1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
2 years ago
12

Moving images of real event​

Computers and Technology
2 answers:
baherus [9]2 years ago
8 0

Answer:

What

Explanation:

BaLLatris [955]2 years ago
5 0

Answer:

A film, also called a movie, motion picture or moving picture, is a work of visual art used to simulate experiences that communicate ideas, stories, perceptions, feelings, beauty, or atmosphere through the use of moving images.

Explanation:

<h2>An image which has, or is created to give the impression of, movement; (in 20th century) specifically = "moving picture"; (also, especially with the) the art form or industry of cinema, television, and video. <u>or gif</u> </h2>

You might be interested in
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
True [87]

According to security evaluation, <u>Penetration testing</u> is a level beyond vulnerability testing, a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

Penetration testing is often considered or described as ethical hacking. It involves the process of securing a firm or organization's cyber defenses.

The process of penetration testing or security testing includes assessing for exploitable vulnerabilities in networks, web apps, and user security.

Hence, in this case, it is concluded that the correct answer is <u>Penetration testing.</u>

Learn more about <u>penetration testing</u> here: brainly.com/question/13137421

6 0
3 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
In Python, which comparison operator means "less than or equal to"?
Komok [63]

Answer:

<=

Explanation:

Pretty much the same as in maths

3 0
3 years ago
Read 2 more answers
If a device does not require a driver, it is _____.
xxTIMURxx [149]

Answer:

(B) plug and play

Explanation:

If a device does not require a driver, it is <u>plug and play</u>. Plug and Play (PnP) is a combination of hardware and software support that enables a computer system to recognize and adapt to hardware configuration changes with little or no intervention by a user, including the loading of appropriate drivers.

7 0
3 years ago
A new user needs access to their files in iCloud without relying on the operating system (OS). How would the user access the App
m_a_m_a [10]

Answer:

Log in to iCloud.com on a browser

Explanation:

On your browser which should be a supported browser, you should log in to iCloud.com since iCloud is not supported on mac OS X earlier than mac OS X Lion 10.7.5

7 0
3 years ago
Other questions:
  • When did the silver market drop sharply, hurting Bolivia's income?
    7·2 answers
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • All queries have an explicit location. true of false
    13·2 answers
  • A collection of information stored in an electronic format that can be searched by a computer.
    14·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • You are given an integer N, followed by N lines of input (1 &lt;= N &lt;= 100). Each line of input contains one or several words
    8·1 answer
  • Write a java program to find the perimeter of a triangle with sides measuring 10cm, 14cm and 15 cm.
    8·1 answer
  • Xavier buys a new laptop for $540. He makes a down payment $75 and pays the rest in 6 equal monthly payments, p. What equation r
    7·1 answer
  • How can we style the images and layouts of our pages?
    8·1 answer
  • ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!