the relationships between two or more element throughout in the development process and outline the relationship between the customer requirement by traceability matrix. And the requirement of traceability is so important because it creating a downstream flow of software and test cases in software requirement but not helpful in GUI identification.

6 0
3 years ago
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Discus the pros and cons of Internal cloud service and External cloud service for both Infrastructure as a service and Applicati
    11·1 answer
  • Which of the following is software? : Monitor Mouse Windows Keyboard Printer
    13·1 answer
  • Software referd to the physical parts of the computer True or False
    9·2 answers
  • How long does it take to be placed in a class on flvs?
    14·1 answer
  • What do you need for digital photography? 1. 2. 3.
    13·1 answer
  • Peripeteia is also referred to as __________.
    5·2 answers
  • The base 10 number 18 is equal to which base 16 number?<br><br> 10<br><br> 12<br><br> 14<br><br> 16
    11·1 answer
  • Ayuda pliz es para ya!!!!!<br> nesesito un codigo html que me muestre este texto
    8·1 answer
  • The disk you inserted was not readable by this computer
    11·1 answer
  • Given an array of integers a, your task is to calculate the digits that occur the most number of times in the array. Return the
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!