1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inna [77]
3 years ago
10

List out any four hardware and software components required for multimedia​

Computers and Technology
1 answer:
natta225 [31]3 years ago
3 0

Answer:

The list of hardware components required in multimedia are as follows:

  • Microprocessor.
  • High storage hard disk.
  • RAM.
  • High resolution graphics cards.

The list of software components required in multimedia are as follows:

  • Text
  • Audio
  • Graphics
  • Video
You might be interested in
_______ technology is used in many hospitals to verify that the correct medication is being dispensed to the applicable patient.
Zepler [3.9K]
Barcode hospital operating suites, cardiac and intensive care units.
8 0
3 years ago
________ is a remote access client/server protocol that provides authentication and authorization capabilities to users who are
iren [92.7K]

Answer:

Correct answer is (4)

Explanation:

Terminal Access Controller Access Control System

4 0
3 years ago
Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, acc
Mashutka [201]

Answer:

New Technology LAN Manager (NTLM)

Explanation:

Windows New Technology LAN Manager (NTLM) is an outmoded challenge-response authentication protocol from Microsoft. Still in use though succeeded by Kerberos, NTLM is a form of Single Sign-On (SSO) enabling users to authenticate to applications without submitting the underlying password.

NT LAN Manager was the default protocol for Windows until Microsoft deprecated it, citing vulnerabilities related to the password hash’s password equivalency. Passwords stored on the server, or domain controller, are not salted and therefore an adversary with a password hash does not require the underlying password to authenticate. NTLM’s cryptography also predates newer <em>algorithms</em> such as <em>AES or SHA-256</em> and is susceptible to brute force attacks by today’s hardware.

5 0
4 years ago
Read 2 more answers
Which type of operating system is best for a personal computer?
alina1380 [7]
The answer is MS-Windows
3 0
3 years ago
Read 2 more answers
Ethics in Al can contribute toward social progress and boost positive changes in society. Which aspect should be removed to achi
ivolga24 [154]

Answer: Hayaa~!

The answer is: . c. bias

Is known when someone purposefully biased an answer towards what they belive or think, this can be avoided by not asking them about topics that we firmly believe they are biased.

Explanation: I took the test

Hope this Helps

-Aaden<3

3 0
2 years ago
Other questions:
  • Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the netwo
    9·1 answer
  • TRUE OR FALSE!!!!!
    6·2 answers
  • What is the process of copying items from ram to a storage device?
    8·1 answer
  • An ink-jet printer is a type of impact printer. <br> a. True <br> b. False
    8·1 answer
  • In 1913, __________ developed a mass production system for cars that made it possible to produce more cars in a shorter period o
    5·2 answers
  • Write a python function average_sample_median(n,P), that return the average of 1000 samples of size n sampled from the distribut
    10·1 answer
  • Which of the following describes why graphical interfaces quickly became popular after their introduction to the mass market?
    5·1 answer
  • What command can you use if you accidentally delete a sentence in your document?
    13·2 answers
  • $
    15·2 answers
  • "The constructor signature is defined as the constructor __________ followed by the __________. (3 points)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!