what is the software component of multimedia

Answers

Answer 1
The various components of multimedia are Text, Audio, Graphics, Video and Animation. All these components work together to represent information in an effective and easy manner.

Related Questions

Which of the following statements is true about scalability? Choose 3 options.

Horizontal scaling has fewer limits than vertical scaling.

Scalability refers to the ability of hardware components to increase their capacity.

Scalability should be considered very early in the project.

The cloud offers services to automatically scale your system and balance the workload between components.

An example of vertical scaling is adding a new server to the network.

Answers

Answer:

Horizontal scaling has fewer limits than vertical scaling.

The cloud offers services to automatically scale your system and balance the workload between components.

Scalability should be considered very early in the project.

Explanation:

Hope this helps :) If not, please let me know what answers are wrong

The statements that is true about scalability are:

The clouds provide resources to scale the system and balance the workload between components

Scalability should be considered at the beginning of the project.

Horizontal scaling has fewer limits than vertical scaling.

Horizontal scaling is a type of scaling by adding more machines to your po of resources.

It is also called adding more power.

The difference between scaling up and scaling out is that horizontal scaling simply adds more machine resources to your existing machine infrastructure.

Vertical scaling is simply known to adds power to your existing machine infrastructure by increasing power from CPU or RAM to existing machines.

Conclusively, Scalability part of a system that handle a growing amount of work by adding resources to the system.

Learn more from

https://brainly.com/question/17661222

How to principal payment calculation in EMI? Give me example.​

Answers

Answer:

o calculate EMI

The mathematical formula to calculate EMI is: EMI = P × r × (1 + r)n/((1 + r)n - 1) where P= Loan amount, r= interest rate, n=tenure in number of months.

Answer:

yea

Explanation:

can you open a privacy password​

Answers

yes you can, you just need the password to change it to an open password.

which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) shortest job scheduling , (c) priority scheduling , (d) round robin scheduling​

Answers

Answer:

is correct answer

(a)first come first serve

Explanation:

You manage several Windows systems. Desktop users access an in-house application that is hosted on your intranet web server. When a user clicks a specific option in the application, they receive an error message that the pop-up was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do

Answers

Answer:

Add the URL of the web site to the local intranet zone.

Explanation:

An intranet can be defined as a private computer network established within an organization and is typically used for securely sharing organizational informations, computing resources, operational system, and collaboration tools between employees through an internet protocol (IP). Thus, it's mainly a private network that is only accessible to authorized users or employees within an organization.

An intranet web server is a type of server that manages the request for files that are stored on it and are generally not exposed to the general public.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address. Also, the uniform resource locator (URL) is converted to an internet protocol (IP) address, which then points it to a web server.

In this scenario, when a desktop user clicks a specific option in the in-house application that is hosted on an intranet web server, they receive an error message that the pop-up was blocked.

Hence, it's necessary that the security settings of the web server is configured so that users are able to see the popup without compromising overall security. Thus, you should manually add the uniform resource locator (URL) of that particular website to the local intranet zone.

The local intranet zone is a security feature that is typically used for setting web content permissions on a local area network (LAN). Thus, this policy setting or security feature is used for adding websites that aren't residing on a computer or an intranet web server.

If anyone knows how to use Access, how would I create a table like this one? (Add the fields in Table 2-29 Into the table and set field properties.)

Answers

Answer:

Explanation:

To create tables in Access using “Design View,” click the “Create” tab in the Ribbon. Then click the “Table Design” button in the “Tables” group. A new table then appears in the tabbed documents area. Type the name of a field into the “Field Name” column.

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

write a program in python to add two matrices...... ​

Answers

Answer:

# Program to add two matrices using nested loop

X = [[12,7,3],

   [4 ,5,6],

   [7 ,8,9]]

Y = [[5,8,1],

   [6,7,3],

   [4,5,9]]

result = [[0,0,0],

        [0,0,0],

        [0,0,0]]

# iterate through rows

for i in range(len(X)):

  # iterate through columns

  for j in range(len(X[0])):

      result[i][j] = X[i][j] + Y[i][j]

for r in result:

  print(r)

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

pasar el número 12875 del sistema decimal al sistema octal.

Answers

Answer:

Va Bene

Explanation:

Insiama ma parla da auditore

What is the difference between Packaged and tailored soft ware?​

Answers

Answer:

Package software is developed by computer technicians. modified or changed if there is need because these software are custom-built. Tailored Software- Tailored software is the software that is developed as per the specifications and requirements of the users.

Explanation:

hpithlps.

please help me to solve this Question ​

Answers

Answer:

SHOPKEEPER$ = "Chocolate"

Explanation:

which country has the most common features of analogue and digital computer​

Answers

Explanation:

i don't think rhis question could be..

what are the features of dot net ???​

Answers

Answer:

1) interperability

2) portability

3) security

4) simplified deployment

5) base class library

6) language indepence

Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.

Answers

Edward Snowden is a retired CIA employee, and an NSA contractor is regarded by many as a whistle-blowing hero or a treasonous villain. This individual obtained sensitive digital data from the U.S., British, and Australian agencies and leaked them to the press, exposing the breadth of government surveillance efforts.He is a former computer intelligence consultant who released a highly classified central intelligence agency (NSA) in 2013 while serving as a contract for the Central Intelligence Agency.That's why the answer is "Edward Snowden".

Learn more:

Edward Snowden: brainly.com/question/3426041

The CPU is responsible for?

Answers

The CPU (Central Processing Unit) is the part of a computer system that is commonly referred to as the "brains" of a computer. The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program .

Which of the following statements about software licensing are true? Select 3 options.

A. Both proprietary and open-source software can be modified and redistributed.

B.Free software does not come with a license.

C.Open-source software allows developers to create new software more quickly and inexpensively.

D. Proprietary software licenses are more restrictive than open-source software licenses.

E. An end-user license agreement protects both the owner of the software and the purchaser.

Answers

Using software licensing concepts, it is found that the correct options are given by:

A. Both proprietary and open-source software can be modified and redistributed.

C.Open-source software allows developers to create new software more quickly and inexpensively.

D. Proprietary software licenses are more restrictive than open-source software licenses.

------------------------

A proprietary software is owned by an enterprise(can be both an individual and company) that produced it, while a free software means that anyone can make changes in it.Changes can also be made in a proprietary software, just an authorization from it's owner is needed, and thus, option A is correct.Both types have licenses, and thus, option B is incorrect.Since anyone can change it, in an open-source software the developers can create new software quickly, while proprietary licenses are more restrictive, thus, options C and D are correct.An end-user license agreement protects the owner of the software from it being changed without permission, that is, just the owner, thus option E is incorrect.

A similar problem is given at https://brainly.com/question/14721871

Answer: these are the correct answers

Explanation:

You are the IT Administrator for the CorpNet.local domain. You are in the process of implementing a group strategy for your network. You have decided to create global groups as shadow groups for specific departments in your organization. Each global group will contain all users in the corresponding department. In this lab, your task is to: Create the following global security groups on the CorpDC server in their corresponding OUs: OU Creation Location New Group Name Accounting Accounting Research-Dev Research-Dev Sales Sales

Answers

Answer:

1. Select Tools then Active Directory Users from the Server Manager

2. Navigate to the relevant Organizational Unit, OU, in the Active Directory

3. Select New then Group in the OU in which a global securities group is to be created

4. The group name (Accounting, Research-Dev, or Sales) is entered into the Group name field

5. Select the scope of the group

6. The group type is then selected (Domain Local, Global, or Universal)

7. The user accounts are then added to the group as follows;

i) Selecting the Add to a group option after right clicking a user account

ii) Enter the name of the appropriate group in the field to Enter the object names to select

iii) A group scope and group type is then selected

iv) Click on Check names

v) Other users can be added to the group by repeating steps i), ii), iii), and iv)

8) To add additional users to the group, the step 6, 7, and 8 is to be repeated

Explanation:

You are the Administrator for a large company that has offices around the world. Each office has employees in the Sales department and each location has created their own Sales folder for storing important Sales related files. You would like to implement a Window Role to minimize the duplication of files within the Sales department. Which File System can you install as a Windows Role to help you accomplish this goal?

Answers

Answer:

Transactional File System

Explanation:

To minimize the duplication of files within the Sales department. Transactional File System can make multiple file system changing, and if there is an error on one of the files then there will be no change.

ways you will use to reach all pupils who are living at a

disadvantaged area

Answers

Answer:

?

im confused

Explanation:

Which of these functions may be used with positional arguments? Select four options.

AVERAGE
COUNTIF
COUNT
SUM
MAX

Answers

Answer:

AVERAGE

COUNT

SUM

MAX

Explanation:

The functions that may be used with positional arguments include:

AVERAGE

COUNT

SUM

MAX

The basic functions formulae include SUM, AVERAGE, COUNT, MAX and MIN.

SUM: This is the sum total of all the numbers in the rows.

COUNT: This is the used to count the range of cells that contains numbers.

AVERAGE: This is the average of all the numbers in the rows.

MIN: This is the lowest number in the rows.

MAX: This will return the highest number that is found in the set of values.

It should be noted that the COUNTIF is not used with positional arguments.

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

a. Fill in the blanks with suitable words: A software that controls and manages all the activities of the computer ... b. A software that converts the program written in any programming language into machine language.. A software that is designed to perform specific tasks for the user c. d. A software package used for creating text document e. A software package used for editing images​

Answers

Explanation:

i don't know

1. .……............. can be considered as raw data.

(a) Sithum’s G.C.E. (O/L) examination results

(b) Z-Score of G.C.E. (O/L) examination results

(c) The average marks of students of G.C.E. (O/L) examination

(d) The top ten total marks of students of G.C.E. (O/L) examination

Answers

Answer:

(a) Sithum's G.C.E. (O/L) examination results

Explanation:

Raw data which is also known as primary data, are the data collected when performing a research, investigation or study, which are obtained through a survey, experiment, or observation and from which correlations and distributions can be calculated, only when the data is complete

Therefore, raw data is unprocessed data, and the option which can be considered as raw data is the option which is not processed, which is Sithum's G.C.E. (O/L) examination results.

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

please hurry i need urgent

Answers

Answer:

Algorithm

1. Begin

2. num_bottles = 0

3. While num_bottles != 500

   3.1 Create bottle

   3.2 num_bottles = num_bottles + 1

4. Switch off machine

5. End

The flowchart has been added as an attachment

Explanation:

Begin algorithm

1. Begin

Initialize bottles to 0

2. num_bottles = 0

Repeat loop until 500 bottles is created

3. While num_bottles != 500

Create a new bottle

  3.1 Create bottle

Increment the number of bottles by 1

  3.2 num_bottles = num_bottles + 1

End Loop

Switch off the machine after loop ends

4. Switch off machine

End algorithm

5. End

tres areas donde se aplica la ciencia y tecnologia

Answers

Possible Answers:

- Medicemanto - Medicine, especially applied.

- Ingeniería - Engineering. Modern scientific engineering is making use of technology to help solve problems and understand cause and effects.

- Comunicación - Communication. Public broadcasting to raise awareness of environmental or other scientific concerns.

list any six area where computer used

Answers

Answer:

I. Banking and finance.

II. Hospitals.

III. Schools.

IV. Defense and military.

V. Office.

VI. e-commerce.

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

The central processing unit (CPU) is typically considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

Additionally, the component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit on how to respond to informations sent to the processor.

The six (6) areas in which a computer can be used are;

I. Banking and finance.

II. Hospitals.

III. Schools.

IV. Defense and military.

V. Office.

VI. e-commerce.

Why are digital computer known as general purpose computer

Answers

More intelligent and better than others

Which of the following are true statements about the Java wrapper classes (Select all that apply.): Select one or more: a. Objects of these type are immutable b. Objects of these types are mutable c. The wrapper classes do not have no-arg constructors d. The wrapper classes do have no-arg constructors

Answers

Answer:

a. Objects of these type are immutable.

Explanation:

Java wrapper classes are used to convert data into objects. The primitive data is not object and it does not belong to any class. Therefore Java wrapper classes help the user to convert primitive data into object. These objects are immutable and they have no arg constructor.

A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:

Answers

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

Other Questions
If a life insurance policy is purchased by someone who has noinsurable interest in the insured, it is considered An AM radio transmitter broadcasts 50.0 kW of power uniformly in all directions. I live 10 km from this station. What is the maximum strength of Electric Field in my house What does the conjugation of a word in a dictionary entry tell you about the word? what the various word endings are how it can be divided it into syllables how to pronounce the word the different synonyms of the word Which shows the correct substitution of the values a, b, and c from the equation -2 = -x + x2 4 into the quadraticformula?Quadratic formula: x =-bb2-4ac2 aOx=-(-1){V - 1)2 - 4(1)(-4)2(1)O x=-11/12-46- 1)( - 4)2(-1)O x= -13V (1)? - 4( - 1)(-2)2(-1)O x=-(-1)+7(-1)2 - 4(1)(-2)2(1) Prepare a profile of Sachin Ramesh Tendulkar Date of Birth : 24th April 1974 Place of Birth : Mumbai, Maharashtra Career : Cricketer, Captain of Indian Cricket Team. Famous as : One of the greatest cricketers of all times. Uniqueness : Only player to have scored a double century in a one day International, only player to complete more than 30,000 runs in International Cricket: How does cancer harm the body? What changes in cells allow cancer to develop? Height is 2ft. More than its width. If the total area is 99ft squared , determine the dimensions of the painting. 10. A recipe for punch calls for 2 cups of fruit concentrateand 6 cups of water.How many cups of punch will the recipe make? Please I need help please!!!!I need the answer ASAP!!!!!!If you know the answer please tell me The teacher was unaware of the difference between suspension feeding and predation. The teacher thought that providing live copepods (2 mm long) and feeder fish (2 cm long) would satisfy the dietary needs of all of the organisms. Consequently, which two organisms would have been among the first to starve to death (assuming they lack photosynthetic endosymbionts) given the functions w(x) =2x+1 and vw(x) =4x+4x-5,find w(x) answer meeeee You classified organisms based on anatomical structure and development. Scientists also use DNA to classify organisms. Considering the basic process of evolution, why do you think its important to also consider DNA and gene patterns during the classification of organisms? C2H5MgBr + PCl3 ra cht g Please help explanation if possible A consumer advocate agency is concerned about reported failures of two brands of MP3 players, which we will label Brand A and Brand B. In a random sample of 197 Brand A players, 33 units failed within 1 year of purchase. Of the 290 Brand B players, 25 units were reported to have failed within the first year following purchase. The agency is interested in the difference between the population proportions, , for the two brands. Using the data from the two brands, what would be the standard error of the estimated difference, Dp = A B, if it were believed that the two population proportions were, in fact, equal (i.e., )? Show why (237)^4 = 2^4 3^4 7^4 show work State newton's universal law of gravitation Answer quick plsssssssssss Nights and DragonsFrom the memoir of author Abigail Prynne1I sit at my desk listening to thunder growl outside my window. Flashes of light burst through the darkness, and wind races past my window. The thrilling combination of sight and sound conjures up visions of dragons roaring proudly, breathing fire, and soaring across the midnight sky. Dragons first fascinated me when I was a little girl. They have followed me ever since. The magnificent creatures appeared in storybooks I read in the library, paintings I saw in museums, movies I watched in the theater, and the dreams I had in my sleep. By the time I was thirteen, one question consumed me. I wanted to know if dragons ever existed, so I set out on a quest for facts.2As I started my research, I discovered many skeptics. Scientists presented evidence to show why dragons could notand did notexist. They explained that it would be impossible for dragons to fly because they would be too big. They laughed at the idea of dragons breathing fire. They pointed out that no other animal has ever done this. They said that if dragons had lived, someone would have found remains somewhere in the world. No bones about it, there were plenty of logical explanations. It would have been easy for me to accept that the only place dragons ever existed was in the imaginations of those who believed.3I could have given up, but I thought about my grandmother. She always told me that "people who believe that science is the answer to everything are missing out on everything else." With her words in mind, I searched some more. There were many facts that hinted that dragons may not be fictional. I noticed that cultures across the world all described dragons in similar ways. This was odd because they had no way to communicate with each other. I found dragons mentioned in more than just stories. They appeared in old legal papers, in the travel logs of Marco Polo, and in the Bible. I saw that the Chinese calendar uses a different animal each year. Dragons are included along with eleven real animals. I began to believe it was a real possibility that all of these people were talking about a creature that actually existed.4With renewed hope that there was some truth to the legends, I looked for new research. I found that some experts disagreed with popular arguments against dragons. They suggested that a dragon could have four stomachs like a cow. If it created stomach gases like birds, it might create enough to lift itself off the ground. This would give it the ability to fly. If it forced out air when diving toward the earth, it might release gases which could ignite into flame. When the animal died, the stomachs would release strong acids that would dissolve its dead body over time. Biologists backed up these ideas with sketches and models based on known animals. Not everyone agreed with these ideas, but many of the things we accept about dinosaurs and other extinct species started the same way.5I doubt we will ever truly know whether dragons existed. There may always be two sides to the fiery debate. Some will say the stories come from active imaginations. Some will believe with all their hearts that the legendary creatures roamed our ancient world. I don't know for certain which side to believe, but the sound and fury of a night like this makes me smile. It rekindles my childhood dreams and keeps the exciting possibility alive.In paragraph 5, the author discusses two sides to the dragon debate. Which statement best summarizes the ideas in the paragraph? The author implicitly states that she believes that dragons once existed. The author explicitly states that she believes that dragons once existed. The author implicitly states that she believes that dragons did not exist. The author explicitly states that she believes that dragons did not exist. Cc yu t no cn c so snh khi tin hnh nh gi cng vic