1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
8

What microphone is this

Computers and Technology
1 answer:
nadezda [96]3 years ago
4 0

Answer:

Thats looks like a Sennheiser Pro Audio Wireless Microphone System, Black (MKE600) .  also known as Sennheiser MKE 600

Where you can get it:

https://www.amazon.com/Sennheiser-MKE600-Camcorder-Shotgun-Microphone/dp/B00B0YPAYQ

Youre welcome. (pls give brainlest thanks)

You might be interested in
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banki
d1i1m1o1n [39]

Answer:

System/Application Domain and LAN-to-WAN Domain.

Explanation:

The Gramm-Leach-Bliley-Act is also referred to as the Financial Services Modernization Act of 1999. It was enacted by the 106th Congress of the United States of America and it requires that financial institutions explain to their customers the information sharing policies and ensure that customer sensitive data (privacy) is safeguarded.

This, under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy.

In this scenario, a given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices.

Hence, online banking servers and their public Internet hosting would fall within the System/Application Domain and LAN-to-WAN Domain.

In an IT infrastructure, there are seven main domains and these are the: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application.

3 0
3 years ago
Which networking model can the network now support that it could not support without the addition of the eighth computer?
ValentinkaMS [17]

I guess the correct answer is cliеnt-sеrvеr mοdеl

Thе cliеnt-sеrvеr mοdеl is a distributеd cοmmunicatiοn framеwοrk οf nеtwοrk prοcеssеs amοng sеrvicе rеquеstοrs, cliеnts and sеrvicе prοvidеrs. Thе cliеnt-sеrvеr cοnnеctiοn is еstablishеd thrοugh a nеtwοrk οr thе Intеrnеt.

Thе cliеnt-sеrvеr mοdеl is a cοrе nеtwοrk cοmputing cοncеpt alsο building functiοnality fοr еmail еxchangе and Wеb/databasе accеss. Wеb tеchnοlοgiеs and prοtοcοls built arοund thе cliеnt-sеrvеr mοdеl arе:

  • Hypеrtеxt Transfеr Prοtοcοl (HTTP)
  • Dοmain Namе Systеm (DNS)
  • Simplе Mail Transfеr Prοtοcοl (SMTP)
  • Tеlnеt

Cliеnts includе Wеb brοwsеrs, chat applicatiοns, and еmail sοftwarе, amοng οthеrs. Sеrvеrs includе Wеb, databasе, applicatiοn, chat and еmail, еtc.

4 0
4 years ago
For this assignment, you will create flowchart using Flowgorithm and Pseudocode for the following program example:
satela [25.4K]

Answer:

The pseudocode is as given below in the explanation while the flow diagram is attached herewith

Explanation:

The pseudocode is as follows

input cust_name, num_texts  

Set Main_bill=5 $;

if the num_texts is less than or equal to 60

Excess_Charge=0;

If the num_texts is greater than 60 and less than or equal to 200

num_text60200 =num_texts-60;

Excess_Charge=0.1*(num_text60200);

else If the num_texts is greater than 60

num_texts200 =num_texts-200;

Excess_Charge=0.25*(num_texts200)+0.1*(200-60);

Display cust_Name

Total_Bill=Main_bill+Excess_Charge;

Total_Bill_after_Tax=Total_Bill*1.12;

6 0
3 years ago
A subclass can directly access____.
Otrada [13]

Answer:

A subclass can directly access public members of a superclass.- first choice

7 0
3 years ago
Other questions:
  • Choose the true statement below. a. The content that displays in the browser is contained in the head section. b. The content th
    13·1 answer
  • A _____ is an audio output device that converts text to speech.
    15·1 answer
  • Which of the following is the process of transferring data in a continuous and even flow, which allows users to access and use a
    12·1 answer
  • Refer to the color wheel to identify the color scheme.
    13·1 answer
  • Write a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The user shoul
    13·1 answer
  • Greg works outside. He is often found cutting grass and making the local park grounds look nice for guests.
    10·1 answer
  • Consider the following code segment.
    11·1 answer
  • Investigar las oportunidades de empleo y el autoempleo dentro del área de la especialidad<br>​
    14·1 answer
  • A brief contains an initial definition statement of the design aim and defines any constraints?
    11·1 answer
  • How does a file reader know where one line starts and another ends?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!