1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
14

(Editing)

Computers and Technology
1 answer:
Semmy [17]3 years ago
3 0

Answer:

Cut means to another shot. Or cutting off part of a shot. Trim means to shorten the shot (and there are trim tools.)

Trimming usually refers to taking off either part of the beginning or end of a video clip. Sometimes this is referred to as trimming the top or tail (beginning or end)

Explanation:

~Hope this helps

You might be interested in
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
In what country did true printing first take place?
kow [346]
Germany. Johannes Guten in Mainz, Germany
7 0
3 years ago
Read 2 more answers
Plz I need the answer ASAP. I’ll mark brainliest
Elena L [17]

Answer:

A string containing all lowercase letters and numerals and ending with a- Or D

4 0
3 years ago
Fill in the blanks:(a)Every Java program must have at least one ______________.(b)The Java program is executed from _________ me
ivann1987 [24]

Answer:

A two

B system unit

C Computer

Game

4 0
4 years ago
A computer science student often uses public forum sites like CodeGuru, DreamInCode and StackOverflow in order to help with lear
il63 [147K]

Answer:

C

Explanation:

You can automatically cross out A, as they do not hinder communication. B can be crossed out as well, since kids should use these websites for help. Using the websites can be beneficial and give a learning edge. D is kind of correct, but isn't the best answer.

C is the answer because the websites are public data. People get on the website for help with certain concepts, and helps identify problems to their solution. <em>(Public data found on these forums provides widespread access to identified problems and their solutions. )</em>

4 0
3 years ago
Other questions:
  • What type of devices are the keyboard and the mouse?
    5·2 answers
  • _____ is the standard that enables wireless devices to access web-based information and services. world wide web tcp/ip ethernet
    5·1 answer
  • How can the output of a command be redirected to a file instead of being displayed on the computer's screen?
    9·1 answer
  • Find all three-digit numbers with non-zero first digit that are equal to the sum of the cubes of their digits.
    8·1 answer
  • In the MARS Marketing Management Simulation, the results of your marketing mix decisions:
    9·1 answer
  • Steven, Marcos, and Juan are having a free-throw shooting contest. Each boy
    9·1 answer
  • Write a program that computes the minimum, maximum, average and standard deviation of the population over time for a borough (en
    6·1 answer
  • The U.S. military was instrumental in the rise of the simulation training industry.
    11·1 answer
  • We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that th
    14·1 answer
  • If you are going to develop a special computer, what would it be and explain it's purpose.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!