Answer:
B
Explanation:
the file to be transcribes should have an audio,it maybe a scam,so you have to file a report.
Answer:
I'm taking this too and I think it B, please someone, btw help i didn't mean to give that person 1 star
Explanation:
Which audio editing effect removes distortions from the audio composition?
A.
amplify
B.
normalize
C.
fade in
D.
compressor
E.
fade out
Answer:
The answer is normalize for my plato family.
Explanation:
When normalizing you can use this option to remove distortions in the recorded sound. Ideally, you should normalize a track before using the amplify effect. Otherwise, the amplify effect would amplify the decibel levels of the distortions too.
When a recipient responds to a meeting request, which statement most accurate descries what occurs?
O The meeting is confirmed, and the time is shown as Busy on the recipient's calendar.
The meeting is confirmed, and the time is shown as Free on the recipient's calendar.
O The meeting request is removed from the inbox, the meeting is confirmed, and the time is shown as Busy on
the recipient's calendar.
Nothing occurs because a recipient does not need to respond to a meeting request.
Answer:
The correct option is;
The meeting request is removed from the inbox, the meeting is confirmed, and the time is shown as Busy on the recipient's calendar
Explanation:
Upon acceptance of a meeting request on Microsoft Outlook, the schedule is added to your calendar, and the time period is displayed as busy, while the email invite is deleted from your email
The following steps are required when it is desired to retain meeting requests and store them within the email or a subfolder for future references
1) Click on the Tools menu
2) Click on Options in the Tools Menu
3) Click E-mail Options in the Options menu
4) Click on Advanced E-mail Options and
5) Uncheck the Delete meeting request from Inbox when responding.
Answer:The correct option is;
The meeting request is removed from the inbox, the meeting is confirmed, and the time is shown as Busy on the recipient's calendar
Explanation
Compared with other PC operating systems, the
Apple OS:
A. is less secure
B. has fewer available applications
C. is typically only available on Apple hardware.
D. costs much less.
Answer:
C. Is typically only available on Apple hardware.
Explanation:
Answer:
c
Explanation:
Tier 1 networks form the internet ____.
Answer:
Internet Backbone
Explanation:
The internet is a network of networks, no single tier 1 network (ISP companies like Sprint, IBM, Verizon, AT&T for example, they provide the cables and routers that connect the networks) can reach the entire internet on its own, so they merge together to form the Internet Backbone, a backbone network enables all users and companies to connect with each other.
Will give Brainliest 100 points answer only if you know
What are the four main components of programming languages, and why is each one needed?
Answer:
The four main components of programming languages are variables, control structures, data structures, and syntax.
Explanation:
The four main components of programming languages are variables, control structures, data structures, and syntax. The variables are used to store information that can be stored and manipulated in a computer program. They provide a way of labeling data with a descriptive name, so our programs can be understood more clearly. Control structures are the building blocks of computers programs. They are commands that enable a program to “take decisions.” Data structures is a data organization, management, and storage format that enables efficient access and modification. More precisely, a data structure is a collection of data values. Syntax of a computer language is the set of rules that defines the combinations of symbols that are considered to be correctly structured statements or expressions in that language. Syntax therefore refers to the form of the code.
Hope this helped :)
Please like this and rate it 4 or 5 stars.
Nora really enjoys her job. When she presents to an audience, she spends a lot of time explaining how much she loves her job. Then she goes into great detail about why she thinks her company is so great. While loving her job and company is awesome, people get frustrated because it makes the meeting last so much longer. What constructive criticism would be appropriate to give Nora?
O It is great that you love your job, but people are tired of hearing it. You are taking time away from what we really need to discuss.
O Loving your job is great; however, get to the point of the meeting. People just want to get the meeting completed.
O You are such an amazing employee. Everyone is happy to hear how much you love your job.
O Your enthusiasm is awesome. During these meetings, we are short on time, so it is important to stay focused on the topic at hand.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
As given in the scenario, Nora spends too much time in explaining that she loves the job, and then so goes into detail about why she loves the company.
And the people that are setting in the meeting get frustrated. The constructive criticism would be appropriate to Nora is given below:
Your enthusiasm is awesome. During these meetings, we are short on time, so it is important to stay focused on the topic at hand.
This is constructive criticism because you are also appreciated what Nora has done and doing and why loving the company. Also, you are giving her hints that during these meetings the time is short and you should stay on a focused topic.
Other options are not correct, because other options are informal and not professional.
Are robots that fix other robots engineers or doctors.
HELP ASAP IF YOU KNOW PYTHON 2!!!
Please use the attached files for the assignment and understanding it. Note: You can only see the files on the computer version of Brainly.
Answer:
Thats one long assignment, hard to get answers as we are given a 19 min limit to reply, atleast sub divide the assignment and we'll help you in any walls across yor journey. SORRY
Which group of Indians was native to Roanoke and not very friendly?
Croatan
Cherokee
Iroquois
Plain Indians
Answer:
Croatan I think if I remember it right.
Explanation:
Choose one skill needed to become Computer Network Administrator?
The ability to Drive.
The ability to Plan.
The ability to Code Software.
Answer:
I think 1 is ans of this question
Before her shift as a cashier at the grocery store, Carla pulls her hair back into a ponytail and makes sure her fingernails are neatly trimmed. What habit does Carla demonstrate with these preparations?
motivation
punctuality
personal hygiene and grooming
interpersonal skills
Answer:
C.) Personal Hygiene and Grooming
Explanation:
please elp i will give you brainelst answer the question and answer please!!!!!!!!!!!!!!!!
I GIVE YOU BRAINELST 5 STARS AND HEART!!!!
Answer:
I'd so like one of the Presidents.
Explanation:
research some facts. make sure to use your resources. Put some facts on who their vice president was a stuff
Which ribbon tab is not a default in Outlook 2016's main interface?
Home
Send/Receive
Folder
Review
Answer:
Review
Explanation:
The ribbon tab is not a default in Outlook 2016's main interface is Review.
What is ribbon tab?The Ribbon tab in outlook has the options or commands used to do the tasks. Like creating new email, deleting emails, opening a new meeting request, defining category to an item. However, The Ribbon takes up a lot of space on Outlook 2016 screen.
It has Home, Send/Receive mails and Folder options on the ribbon tab except Review.
Thus, the ribbon tab is not a default in Outlook 2016's main interface is Review.
Learn more about ribbon tab.
https://brainly.com/question/24481253
#SPJ2
1. Select the Volatile Memory *
RAM
ROM
Secondary Memory
2. A Malware is a *
program that enables the computer to run faster.
software in a computer that fights against VIRUS.
Harmful software to the computer
3. The full form of LAN is *
Locally Area Network
Local Area Network
Local Area Networking
4. The smallest Unit of data is called as *
Bit
Byte
Megabyte
5. The permanent memory built in your computer is *
Monitor
ROM
RAM
6. Which one of the following is a VIRUS *
Morris Malware
ILOVEYOU Malware
Mellisa malware
7. Which of the following storage devices are found inside the computer? *
Hard disk drive
SSS Drive
Magnetic Tape
8. The full form of ROM is *
Read Only Memory
Reading Only Memory
Read On Memory
9. Choose the Highest Unit of Data from the following. *
Megabyte
Gigabyte
Answer:
1 no.
ram
2
harmful software to the computer
3
local area network
4
bit
5
ram
6
morris malware
7
hard disk drive
8
read only memory9
gigabyte
hope this will help u
Identify the tasks that people can perform using a web browser. View a web page Program a computer Record a video Organize the entire hard drive Shop from a web page Download an MP3 file Upload photographs to an Internet site Search for a web page
Answer:
1,3,5,6,7,8 on edge2020
Explanation:
Answer: 1, 3, 5, 6, 7, 8
Explanation: got a 100
Amara created a workbook to track the number of
minutes she reads each week. Each day, she entered
the number of minutes into the workbook. Identify the
types of data in the workbook using the drop-down
menus.
25:
105:
Wed:
Answer:
25: Value
105:Formula
Wed: Label
Explanation:
Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer development by dates (chronologically)
Answer:
The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.
Explanation:
The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were five generations of computer development. They were :
1. First Generation computers
In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.
2. Second Generation computers
These are transistors based computers. This generation ranges from 1959 to 1965.
3. Third Generation computers
This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.
4. Fourth Generation computers
The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.
5. Fifth Generation computers
The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.
Please help me with these definitions!!!!!!
Type 1 Hypervisor
Type 2 Hypervisor
Virtual Box
Virtual Machine
Virtual Machine Escape
Virtual Machine Monitor
Virtual Machine Sprawl
VMWare
Application Cell
Answer:
1st one . A bare-metal hypervisor (Type 1) is a layer of software we install directly on top of a physical server and its underlying hardware. mainly found in enterprise environments.
2nd. A Type 2 hypervisor, also called a hosted hypervisor, is a virtual machine manager that is installed as a software application on an existing operating system (OS). ... Examples of this type of hypervisor include VMware Fusion, Oracle Virtual Box, Oracle VM for x86, Solaris Zones, Parallels and VMware Workstation.
3rd. VirtualBox is open-source software for virtualizing the x86 computing architecture. It acts as a hypervisor, creating a VM (virtual machine) where the user can run another OS (operating system).
4th. a virtual machine is an emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination.
hope it helps x
Explanation:
4
What does the Control unit do?
Answer:
The control unit controls and monitors communications between the hardware attached to the computer. It controls the input and output of data, checks that signals have been delivered successfully, and makes sure that data goes to the correct place at the correct time..
Hope it is helpful
Answer:
The control unit controls and monitors communications between the hardware attached to the computer. It controls the input and output of data, checks that signals have been delivered successfully, and makes sure that data goes to the correct place at the correct time.
whats the importance of technology based services?
Answer:
The most important role of technology in customer service is that it helps to increase the speed of customer interactions. Instead, live chat on company websites enables organizations to help customers as soon as they show interest. Many companies also provide customers the option to text them using their cellphones.
Help me please (⌒-⌒; )
Answer:
raise the prices
Explanation:
Hope this helped, Have a Great Day/Night!!
Calculate and express your answer in decimal form.
12⋅17
34⋅200
(0.2)⋅40
(0.25)⋅60
Answer:
ポイントが欲しいだけなのかわからない
Explanation:
何語を話していますか
Write the corresponding Python assignment statements:
a) Assign 10 to variable length and 20 to variable breadth.
b) Assign the average of values of variables length and breadth to a variable sum.
e) Assign the concatenated value of string variables first, middle and last to variable fullname.
a)
length = 10
breadth = 20
b)
sum = 15
c)
fullname = "{} {} {}".format(first, middle, last)
What is the power of 3 shch that it's power is 1/3 ?
Answer:
3/1-1
Explanation:
Anne wants to hide her age by converting it from 13 to 1101. Which number system is Anne converting to?
Alphanumeric
Alphabetical
Binary
Decimal
Answer:
Binary
Explanation:
It can't be a or b because that is not 13-1101. it would be 830md and 830dm
Decimal is incorrect bc it would have a decimal.
So the correct answer is binary.
Hope this helps plz hit the crown :D
Answer:
Option C: Binary
Explanation:
In what four ways do we commonly respond?
A :Hearing, interpreting, evaluating, advising
B :Interpreting, evaluating, listening, hearing
C :Responding, interpreting, hearing, advising
D :Evaluating, probing, advising, interpreting
Answer:
A
Explanation:
How many types of sharing of Google Forms are possible?
Answer:
Open a form in Google Forms.
In the top right, click More .
Click Add collaborators.
Under "Invite people," type the names or email addresses of the people you want to work with.
Click Send.
Amara created a workbook to track the number of minutes she reads each week. Each day, she entered the number of minutes into the workbook. Identify the types of data in the workbook using the drop-down menus. 25: 105: Wed:
Answer:
25: Value
105:Formula
Wed: Label
Explanation:
Answer:
C- Value
A- Formula
B- Label
Explanation:
All dogs = 199999990158161231
A = B
B = C
C = D
Please help this question makes 0 sense but my teacher asked me it so I gotta figure it out
Answer:
C=D cause d spells dogs jk I really dont know
Answer:
B
Explanation:
please help in this question
Answer:
A loop statement is used to execute one of more statement depending on whether.