what is multimedia computer system​

Answers

Answer 1

A Multimedia can be defined as any application that combines text with graphics, animation, audio, video, and/or virtual reality. Multimedia systems are used for security to keep intruders out of a system and for the protection of stored documents


Related Questions

What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network

Answers

Answer:

RIP

Explanation:

RIP is a routing protocol that stands for Routing Information Protocol. It is a distance-vector routing algorithm which uses a hop count for routing its metric. RIP is the most popular and frequently used on internet. RIP uses hop count, which means it goes from low hop count to high hop count.

Therefore, it is the Routing Infomation Protocol which is the most popular distance-vector routing algorithm used to determine the best routes within a network.

I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.

My code:

b = float(input("Enter Temperature: "))

Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line

Answers

Answer:

The error is because you wrapped the input in float. First record the input and then modify it.

Explanation:

b =  input("enter temp:")

b = float(b)

objets will never appear to have more than one vamishing point
true or false

Answers

Answer: it’s True

Explanation:

hey plz help, and thanks

Answers

Answer:D im pretty sure

Explanation:im sorry if get it wrong So sorry ok just sorry

D maybe??? Sorry if it’s wrong

If you had three extra siblings, what would be your birth order and what personalities would you like them to have?

Answers

Answer:

mixed personalities l

that will be cool

Answer:

I already have 4 step brothers, 2 real brothers, 1 step sister, and a half sister, so 3 more people would be a lot. If I got to pick their personalities and gender, I would want 1 more sister and 2 more brothers. I would watn a more alt brother, a more fem brother, and an indie sister. Kinda just an aesthetic type for them.

how to find radius of the base examples ​

Answers

Answer:radius is half the diameter

Explanation:

What is Microsoft Windows?

Answers

Microsoft Windows is, computer operating system (OS) developed by Microsoft Corporation to run personal computers (PCs).

PLS HELP BEING TIMED!!!!
Why do prospective lenders only accept FICO credit reports that are one or two days old, at most?
O Good credit scores can plummet quickly
O Credit scores change on a daily basis.
O Bad credit scores can improve quickly.
O Credit reports expire after two days and are no longer valid.

Answers

Answer:

O Credit scores change on a daily basis.

Explanation:

Match the terms with their definitions

Answers

Answer:

Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.

Hope this helps! :)

Malware = a term used for software designed to damage your computer or steal your personal information

Single sign-on = when you use a single credential to log into multiple websites

Phishing = when random links mislead you into giving your password or other vital information to an unscrupulous website or person

Clickjacking = when you unknowingly click a malicious link, thinking it to be a legitimate link
:)

Which background-repeat value represents this div?
repeat

repeat-y

repeat-x

no-repeat

Answers

Answer:

repeat-y ................ ..

Which examples demonstrate common education and qualifications for Manufacturing Production Process Development careers? Check all that apply. Answer: A. Hugo uses CAD software to create a product design. D. Latisha is a Mechanical Engineer with a bachelor's degree. E. Oliver carefully calculates the dimensions of a product.

Answers

Answer:

A D E

Explanation:

I got it right on Edge.

Answer:

A D E

Explanation:

just did the work

:)))))

Question #5
Multiple Choice
Suppose this is your user-defined data type.
class player:
life = 3
magic = False
name = "
Which statement creates an instance of your data type?
O myPlayer = player()
O myPlayer.player()
O myPlayer = new player()
O myPlayer = player

Answers

Answer:  myPlayer = player()

Explanation: correct edge answer 2020

Answer: myPlayer = player()

Explanation: got it right on edgen

PLEASE HURRY!!
Look at the image below!

Answers

The answer would be 2&5 because this is correct
The answer should be 2&5 I’m not 100% sure on this but it makes the most sense

Which best describes what databases do?

They guarantee users find needed data.
They create categories for data.
They identify important data.
They enable users to search for data.

Answers

Answer:

I think the first one

Explanation:

not sure you can also do some research bout it

What is a resistor?
O A switch
O A light bulb
O A battery

Answers

Answer:

A Battery would be the correct awncer

Anyone know the logic notation of this following logic circuit?

Answers

Answer:

Concept: Logic Circuit

You have two variables A and B A and B go to the XOR logic command.B goes to the NOT operator Lastly the result of both XOR & NOT go to the OR operator Please rate positively and give brainlist

What do you mean by word-wrap?

Answers

Answer:

it is also know as line breaking

Explanation:

is breaking a section of text into lines so that it will fit into the available width of a page, window or other display area

Which part of project management considers if employees will work at home or in the office?

Analysis
Resources
Scope
Time

Answers

Answer:

i think its time

Explanation: you have to manage your time for the project and you wouldnt think of all the other things.

Answer: It might be resources because not everyone at home will have the same books, etc that is used in a project while making it.

Explanation:

8.10 Code Practice Question 3

Can someone please help cause this has me lost I took a picture of the question because that would be too much to try and type.

I’m sorry if the quality is bad I tried to get a good angle!

Answers

terms = ["Bandwidth", "Hierarchy", "IPv6", "Software", "Firewall", "Cybersecurity", "Lists", "Program", "Logic",

        "Reliability"]

def swap(arr, in1, in2):

   w = arr[in1]

   arr[in1] = arr[in2]

   arr[in2] = w

print(terms)

swap(terms, 5, 1)

swap(terms, 2, 4)

swap(terms, 3, 5)

swap(terms, 5, 6)

swap(terms, 6, 8)

swap(terms, 8, 9)

print(terms)

This is how I interpreted the question. If I need to make any changes, I'll do my best. Hope this helps though.

The program is an illustration of lists and list manipulation

Lists

Lists are variables that are used to hold multiple values in one variable name

Python Program

The program in Python, where comments are used to explain each line is as follows:

#This defines the swap function

def swap(arr, pos1, pos2):

    myList = arr[pos1]

    arr[pos1] = arr[pos2]

   arr[pos2] = myList    

#This initializes the list

terms = ["Bandwidth", "Hierarchy", "IPv6", "Software", "Firewall", "Cybersecurity", "Lists", "Program", "Logic", "Reliability"]

#This prints the list elements

print(terms)

#This swaps the second and the sixth list elements

swap(terms, 5, 1)

#This swaps the third and the fifth list elements

swap(terms, 2, 4)

#This swaps the fourth and the sixth list elements

swap(terms, 3, 5)

#This swaps the sixth and the seventh list elements

swap(terms, 5, 6)

#This swaps the seventh and the ninth list elements

swap(terms, 6, 8)

#This swaps the ninth and the tenth list elements

swap(terms, 8, 9)

#This prints the list elements

print(terms)

Read more about lists and list manipulations at:

https://brainly.com/question/24941798

A common error by beginning programmers is to forget that array subscripts start with ________.
a. 0
b. the number of elements in the array
c. spaces
d. 1

Answers

Answer:.

Explanation:

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Answers

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

James wants to create a web page where he can write two paragraphs of text. The first paragraph of text should be colored red and the
second blue. Which snippet of code show the principle behind how James creates this page?

Answers

Answer:

The first code does it

Explanation:

Each of the attached code snippet is divide into two parts.

The CSS partThe html part

From the four code snippets, the first one answers it.

The syntax to format the paragraph of an html text using css is:

p#paragraph-id{

color:color-name

}

Analysing each element

p# -> This implies that a paragraph is to be formatted

paragraph-id -> This represents the id of the paragraph

{} -> The open and close curly braces house the properties to be formatted

color:color-name -> implies that the color of the element be changed to color-name (e.g. red or blue)

In the body tag of the html code, the first paragraph has an id of para1 and the second has para2 as its id.

i.e. <p id = "para1">......

So, the first paragraph will be formatted red while the second will be blue

Imagine you're in charge of managing an annual fest at your school. You have to select students and assign them different tasks. Write a short essay on the qualities and traits you would be looking for while selecting students. Explain why you think these qualities and traits are important. Also, describe how the lack of such qualities and traits would affect the work.

Answers

Answer:

Quality traits are important in many ways. A persons traits identifies them of how they treat you or how you might treat them. It is important to find good working people for the job. For example if one student is good at a specific task I might put them in that task or if another is good at stocking shelves or finding books I might put them in the library to help students find books. It is important as a supervisor to find people that listen and follow instructions not people that mess around and are unorganized. These qualities and traits are important to see the real potential of the employees. Finding the right people for the job will help the school and you as the supervisor to manage these employees. Making a application or employment sheet will help to find the right people making a sheet with some questions and have the potential employees fill it out to find their traits and skills.

Explanation:

Sorry I didn't have much background information on what you wanted me to write hope this works you can edit and change stuff though.

Also run this through Grammarly's plagiarism tester to see if it is plagiarism!

put each sentence in the correct place please :)

Answers

the first image matches with the last sentence.

the second image (fireworks) match with the first sentence.

the third image (rocket) matches with sentence two.

and the last image matches the third sentence.

Answer:

sentence 1 -> picture in box 2

sentence 2 -> picture in box 3

sentence 3 -> picture in box 4

sentence 4 -> picture in box 1

which of the following types of correspondence is used to inform the reader of new information such as a policy change

Answers

Answer: Memo

Explanation: Have a good day, pls mark me brainliest <3

ASCII is a common format for the representation of characters in writing code. How many characters can be represented in the standard ASCII encoding

Answers

Answer:

A total of 128 characters can be represented in the standard ASCII encoding.

Explanation:

The American Standard Code for Information Interchange (ASCII) was created to make an international standard for encoding the Latin letters. In 1963, ASCII was received so data could be deciphered between PCs; speaking to lower and upper letters, numbers, images, and a few orders.

Since ASCII is encoded using ones and zeros, the base 2 number framework, it uses seven bits. Seven bits permits 2 to the power of 7 = 128 potential blends of digits to encode a character.

ASCII consequently ensured that 128 significant characters could be encoded.

Define watcher block

Answers

Answer:

Happens when you are watching a series / film / drama / etc. but can not retain the attention span to watch for long periods of time. As well as the shortened viewing time, the ability to retain what has been viewed is impaired.

Explanation:

The Block Watcher puts the power of a microprocessor to work analyzing the current feed to the rails. This detector has been designed to eliminate many of the installation problems associated with the installation of signal systems. ... Then connect the detector output switch to your signal system.

What are the two negative impacts of computer technology to the society?​

Answers

One negative is that people are getting very impatient. This is because people are getting used to things instantly coming up onto their screens. Another negative is that people are being manipulated more easily. Nowadays anyone can be an expert if they sound smart enough. Then they can spread their lies quickly to millions of people.

What is the first thing animators need to determine when beginning a project?



a Editing locations



b Length of the film or project



c Setting



d Characters

Answers

Answer:c

Explanation:

what class are you in?
can you help me in connection?

Answers

Answer:personal computer:)

Explanation:

Other Questions
I need help again!!!! A scholar surveyed educators to determine if there was correlation between age and holding a doctorate degree. The survey results are below: Have a doctorate Do not have a doctorate 30 or younger 10 25 Older than 30 14 22 How many educators have a doctorate and are older than 30? Circle A has a radius of 9 centimeters and Circle B has a diameter of 19 centimeters. What is the relationship between the circumferences of Circle A and Circle B? 1What is the y-intercept of a line that has a slope of 4 and passes through point (8, 3)?3 11 owo help me plz *smiles* thanks The direction of electrical force is based on the fact that like charges will In 1992, Jason bought a gallon of gas for $1.18. Yesterday, he bought a gallon of gas for $2.17. What is the percentage increase in the price of a gallon of gas from 1992 to yesterday? If necessary, round to the nearest tenth of a percent.A. 83.9%B. 16.1%C. 45.6%D. 54.4% Which of the following statements best describes the economies of the North and South?A). The North had an industrial economy and the South had an agricultural economyB). The North had a mixed economy and the South had an economy based on slave importsC). The North had an economy based in shipping and the South had an industrial economyD). The North had an agricultural economy and the South had an industrial economy What happens to the graph of f(x) when it is multipliedby a number between 0 and 1? Can someone tell me which are non linear and which are linear for these three ? Ill give brainliest asap Bc+ad=b solve for a In which of these systems is the government most likely to provide people with goods and services they could not otherwise afford?A. a market economyB. a socialist economyC. a traditional economyD. a free-enterprise economy What is 6 to the power of 7 divided by 6 to the power of 5, in index form? Find the area of the irregular figure.2 in.3 in.5 in.A = [ ? ]in.23 in.2 in.4 in.4 in. what is life part 3 ..................................................... Which statements are true? Select 4 options.A class variable can be a different type of class.A class variable can be a list of instances of a different class.An instance of a class cannot be changed after it is created.Functions defined in a class are called methods.Variables defined in the constructor of a class can be accessed by the main program that uses instances of the class. 10. The technology used to weave patterns into cloth inspired the future creation of computer data storage and retrievalTrue or false?! I JUST NEED HELP!!!!Which group or groups of atoms are the only atoms with f orbitals?Question 10 options:A) All noble gasesB) All atoms heavier than barium (Ba)C) All atoms heavier than krypton (Kr)D) Lanthanides and actinides How much active ingredient would you weigh to make 100ml of a 50% solution? Find the unit rate. Round to the nearest hundredth, if necessary.$5.99 for 12 lb