Danielle wants to record a voice-over to add to a presentation. Other than a microphone, what does danielle need to record the audio?.

Answers

Answer 1

Answer:

Sound recorder software

Explanation:


Related Questions

What is Communication​

Answers

Computer communications describes a process in which two or more computers or devices transfer data, instructions, and information. ... A sending device that initiates an instruction to transmit data, instructions, or information. A communications device that connects the sending device to a communications channel.

which type of attack is wep extremely vulnerable to?

Answers

WEP is extremely vulnerable to a variety of attack types, including cracking, brute-force, IV (Initialization Vector) attack, and replay attack.

What is Initialization Vector?

An Initialization Vector (IV) is a random number used in cryptography that helps to ensure the uniqueness and randomness of data used in an encryption process. The IV is typically used as part of an encryption algorithm, where it is combined with a secret key to encrypt a message. The IV is unique for each encryption session, and must be unpredictable and non-repeating. A good IV should not be reused across multiple encryption sessions, and it should be kept secret from anyone who does not have access to the decryption key. Without a good IV, a cryptographic system can be vulnerable to attacks such as replay attacks, where an attacker can gain access to the system by repeating an encrypted message.

To learn more about Initialization Vector
https://brainly.com/question/27737295
#SPJ4

Which statement is most accurate?Batteries with higher voltage will always produce a lower current rating than batteries with low voltages. Voltage is not a good indicator of electrical current that batteries can produce. A 1.5 volt battery has less ability to move electrons than a 6 volt battery. A 12 volt battery creates more electrical pressure than a 24 volt battery.

Answers

A 12 volt battery creates more electrical pressure than a 24 volt battery.

What is meant by volt?

-A measurement of the electromotive force and electrical potential difference between two places in a conducting wire carrying a continuous current of one amp when the power applied between these two sites is equal to one watt.

-A volt is defined as the energy consumption of one joule for every coulomb of electrical charge. 1V = 1J/C.

One volt is the difference in potential between two locations in a wire carrying one ampere of current when the power expended between the places is one watt.

-Volts are units of electrical potential, potential difference, and electromotive force in the metre-kilogram-second system (SI).

To know more about volt visit:-

brainly.com/question/27861305

#SPJ1

Computer has brought radical change in every field​

Answers

Answer:

Yes it has brought change in every field

Explanation:

The ALIGN attribute of the P-tag cannot take what value right or left or justify or center?​

Answers

The align attribute of p tag can not take 'much' value

#LETS STUDY

#BRAINLEST LOVE❣️

B. Directions: Fill in the blanks with the correct answer.

___1. is a tool used for grasping and holding things.
___ 2. caregiving tools, equipment and paraphernalia is used for holding and carrying the laundry before and after washing lamparable ___3. is an instrument used for measuring body temperature.___ 4. is a tool use to destroy microorganisms in container like babies bottle through boiling ____5. An electrical device used for slicing food is ____6. is an electrical appliance use for cleaning floors, carpets and furniture by suction. ___7. is a device usually found in a clinic, hospitals or in a Barangay health centers is used for listening the heart and lungs action. ___8. A is used to blend, chop, dice and slice foods and allowing to prepare meals quicker. ____9. is a device that automatically wash the dishes like plates, pots, etc. ___10. is an appliance used in washing clothes without doing it manually.​

Answers

Answer:

TONGS BASKETTHERMOMETER AUTOCLAVES ELECTRIC KNIFE VACUUM STETHOSCOPEBLENDER DISHWASHER WASHING MACHINE

explain digital divide​

Answers

Answer:

A digital divide is any uneven distribution in the access to, use of, or impact of Information and Communication Technologies (ICT) between any number of distinct groups.

The digital divide is the gap that exists between individuals who have access to modern information and communication technology and those who lack access.

plzzz help i need this today :(

plzzz help i need this today :(

Answers

Answer:

C

Explanation:

[Exceptions, Function calling another function] Write a function ticker() that first runs (calls) read_ticker() and then stores the returned dictionary. It then runs an interactive loop with the user in which the user is prompted for a company name. If the company name (key) is in the dictionary, then its ticker form and the IPO year is printed. Otherwise a warning is printed that the company name is not in the list. If the user just hits return without entering a name, the loop stops.




this is the function that needs to be called:
def read_ticker():
d = {'1347 Capital Corp.': ('TFSCW', '2014'), '1347 Property Insurance Holdings, Inc.': ('PIH', '2014'), '1-800 FLOWERS.COM, Inc.': ('FLWS', '1999')}
return d

Answers

def read_ticker():

   d = {'1347 Capital Corp.': ('TFSCW', '2014'), '1347 Property Insurance Holdings, Inc.': ('PIH', '2014'),

        '1-800 FLOWERS.COM, Inc.': ('FLWS', '1999')}

   return d

def ticker():

   di = read_ticker()

   while True:

       try:

           name = input("Enter the name of a company: ")

           if name == "":

               return

           print(di[name])

       except KeyError:

           print("Name not found! Please enter a valid name!")

ticker()

I hope this helps!

rich mail allows graphics, video, and audio to be included in the e-mail message. true false

Answers

True. Rich mail is a term used to describe email messages that include multimedia content such as graphics, video, and audio.

This is in contrast to plain text email messages which only allow for the inclusion of written content. Rich mail has become increasingly popular in recent years as it allows for a more engaging and visually appealing way to communicate with others. It is particularly useful for marketing and advertising purposes, as it can help to grab the recipient's attention and increase the likelihood of them taking action. However, it is important to note that not all email clients support rich mail, and some recipients may have settings that prevent the display of certain types of multimedia content. Therefore, it is important to consider your audience and their preferences before sending rich mail messages. Overall, rich mail is a powerful tool that can be used to enhance the effectiveness of email communication.

Know more about Rich mail here:

https://brainly.com/question/30054219

#SPJ11

ANSWER:POST-TEST

direction encircle the letter of the correct answer..

1 .the written description accompanying the working drawing

2. a board made of plaster with covering of paper

3.a fire protection device that discharge water when the effect of a fire have been detected, such as when a predetermined temperature has been reached.

4.structural members in building construction that holds the ceiling board

5.the position or placement of lightning fixtures of the house.


with answer na din.

1.C
2.D
3.B
4.A
5.D

SANA MAKATULONG★☆☆


TLE​

Answers

Answer:

1. Specifications.

2. Gypsum board.

3. Sprinkler systems.

4. Ceiling joist.

5. Lighting fixtures.

Explanation:

In Engineering, it is a standard and common practice to use drawings and models in the design and development of buildings, tools or systems that are being used for proffering solutions to specific problems in different fields such as banks, medicine, telecommunications and industries.

Hence, an architect or design engineer make use of drawings such as pictorial drawings, sketches, or architectural (technical) drawing to communicate ideas about a plan (design) to others, record and retain informations (ideas) so that they're not forgotten and analyze how different components of a plan (design) work together.

Architectural drawing is mainly implemented with computer-aided design (CAD) software and it's typically used in plans and blueprints that illustrates how to construct a building or an object.

1. Specifications: it's a well-written description that accompanies a working drawing used for designs and constructions.

2. Gypsum board: also referred to as drywall due to its inherent ability to resist fire. It's a type of board that's typically made of plaster with some covering of paper and it's used for ceilings, walls, etc.

3. Sprinkler systems: it's an automatic fire protection device that is typically designed to discharge a volume of water as soon as the effect of a fire is detected. For instance, when a predetermined or set temperature has been reached such as 69°C

4. Ceiling joist: structural members that are aligned or arranged horizontally in building construction in order to hold the ceiling board together.

5. Lighting fixtures: it's typically the position or placement of lightning fixtures of the house.

If the main fire is more than 100 feet from power lines and there are small spot fires closer to the wires:_________

Answers

If the main fire is more than 100 feet from power lines and there are small spot fires closer to the wires: you can continue your attack.

What are the fundamental firefighting strategies and security guidelines?

The fundamental firefighting strategies and security guidelines to adhere to when battling fires close to high-voltage power lines are as follows, as stated on page 50 of Firefighter's Handbook on Wildland Firefighting:

You can carry on your attack if the main fire is more than 100 feet away from the power lines but there are smaller spot fires closer to the wires. Small spot fires do not produce enough smoke to cause the electricity grid to short out.

Assume that the smoke is dense enough to short out the power system if the fire is within 100 feet of the power lines. Refrain from direct assault and maintain a 100-foot distance from the outermost wire.

Never perform work within 35 feet of a pole structure or high-voltage tower. Assume that the smoke is dense enough to short out the power grid if the fire is within 100 feet of power lines. Keep at least 100 feet away from the outermost wire and refrain from any direct attacks.

If the main fire is more than 100 feet from power lines and there are small spot fires closer to the wires: you can continue your attack.

To learn more about spot fires refer to;

https://brainly.com/question/4105460

#SPJ4

Which term is a command that is usef to refer to a set of files called a library in your code

Answers

Answer: Event handler

Explanation:

Event handler Is a command that is used to refer to a set of files called a library in your code.

write the method heading for a method called larger that accepts 2 integer arrays and returns the array with the larger number of elements.

Answers

Writing a function to compute the average of the even numbers in the array is required for this application.

The percentage function When given an array of integers as a parameter or argument, even prints the average of the even numbers. The code below implements the aforementioned functionality in Python, and the code's output is also included. In computer science, an array is a group of objects (values or variables). At least one array index or key is used to uniquely identify each element. Given its index tuple, a mathematical formula can determine each element's location in an array. The simplest basic type of data structure is a linear array, sometimes known as a one-dimensional array. Since a two-dimensional grid can theoretically be used to represent a matrix, two-dimensional arrays are occasionally referred to as "matrices."

Learn more about array here:

https://brainly.com/question/28945807

#SPJ4

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. Please select the best answer from the choices provided T F

Answers

Answer:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.

Explanation:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.

Answer:

False

Explanation: I took the test and passed!!

meaning of page break​

Answers

Answer:

a point at which a price of continuous text is split into two pages

Explanation:

for ex: a page break is treated as a single character in the document.

we use _____command to get data from the user? (python)

Answers

Answer:

INPUT

Explanation:

EXAMPLE PYTHON CODE

_______________________________________________________

INPUT CODE:

_______________________________________________________

foo = input('foo: ')#Have some text printed before the input field

bar = foo

print(bar)

_______________________________________________________

OUTPUT CODE:

_______________________________________________________

foo: Hello World!

Hello World!

>>> bar

'Hello World!'

>>>foo

'Hello World!'

Which of the following features allows researchers to link Codification topics with the original standards that were used to populate the Codification?

a. Advanced keyword search
b. Cross reference
c. The "go to" button, for searching by ASC reference number
d. Browse search

Answers

The correct option is c. The feature that allows researchers to link Codification topics with the original standards that were used to populate the Codification is Cross reference.

Cross-references are links between items in the Codification and sources such as Financial Accounting Standards Board (FASB) statements, Emerging Issues Task Force (EITF) and related content, and American Institute of Certified Public Accountants (AICPA) accounting guidance. Researchers can use cross-references to follow a specific accounting standard that is being codified in the Codification.

For instance, users can track the development of the accounting standard over time by utilizing cross-references to trace an item in the Codification back to the initial proposed Accounting Standards Update (ASU). The Codification's cross-reference feature allows researchers to connect topics in the Codification to the original criteria that were utilized to fill the Codification. This enables researchers to obtain the most accurate and up-to-date information possible when researching accounting topics.

To know more about the FASB visit:

https://brainly.com/question/31226953

#SPJ11

Which authentication mechanism does 802.1x usually rely upon? eap totp rsa hotp see all questions back next question

Answers

802.1x usually relies on the EAP framework for authentication, and it supports various methods such as EAP-TOTP, EAP-RSA, and EAP-HOTP. These methods offer different ways to authenticate users and ensure the security of the network.

802.1x is an authentication mechanism used in computer networks to control access to the network.

It usually relies on the EAP (Extensible Authentication Protocol) framework for authentication. EAP allows for different methods of authentication to be used, depending on the requirements of the network.

Some common methods used with 802.1x include TOTP (Time-based One-Time Password), RSA (Rivest-Shamir-Adleman), and HOTP (HMAC-based One-Time Password).
EAP-TOTP is a method that generates one-time passwords based on a shared secret and the current time.

These passwords are valid only for a short period of time, providing an additional layer of security.
EAP-RSA, on the other hand, uses the RSA algorithm for authentication.

It relies on the use of public and private key pairs to authenticate users.
EAP-HOTP is similar to EAP-TOTP but uses HMAC (Hash-based Message Authentication Code) for generating one-time passwords. It also requires a shared secret and a counter to generate the passwords.
These different methods of authentication provide flexibility for network administrators to choose the most suitable method for their network's security requirements.
In summary, 802.1x usually relies on the EAP framework for authentication, and it supports various methods such as EAP-TOTP, EAP-RSA, and EAP-HOTP.

These methods offer different ways to authenticate users and ensure the security of the network.

To know more about authentication mechanism visit :

https://brainly.com/question/14530893

#SPJ11

explain why it is reasonable to assume that the use of dependable processes will lead to the creation of dependable software.

Answers

It is reasonable to assume that the use of dependable processes will lead to the creation of dependable software for several reasons. The first reason is that the use of dependable processes involves the use of well-established, tested and proven processes and methodologies that have been shown to produce high-quality software that meets the user's requirements and specifications.

Dependable processes are those that have been designed to minimize the risk of software failure, errors, and defects. Such processes are typically based on standards and best practices that have been developed by software engineering experts over the years.

Another reason why it is reasonable to assume that the use of dependable processes will lead to the creation of dependable software is that dependable processes typically involve the use of quality assurance and testing tools and techniques.

Dependable processes involve a high degree of collaboration between different stakeholders, including developers, testers, and users.
To know more about visit:

https://brainly.com/question/30466519

#SPJ11

What capital city is located at 33 s and 71w?

Answers

Answer:

jmkk;

Explanation:

How would you get a single pixel, solid border (line that goes up and down) between horizontal menu items to provide visual separation?

Answers

To get a single pixel, solid border between horizontal menu items, you can use CSS to style the border of each menu item. One way to achieve this is by setting the border-right property of each menu item to a solid line of 1 pixel width. For example:

.menu-item {

 border-right: 1px solid #000;

}

This will add a solid black line to the right of each menu item. You can adjust the color and thickness of the line by changing the color and width values in the CSS. If you want to remove the border from the last menu item, you can use the :last-child pseudo-class selector to target it, like this:

.menu-item:last-child {

 border-right: none;

}

This will remove the border from the last menu item, providing a clean separation between the menu items. By adjusting the CSS properties and selectors, you can achieve different styles and effects for your menu borders.

Learn about  pixel click here:

brainly.com/question/15189307

#SPJ11

Which visual or multimedia aid would be most appropriate for introducing a second-grade class to the location of the chest’s internal organs?

a drawing
a photo
a surgical video
an audio guide

Answers

Answer:

It's A: a drawing

Explanation:

Did it on EDGE

Answer:

It is A. a drawing

Explanation:

when corrosion is found within the body of a relief valve the valve must be

Answers

When corrosion is found within the body of a relief valve, the valve must be inspected to determine the extent of the damage.

If the corrosion is severe enough to compromise the structural integrity or the performance of the valve, it must be repaired or replaced.

In some cases, minor corrosion can be removed by cleaning and polishing the affected area. However, if the corrosion has caused pitting or cracking in the metal, or if the corrosion has caused the valve to lose its ability to open or close properly, the valve must be repaired or replaced.

It is important to address corrosion in relief valves promptly, as the valve is a critical safety component. If the valve fails to function properly in an emergency, it could result in a hazardous situation or even a catastrophic failure. Therefore, regular inspection and maintenance of relief valves is essential to ensure their safe and reliable operation.

Learn more about valve here:

https://brainly.com/question/31568957

#SPJ11

Draw a flowchart for an algorithm which calculates how much money a student will need per week to buy a meal and two drinks each weekday. The user should be prompted to enter how much a meal costs, how much a drink costs, and then calculate and display the total required.​

Answers

Flowcharts are used as a prototype of an actual program.

First, I will write out the algorithm; which will be used as an explanation of the flowchart (see attachment for flowchart)

The algorithm is as follows;

1. Start

2. Get input for cost of a meal and cost of a drink;

3. Calculate the total cost for a meal and two drinks

4. Multiply the total cost of a meal and two drinks by 7, to get the weekly cost

5. Display the weekly cost

6. Stop

At the end of the algorithm/flowchart, the weekly cost is calculated and printed.

See attachment for flowchart

Read more about algorithms and flowcharts at:

https://brainly.com/question/18088572

Draw a flowchart for an algorithm which calculates how much money a student will need per week to buy

What do you mean by gigo?Explain in breif​

Answers

Answer:

garbage in garbage out

Explanation:

it means bad input gives you also a bad output.

could you mark me as brianlist.

a) Compare the following pairs of vectors. Your answers can be one or more of the
following: """""None of the above"
Please provide all of the true answer(s) to each comparison below. For example, if<<"
is true, then "" and "" must also be true. (2 points for each comparison)
[1.3.5, 7 ________________12.3.5,6)
[1.3,5,7,91_________________(0,2,4,6,8)

Answers

The answer is "None of the above" since none of the components are equal in the given pairs of vectors.

To compare the given pairs of vectors, we need to check if each corresponding component of the vectors is equal. If any component is different, the vectors are not equal. Here are the comparisons:

A) [1, 3, 5, 7] and [12, 3, 5, 6]

- None of the components are equal, so the vectors are not equal.

- Answer: None of the above

B) [1, 3, 5, 7, 9] and [0, 2, 4, 6, 8]

- The vectors have the same number of components, but none of the components are equal.

- Answer: None of the above

Therefore, for both comparisons, the answer is "None of the above" since none of the components are equal in the given pairs of vectors.

Know more about vector:

https://brainly.com/question/29740341

#SPJ4

In the following scenario, which can a photo editor digitally do to photos that could not be done before?

A photo shoot for a new advertising campaign has just finished. The ad campaign is for a new line of makeup from an international beauty corporation. The photo spread includes several close-up shots of models wearing the different makeup products.


Add a soft focus to the image.

Remove freckles from the model’s face.

Add a warm glow to the entire photo.

Enhance the color of the makeup and tone down the color of the model’s skin.

Answers

Answer:

if you didn't yet already do the question think the answer is D

Explanation:

Review the HTML code below.



My Web Page


Hello Friend!
Make it a great day!

Smile
Laugh
Celebrate




Which of the text below would display in the page title, based upon the HTML code above?

Smile
My Web Page
Make it a great day!
Hello Friend!

Answers

My Web Page would display in the page title, based upon the HTML code above.

What is the HTML code?For pages intended to be viewed in a web browser, the HyperText Markup Language, or HTML, is the accepted markup language. Cascading Style Sheets and JavaScript are technologies and scripting languages that can help.A web page's structure and content are organised using HTML (HyperText Markup Language) coding. The organisation of the material, for instance, might take the form of a series of paragraphs, a list of bulleted points, or the use of graphics and data tables.In HTML, four tags are necessary. HTML stands for "title," "head," and "body." These tags go at the start and end of an HTML document.

Learn more about HTML refer to :

https://brainly.com/question/4056554

#SPJ1

IM in high school (freshmen) and I started using brainly when I was in middle school, haven't made much friends but im ok with who I have! Anyways question is abt career management!
In Stage 2, the Thinking stage, John would probably:

Research ways to quit smoking.
Switch over to nicotine gum or e-cigs.
Blame it on pollution in the air
Admit he has a problem, but put off doing anything.

Answers

Answer:

My Spring 2018 Sabbatical Project was to study techniques and ideas of classroom management. The result was a set of documents and resources that I am placing here in blog format to easily share with my colleagues and any other interested party.

Comments and questions are welcome, and I will respond as time allows. Feel free to share these posts.

Sincerely,

Tracy Johnston

Palomar College Mathematics Department

Answer:

The more sane thing that he should do is to research ways to quit smoking.

Explanation:

Smoking is not good for you, nor are e-cigs

Nicotine gum is just as addictive and is quite expensive

There really isn't much pollution in the air, mostly allergens

You gotta do something, you'll die if you keep smoking/vaping or whatever he is doing

Other Questions
Use the diagram below to solve for x and y. Please help! Fast if possible. solve each proportion. 9/16 = x/12 Convert 30.0g NaNO3 to molesplease help 3. gravity can best be described as: a. the tendency of masses to move towards each other b. the energy possessed by its body by virtue of its motion c. the tendency of any state of affairs to persist in the absence of external influences d. the effect of transfer of energy from one object striking another resulting in a near-instant change of relative velocity what local services are not observable in your community? how do they affect your society? When considering the entirety of the hip complex, both the leftand right sides, how many bones compose the complex? A soccer team has a record of 13 wins and 7 losses. What percent of their games has the team won? Question 1 of 10A toy car that is 0.5 ft long is used to model the actions of an actual car thatis 15 ft long. Which ratio shows the relationship between the sizes of themodel and the actual car? 100,105,110.25 recusive formula identify the term that does not denote key concurrency. select one: a. mutual exclusion b. non-critical section c. race condition d. intermediate twenty-five milliliters of 0.10 m hcl(aq) is titrated with 0.10 m naoh(aq). what is the ph when 30 ml of naoh(aq) have been added? Can somebody help me with my Spanish pleaseee you conduct a study in which you ask the parents of 50 randomly selected children about how many hours of violent television they watch weekly and then observe the children on the playground and count the number of aggressive behaviors they exhibit. as a result of this study, you can determine: if a 12 V battery is connected to the circuit shown, and R1 and R2 are EACH 2 ohm resistors; what must be the resistance of R4 be if R3 is 4 ohms and the total current is 2 amp? The company LOG, Inc. decided tocarry out an expansion project for which itneeded additional funds. Preferred shares wereissued that pay $6 in dividends, with an evenvalue of $ 60. These shares are being sold in themarket for $ 50 per share. If the similaralternatives at risk at your disposal yield 15%,youto.I would buy the shares because they are worthmore than they cost.b.I would not buy the shares because their marketvalue is below par value.C.There is not enough information to reach aconclusion.d.I would not buy the shares because they costmore than they are worth. Find the equation of the line described. Write your answer in standard form. With m=2 and b=-9 a biologist analyzes 15 bacteria samples each day a. complete the table Whats greater 7.8 mL or 0.78 L Yo ___ unas rosas a mi madre. *dodeldigodoy QuestionWrite an equation of a line that passes through the point (4,3) and is perpendicular to the graph of the equation y=1/3+4