Which are characteristics of a video with a higher
bit rate? Choose all that apply.
fewer frames per second
more frames per second
lower quality
higher quality
larger file size
smaller file size

Answers

Answer 1

Answer:

D and E.

Explanation:


Related Questions

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

The CPU is responsible for?

Answers

The CPU (Central Processing Unit) is the part of a computer system that is commonly referred to as the "brains" of a computer. The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program .

Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT

Answers

USB is the answer because that is the adapter to plug it in

Which computer can be used where there is no regular electricity?​

Answers

Answer:

A mechanical computer

Explanation:

Created from gears and levers

20 points!!!!! Plz answer quickly

Answers

Answer:

other words are not clear

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Answers

Answer:

I will choose a option tin best

Answer: Install a WorkGroup to allow each device to control what is shared and with whom.

Explanation:

Helpppppppppppppphuhuh

Answers

Answer:

B

Explanation:

You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.

If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.

PLS HELP ME WITH MY PYTHON HW

Answers

Answer:

name=input('What is your name?')

age=input('What is your age?')

school=input('What is your school?')

print('Hi '+ name +', you are '+ age +', and you go to '+school+'.')

age=int(input('What is your age?'))

if age > 10:

 print('You are a teenager')

for x in range(10):

 print(name)

country='United States or America'

print(country[17:24])

a_list = [0, 2, 4, 8]

maximum = max(a_list)

print(maximum)

minimum = min(a_list)

print(minimum)

numbers = [1, 3, 4, 2]

numbers.sort()  

print(numbers)

You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.

Answers

Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients

configure network access policies on the RADIUS server

Explanation:

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

please help me with this this is Computer chapter Advanced HTML of class 8th​

Answers

Answer:

ok let me try

It stands for

Hypertext Markup Language

Image result for html stands for

HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.

You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem

Answers

Answer:

Key escrow.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?

Answers

Answer and Explanation:

Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.

Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.

If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?

Answers

Answer: be nice no matter how mean or rude the person is.

Explanation: because if you’re not you can get in big trouble or fired.

Answer:

remain  calm during the conversation

describe in detail what each step would look like if you ran into a software error.

Answers

Answer:

First you have to identify the problem.

Second Gather information.

Third iterate through potential solutions.

Fourth Test your solution.

Explanation:

There are many different ways to handle errors in software but this is the way I do it.

Hope this helps :)

After running into a software error, a user needs to first determine the reason for the error, work towards a solution and then execute the solution discovered.

Software Error

A software error occurs when an error or unusual behaviour is observed in a piece of software and which can be reproduced after certain actions are performed that are in line with the stated rules of the software developer. In other words, a software error does not occur if the software was not used as directed by the software developer.

You can learn more about software errors here https://brainly.com/question/18497347

#SPJ6

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

What is the purpose of requirements gathering and analysis?

Answers

Answer:

The purpose of Requirements Analysis is to discover unknown requirements, i.e., to turn unknown requirements into known requirements. Users' needs that were not expressed during requirements gathering and elicitation can be uncovered through Requirements Analysis.

Explanation:

When a class implements in interface, it must ________ Group of answer choices overload all of the methods listed in the interface provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified not have a constructor be an abstract class

Answers

Answer:

provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified

Explanation:

I am assuming the programming language is Java. Actually, none of the answers are 100% correct, but this one is the only one that is partially correct. The reason is the class implementing an interface can be abstract, and in this case it may not provide ALL nondefault methods.

write a c program to display the series: 1,8,27,64,125​

Answers

num_list = [1, 8, 27, 64, 125]

for x in range ( len( num_list) ) :

print (num_list[x])

Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.

Answers

Answer:

True

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>

Answers

Explanation:

the output password is isalpha()

A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:

Answers

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

full form of ip ........?​

Answers

internet protocol - hope this helps!

write a program in python to make the figure:-

*
**
****
********
****************
********************************

The first and correct answer will be marked as brainliest......​

Answers

Answer:

Halo mateeeee

look it will be hard to explain the code and steps to you so just refer this video. .

it will help a lott

( *cries* Serena left Ash In pokemon s19 with a k I s s)

https://youtu.be/rUy_Nq9DHTs

Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END​

Answers

Answer:

full and then I would like this

Other Questions
The Lewis dot model of a molecule is shown.Based on the model, which of the following is true? Each carbon has three lone pairs of electrons on it. The octet of carbon atom remains incomplete in the molecule. The two carbon atoms share a total of six electrons with each other. The difference between the electronegativity of carbon and hydrogen is greater than 1.7. find the missing side of the triangle. QS 8-7 Computing revised depreciation LO C2 On January 1, the Matthews Band pays $65,800 for sound equipment. The band estimates it will use this equipment for four years and after four years it can sell the equipment for $2,000. Matthews Band uses straight-line depreciation but realizes at the start of the second year that this equipment will last only a total of three years. The salvage value is not changed. Compute the revised depreciation for both the second and third years. balance the equation:2Na+3H2O-2NaOH+H2 A ball is thrown from an initial height of1 meter with an initial upward velocity of1 m/s. The ball's height h(in meters) after tseconds is given by the following. h=1+30t-5t^2Find all values of tfor which the ball's height is 11meters.Round your answer(s) to the nearest hundredth. Jerry sold 320 tickets for the school play. He sold x adults tickets for $8 each and y child tickets for $5 each. He sold $1900 worth of tickets. Write a system of equations to model the situation.What is the equation? take an interview of your parents about the difficulties faced during the pandemic while running their household activities.plz answer correctly it is my project work. Whats different for the functions 1. What is Ms. Romans employment background?Ms. Roman's employment background is that she's been a police officer for 25 years.2. What statistics from police academies in the state of New Jersey were alarming to Ms. Roman?The statistics from the police academies in the state of New Jersey that were alarming to Ms. Roman are the rates between 65 and 80 percent of women are failing due to the physical fitness test.3. What was a major reason for women failing at the police academies?A major reason for women failing at the police academies are recruits needing to pass the fitness exam within 10 short workouts and only have three weeks to try to pass due to a new policy.4. What had these police recruits been required to do in order to reach the point in the process that allowed them to take the physical fitness test?Police recruits were required to pass very lengthy background checks, medical exams, psychological exams, and clearly quit any other job.5. What data does Ms. Roman share about women serving as police officers? What data does she share about women working as police chiefs?The data Ms. Roman shares about women serving as police officers is that less than 13% of the police officers hadn't changed much in the past 20 years. Only 3% of women were police chiefs in 2013.6. How are other countries doing when it comes to female representation in the police force compared to the US?When female representation in the police force compares to the US some countries have nearly twice as many women police officers.7. According to research, what are some positive results to having female police officers on the force?Positive results to having female police officers on the force include female police officers tending to have more of a positive influence, great job performance, trustworthiness, and fairness in the police force.8. What does Ms. Roman define as the main problem with the different policy agencies and their standards?Ms. Roman defines that the main problem in different policy agencies and their standards is that the the differing policy agencies and their standards is that the main focus is on physical strength.9. What should police academies also focus on, aside from physical strength, when recruiting officers?Other than physical strength police academies should focus on problem-solving skills, community policing, and interpersonal communication skills.10. What are some ways to encourage more female recruits to join the police force? How must the testing process be changed to ensure women are not unfairly excluded from the force?Some ways to encourage more female recruits to join the police force could be good salary package and suitable environments. When it comes to good salaries for the police force and an environment that feels safe and suitable with lack of sexual harassments then more women will join, some just cause they want to not for the "encouragement". The testing process could be conducted under fair supervision in order to ensure that women are not being unfairly justed from the force. A toddler is allowed to dress himself on Mondays, Wednesdays, and Fridays. For each of his shirt, pants, and shoes, he is equally likely to put it on correctly as incorrectly. Getting these articles of clothing on correctly are independent of each other. On the other days, the mother dresses the toddler with 100% accuracy. Given that the toddler is correctly dressed, what is the probability that today is Monday A 10.53 mol sample of krypton gas is maintained in a 0.8006 L container at 299.8 K. What is the pressure in atm calculated using thevan der Waals' equation for Kr gas under these conditions? For Kr, a = 2.318 L'atm/mol and b = 3.978x10L/mol. Differentiate between emperical andmolecular formula. Give an example ofa substance having different empericaland molecular formula Write the name of the definition, postulate, property or theorem that justifies the statement about the diagram. Could you please please help me with these questions this is my last attempt and it's due today Why is the temperate monsoon climate also called the china type of climate? A warranty in which the seller warrants that he or she has valid title to the goods he or she is selling and that the transfer of title is rightful is known as a warranty ________. of good title of no interference of no security interests against infringements Between which two numbers does 46 lie? A. between 8 and 9 B. between 6 and 7 C. between 5 and 6 D. between 7 and 8 The differences between actual and standard costs are called __________ variances. cost profit quantity volume 2. A favorable cost variance results when actual cost is greater than standard cost at actual volumes. actual cost is less than standard cost at actual volumes. actual cost is equal to standard cost at actual volumes. actual cost is greater than standard cost at budgeted volumes. PLEASE SOMEONE HELP ME ANSWER THIS !!!!Write the equations of the linear and exponential functions that pass through the points (0, 15) and (1, 5)Linear Equation, y = mx+bExponential Equation, y = a(b)^xPLEASE ANSWER IT I HAVE AN IMAGE ATTACHED IF NEEDED !!!! The potential difference between the plates of a capacitor is 234 V. Midway between the plates, a proton and an electron are released. The electron is released from rest. The proton is projected perpendicularly toward the negative plate with an initial speed. The proton strikes the negative plate at the same instant the electron strikes the positive plate. Ignore the attraction between the two particles, and find the initial speed of the proton.I have tried looking at the cramster.com solution manual and do not like the way it is explained. Simply put, I cannot follow what is going on and I am looking for someone who can explain it in plain man's terms and help me understand and get the correct answer. I am willing to give MAX karma points to anyone who can help me through this. Thank you kindly.