1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frutty [35]
3 years ago
14

David was editing his audio recording in his audio editing software. He adjusted the vocal track of his audio toward

Computers and Technology
1 answer:
Dmitrij [34]3 years ago
6 0

Answer:

b

Explanation:

balancing the sound

a                h    o

l                 e    u

a                      n

n                      d

c

i

n

g

You might be interested in
Investigators pull out a sniffer to use at the scene of a fire. What is the sniffer designed to do?
Goryan [66]

Answer:

to find key edvadence

Explanation:

they take dogs to smell out key things that could start a fire as in a match kind like other dogs that are assigened tfing drugs and etc heres more infomation i found " Dog Fire Safety In addition to decreasing the risks of your dog actually starting a house fire, employing a few safety tips can greatly increase your canine pal's chance of survival if a fire does occur for any reason." i would put it in your own words just because its wordy .    

3 0
3 years ago
Jeff wants to print quickly so he presses the Ctrl and the P. Jeff used a _____. macro invoice template shortcut
Allushta [10]
He used a keyboard shortcut.
3 0
4 years ago
Chris is responding to a security incident that compromised one of his organization's web servers. He believes that the attacker
Aloiza [94]

The cybersecurity objective that the above attack violate is known as Integrity.

<h3>What is Cybersecurity aims?</h3>

Their objectives is majorly to protect any computers system, networks, and other kinds of software programs from any type of cyber attacks.

Note that The cybersecurity objective that the above attack violate is known as Integrity as they are not the kind of people that keep to their words.

Learn more about cybersecurity from

brainly.com/question/12010892

#SPJ1

3 0
2 years ago
Does white space have visual weight? Yes or No
Shtirlitz [24]

Answer:

no. (more info below)

Explanation:

white space appears to have no visual weight because it's seen as empty. Every body put in the room will appear to be heavier because of the volume surrounding it.

hope this helped!

4 0
4 years ago
Read 2 more answers
Clive wants to print the numbers 1 through 10, so he uses the following code.
snow_tiger [21]

If Clive wants to print the numbers 1 through 10 with the code:

for x in range(10):

    print (x)

He will not get the output he wants because python begins counting at 0, so the numbers 0 through 9 will print.

<h3>Code explanation</h3>

The code is represented in python.

  • We loop through the number in the range 10.
  • Then print the the looped numbers.

Generally, python begins counting from 0. Therefore, the numbers that will be printed are as follows:

  • 0
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

learn more on python here: brainly.com/question/26104476?referrer=searchResults

8 0
3 years ago
Other questions:
  • What is revision
    13·2 answers
  • Which of these computers was marketed as a computer/game machine?
    15·2 answers
  • The ______________________ are incident management personnel that the incident commander or unified command assign to directly s
    10·1 answer
  • Amber wants to give her audience copies of her presentation so they can follow along and take notes. What option should Amber ch
    9·2 answers
  • Write a new version (called map2) of the map function which operates on two lists. Your function should accept three parameters,
    15·1 answer
  • what is required to successfully establish a connection between two routers using chap authentication?
    14·1 answer
  • Help ASAP
    11·2 answers
  • Modify the FitnessTracker class, created in Chapter 4 Programming Exercise 3AB, so that the default constructor calls the three-
    10·1 answer
  • Is designed to access a computer or operating system without the knowledge or permission of the user.
    15·1 answer
  • What should you implement to leverage power, cooling, and networking capabilities independent from other datacenters in a region
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!