Which file type is typically used for videos? GIF MPEG MP3 PDF

Answers

Answer 1

Answer:

MPEG

Explanation:

A GIF is a short repeating low-quality video clip

A MP3 file is an audio file

A PDF file is a text document

MPEG is the international standard for encoding and compressing video images

Hope this helps!

(Please mark Brainliest!)

Answer 2

Answer:

MPEG

Explanation:

took the test


Related Questions

what is the meaning of website cookies? brief explanation ​

Answers

Answer: Cookies are messages that web servers pass to your web browser when you visit Internet sites

What is the difference between being an affiliate and an independent station ?what are the benefits to being an affiliate

Answers

Answer:

So the difference is one does its own thing the other is someone who is working with another.The benifits are that if it is something good done you both get the reward the bad part is that if its bad then you both get in trouble for it.

Explanation:I hope this helps

Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFile = open("games.txt", "w") You write two lines to the file in the program. How many lines are in the file when you close your file?
A. 2
B. 82
C. 80
D. 0

Answers

Answer:

2

Explanation:

Edge 2021

The number of  lines are in the file when you close your file is 82 lines. Hence option B is correct.

What is program?

Program is defined as a series of instructions written in a programming language that a computer may follow. Software, which also contains documentation and other intangible components, comprises computer programs as one of its components.  Programs are collections of instructions that a computer follows.

The line, character, word, and byte counts of a file can be discovered with the wc program. To count the number of lines, we add the -l option to wc. This will provide the file's name and the total amount of lines.

Thus, the number of  lines are in the file when you close your file is 82 lines. Hence option B is correct.

To learn more about program, refer to the link below:

https://brainly.com/question/3224396

#SPJ2

How might an inventory of activities be different from an inventory of objects? *(I don’t understand this question. )*

Answers

I inferred you are referring to a business case, not computer and technology.

Explanation:

Put simply, an inventory of activities involves a record of the business routine activites such as last maintainance, last purchase of supplies etc.

However, the inventory of objects is diffrent as it records specifically how much inventory (objects; goods) a business have on hand.

Sarah Jones is a coder who is working with a team to create a new mobile operating system. At their last meeting, the team discussed whether to make the code open source or closed source. What are benefits to each for the developer and for the user? What responsibility does the developer have to ensure the quality of an open source program?

Answers

Explanation:

Open-source software in simple terms refers to software whose source code can be changed by another developer other than the original developer (the original creator).

Benefits:

it allows improvementsit is easy to get tutorials about the software from several developers.fewer usage restrictions

A Closed-source software does not allow modification, in other words, it means programmers cannot improve the program expect if given permission by the creators.

To ensure the quality of the program the developer needs to perform periodic internal testing.

The benefits to each for the developer and for the user are:

It allows for modifications.It is easy to learnThere are few restrictions.

What is an Open Source Software?

This refers to the type of software in which the source code can be modified by another developer.

With this in mind, we can see that a closed source software is rigid and does not allow modifications which leads to the writing of code from scratch.

Read more about open source software here:

https://brainly.com/question/4593389

Pixel Data
Assume your friend just sent you 32 bits of pixel data (just the Os and is for black and white pixels) that were encoded after sampling an image.
Choose the two statements that are true. ⬇️

The 32 bits of pixel data is enough to produce the image using the widget. Nothing else is needed.

The digital image would be an exact copy of the analog image.

The correct width and height must be input into the pixelation widget to produce the image.

The fact that only 32 bits were used to represent the image Indicates relatively large sample squares were used. The digital Image may vary from the analog
image significantly

Answers

Answer:

-The correct width and height must be input into the pixelation widget to produce the image.

- The fact that only 32 bits were used to represent the image indicates relatively large sample squares were used. The digital image may vary from the analog image significantly.

Explanation:

Why would you convert your birth year to binary numbers?

Answers

Answer:

Write out your birthday in the following format: M/DD/YY. For example, if your birthday is on June 11, 2013, it would be written as 6/11/13.

2. Convert the birthday date to binary format. Using our same example from above, 6/11/13 translated into binary code would be: 110/1011/1101.

3. Select one color of bead to represent “0”, a second color to represent “1” and then the third color to represent a space (/) between the numbers.

4. Layout the beads to represent your birthdate in binary code. Don’t forget the third color for the spaces in between the numbers!

5. Once laid out, string all the beads on to the string or pipe cleaner.

6. Tie a knot around the ends and enjoy your one-of-a kind masterpiece as a piece of jewelry or a bag tag….the options are endless!

Marco Suarez is starting a new job in the Sales and Marketing Department of a financial services company. He is part of a team redesigning the company's website and wants to become better acquainted with current website design principles. Search for this year's best website designs and then examine the sample webpages. What are the current trends in website design? What principles should Marco use to suggest changes to his company's website?

Answers

The current trends in website design are the:

The use of Bold and bright Color.The use of saturated colors that makes one's brand stand out.The use of organic shapes and minimalism.What are the  principles to change company's website?

They are:

Make use of bite-size pieces.Make sure to include all styles of learning.Do not make it all about you Give a guided experience.

Therefore, The current trends in website design are the:

The use of Bold and bright Color.The use of saturated colors that makes one's brand stand out.The use of organic shapes and minimalism.

Learn more about website design from

https://brainly.com/question/25941596

#SPJ1

I cant get this for the life of me, I dont understand what im doing wrong, help?
def main():

numGuesses = 0
userGuess = 15
secretNum = 5

name = input("Hello! What is your name?")


userGuess = print ("Guess a number between 1 and 20:")

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

if (userGuess = secretNum):
print9"Congrats! you are correct.")
main()

Answers

Answer:

what problems are you facing with this code?

Answer:

Your print statement has a 9 on it.

When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?

Answers

Here’s the answer
Ur welcome

Yes, utilizing bits to represent the fractions of a number allows us to produce all conceivable fractions.

What is bit that represents fractions of a number?

In the binary coding, a bit is referred to as a single digit. In digital communication and computing, it serves as the fundamental unit of information. It can have a value of 0 or 1. When creating fractions, we can do so by using the initial bits to represent the whole number and the last bits to represent the integers that come before the fraction.

Representing is the act of expressing understanding and expressing ideas via the use of figurative, concrete, abstract, and graphical symbols, words, and circumstances. It is possible to express fractions in a way that is very similar to how the positive factors of twice represented integers use the negative factors of two to sum to virtually fractional numbers.

Thus, Yes, utilizing bits to represent the fractions of a number

For more details about bit that represents fractions of a number, click here:

https://brainly.com/question/17582172

#SPJ6

Your Turn
Complete the statement below, and then click "Submit" to compare
your work with an example,
According to the Employee Manual, e-mail accounts...
Submit
2008 Gol
< PREVIOUS
NEXT >
SAM
Clin

Answers

Explanation:

what grade yoou in

The relational operators have the property of _____; that is, the use of relational algebra operators on existing relations (tables) produces new relations.

Answers

Answer:

Closure

Explanation:

The relational operators have the property of closure ; that is, the use of relational algebra operators on existing relations (tables) produces new relations.

A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of time, 5 minutes on the average, independently of other blocks. The program is completed when all the blocks are compiled. Compute the expected time it takes the program to be compiled.

Answers

Answer:

The answer is "15 minutes".

Explanation:

The time of compilation for one block with all three computers would be denoted by the [tex]Y_1,Y_2 and Y_3[/tex].

Of all them.

[tex]Y_i \sim Exp(\frac{1}{5}) \ for \ j = \ 1,\ 2,\ and\ 3[/tex] and the average:

[tex]=\frac{1}{\lambda } \\ \\=5[/tex]

Let,

[tex]Z=Y_1+Y_2+Y_3, \\\\ then \ Z \sim \ Gamma ( \alpha =3, \ \ \lambda =\frac{1}{5})[/tex]

since independent of the total sum and the gamma distribution of parameters, [tex]\alpha = \ n \ \ and \ \lambda[/tex] are accompanied by exponential variables.  

Now the predicted value of Z can be found.

[tex]\bold{Formula:} \\\\ \to E(Z)=\frac{\alpha}{\lambda }\\\\[/tex]

[tex]=\frac{3}{\frac{1}{5}}\\\\= 3 \times 5\\\\= 15\\[/tex]

Therefore, it takes 15 minutes for the program to be compiled.

Explique como são gravados (escrita) os bits zero ou um no HD.

Answers

Answer:

The following are the description of storing bits into Hard-disk.

Explanation:

As we know computer only know the binary language, that is in the form of zero's and once's "0's and 1's". In the hard drive, it requires a magnetically covered rotating disc, that's  "head" passes over its platter.

It marked 0's and 1's on the platter as tiny electronic areas in the north.Its head goes to the very same location to read its information again, the north and south places pass there and assume from the 0s and 1s which are contained.

Which is one use for a hyperlink? A. to create a heading style B. to animate important text C. to create a link to a website. D. to hyphenate words.

Answers

Answer:

D

Explanation:

Hyperlink in html, cascading style Sheets, javascript etc. Is use to connect one page to another.

Also, it can be used to link one site to another website.

So, according to the question below:

Which is one use for a hyperlink? A. to create a heading style B. to animate important text C. to create a link to a website. D. to hyphenate words

The correct answer is to create a link to a website. Which is D.

A computer application such as Microsoft Access that is used to store data and convert it into information is a ________________________.

Answers

All data is stored in table

Is when a hacker prevents you from accessing your files and asks that you pay money to give you back access. It's NOT guaranteed that you'll have access to your files after payment.

Answers

Answer:

Ransomware

Explanation:

Ransomware is a cyber-computer term that describes a cryptic-associated cyber attack on people's account or personal related information, which prohibits the victim to gain access to those accounts or files such as social media account, and then demand certain sum to be paid before granting access. At the same time, payment doesn't ensure actual access by the victim to such an account.

Hence, in this case, the correct answer is RANSOMWARE

Answer:

b

Explanation:

Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols
group?
O ?
TM
+

Answers

Answer:"TM"

Explanation:

The Software Center is the same for every campus. I will have access to any software that I want Your answer: True or False ​

Answers

Answer:

true

Explanation:

i don't really know

PLEASE HELP ME!!! I NEED THIS ASAP!!!

Your response should be at least one paragraph (5 to 7 sentences).


What are three ways that you can protect and care for your camera? Why is taking care of your camera important?

Answers

Answer:

Bag it if you arent using it for shooting or rehearsal

always use lens cap

clean it

starve it

Why do some people think the global
economy is good for the United States?

Answers

Answer: is a

Explanation:

Tracy always starts facing which direction?


Answers

Answer:

tracy starts facing east

Explanation:

The time Yanni runs to catch Tracy is 20 minutes.

We are given that;

Speed of tracy= 1mile in 10min

Now,

We need to find the distance that Tracy and Yanni have traveled when they meet.

Let x be the time (in minutes) that Yanni runs, then Tracy runs for x + 20 minutes.

Since their speeds are given in miles per minute, we can write the following equations:

Distance traveled by Tracy = 1/10 * (x + 20)

Distance traveled by Yanni = 1/5 * x

They meet when their distances are equal, so we can set the equations equal and solve for x:

1/10 * (x + 20) = 1/5 * x

Multiply both sides by 10 to clear the fractions: x + 20 = 2x

Subtract x from both sides: 20 = x

Therefore, by algebra the answer will be 20 minutes.

More about the Algebra link is given below.

brainly.com/question/953809

#SPJ6

The complete question is;

Tracy is running a trail in Hanna park she can run 1 mile in 10 minutes Yanni is running the same trail as Tracy Johnny can run a mile in five minutes but starts running 20 minutes after Tracy started on the trail if they started the trail from the same point how long will it take Yanni to catch Tracy

A printer would be considered _____. Select 2 options. 1 an input device 2 an output device 3 hardware 4 software 5 storage

Answers

Answer:

an output device and hardware

Explanation:

Hardware is something that can be physicaly touched and an output device is something that gives information out, such as a monitor, speaker, or printer

A printer would be considered an output device and a hardware device.

What is an output device?

Any piece of computer hardware that translates information into a human-perceptible form or, historically, into a physical machine-readable form for use with other non-computerized equipment is referred to as an output device. Text, images, haptic, audio, or video can all be used.

What is a hardware device?

The chassis, central processor unit, random access memory, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard are all examples of computer hardware.

A printer would be considered an output device and a hardware device.

Learn more about Output Device:

https://brainly.com/question/13014449

#SPJ2

Which situations are a good fit for using telehealth? Select 4 options.
A. You need an appointment to get tested for allergies.
B. You doctor sends you an email to remind you about an appointment.
C. You had a car wreck.
D. Your doctor emails you because your heart monitor shows an abnormality.
E. You need a referral to a skin doctor.

Answers

Answer:

A, B, C and E

Here, hope this helps...... ;)

Select the best answer for the following:
Computer can
i. do calculations ii. store data 111. take a decision
a.
iv, all of them​

Answers

iv— it can do all of them

pls help me with this computer question
Is newspaper a simplex, half duplex or full duplex?​

Answers

Answer:

simplex

Explanation:

half duplex allows for comm in both directions, only not at the same time.

which form of communication is extremely private​

Answers

Intrapersonal Communication

What processes are used to convert raw material or scrap to a basic primary shaped and sized product.

Answers

Answer: Primary processes convert raw material or scrap to a basic primary shaped and sized product. Secondary processes further improve the properties, surface quality, dimensional accuracy, tolerance, and other stuff lol

Explanation:

Make the smallest
nonzero number
possible, in binary,
with your
Flipply Do Pro.
What is the decimal
(Base 10) equivalent?

Answers

Answer:

Whole Numbers:

0000 0001 (Binary) --> 1 (Decimal)

Real Numbers:

0000 0001 (Binary) -->  0.00390635 (Decimal)

Explanation:

In general, the smallest nonzero number that can be displayed in binary that is a whole number is 1.  Consider that as you increase by 1 in the binary system starting from 0, you will have the following:

0000 0000 == 0

0000 0001 == 1 (Smallest nonzero)

0000 0010 == 2

0000 0011 == 3

... etc.

Notice the smallest value here is decimal 1.  With this in mind, you will need to "program" you Flippy Do Pro to display this value.  Alternatively, if you consider decimal numbers in binary with the Flippy Do Pro, you can have even smaller nonzero numbers.  Depending on where you decide to place the decimal, you can even have smaller nonzero values.

Let's assume that you say this is a fractional representation of binary on the Flippy Do Pro.  Then, you will say your decimal is infront of the display of the Flippy Do Pro, hence index 9 (which is not displayed).  From here, you will simply say the following:

0000 0000 == 0.0

0000 0001 == 0.00390635 (Smallest nonzero)

0000 0010 == 0.0078125

0000 0100 == 0.015625

... etc.

Note, in binary, as you move the value of 1 to the right of the decimal, you are doing (1 / 2^n), where n is the index value to the right of the decimal.

Hence, depending on if you are to consider just whole numbers or real numbers, the smallest value displayed can be different even though the number being displayed is still 0000 0001.

Cheers.

What is a sign that content is
biased?
A. The author has a lot of experience in the topic
B. The author lists evidence
C. The author makes money in a connected area
D. All of the above

Answers

C. because it’s the only one where they would have a reason to be biased

The sign of having a biased content is that author makes money in a connected area. The correct option is C.

What is biased content?

A biased piece of content expresses an unreasonable preference or dislike based on personal preference: The meeting was reported inaccurately in the newspapers for instance.

Bias occurs when a writer shows favoritism or prejudice toward someone, something, or an idea.

Readers can identify biases by asking themselves a series of questions about a writer's language, facts, and evidence.

A biased estimator differs from the true population value. An unbiased estimator differs from the true population parameter in no way.

The author makes money in a related field, which is a sign of biased content.

Thus, the option C is showing that the content is biased, so it is the correct option as making more money than the limit in that area can indicate the biased behavior.

For more details regarding biased content, visit:

https://brainly.com/question/20900626

#SPJ2

Other Questions
A triangular pyramid is made of 4 equilateral triangles. The sides of the triangles measure 5 m, and the height of each triangle is 4.3m. A rectangular prism has a height of 4.3m and a square base that is 5 m on each side. Susan says that the total surface area of the prism is more than the total surface area of the pyramid. Is she correct. EXPLAIN!! URGENT!!! Imagine that a group of people attack and defeat another group. Then the first group's leader becomes the ruler of the defeated group. This example best illustrates which theory? O evolution theory divine right theory O social contract theory force theory Simplify:(XY3Z4)4A.xy3z16B.xy3z8C.x4y12z16D.x5y7z8 Number 14 help I have to zoom with the answer in five minutes A single card is drawn from a standard 52 card deck.Work out the probability of choosing the "9 ofspades"Give your answer in its simplest form What is the power of 10 when 0.00503 is written in scientific notation could someone please help me What is the missing value A=3 b=5 c=? 5x + 8 verbal expression For each of the following premises, fill out the rest of the argument to make it valid in two different waysmodus ponens and modus tollens.a. If some wars are just, then pacifism is false.b. If God is in his heaven, then all is right with the world.c. If Lino is telling the truth, he will admit to all charges. why does someone's chest hurt? Which firmware security standard can be used to store disk encryption keys?A. SLAB. TPMC. UEFID. USB A waste treatment pond is 50 m long and 25 m wide, and has an average depth of 2 m. The density of the waste is 75.3lbm/ft^3 .Calculate the weight of the pond contents in lbf ,using single dimensional equation for your calculation. Why doyou think that Stockton doesn't tell his reader which door the lover opens? Look at the image above. How did endosymbiosis impact the structural differences between bacteria, animals, plants, and fungi? CLAIM: EVIDENCE: REASONING: charles and ellen, an unmarried couple, run an ice cream store. the business is not incorporated, and they have filed no formation papers with the state. their business is a A sidewalk has a length of 75.00m. How many inches is this? (Hint: you need to use two unit conversion fraction. 1 cm equals about 0.3937 inches) Place thermometers near the edge of the table for easy retrieval.TrueTrueFalse Polygon QQQ is a scaled copy of Polygon PPP using a scale factor of \dfrac1221start fraction, 1, divided by, 2, end fraction. Polygon QQQ's area is what fraction of Polygon PPP's area? Analyze the political cartoon on the effect of coal companies on the environment and explain how it emphasizes the thesis coal companies corrupt.