Computer data that is suitable for sound​

Answers

Answer 1

Answer:

Answer:In this context sound data is stored and transmitted in an analog form. Since computers represent data in digital form, (as bits and bytes) the


Related Questions

Please draw the dynamic array stack structure (you must mention the size and capacity at each step) after the following lines of code are executed. You should assume that the initial capacity is 2 and a resize doubles the capacity.

values = Stack()
for i in range( 16 ) :
if i % 3 == 0 :
values.push( i )
else if i % 4 == 0 :
values.pop()

Answers

Answer:

Explanation:

dxfcgvhb

cloud offers better protection compare to on premise?​

Answers

Why is cloud better than on-premise? Dubbed better than on-premise due to its flexibility, reliability and security, cloud removes the hassle of maintaining and updating systems, allowing you to invest your time, money and resources into fulfilling your core business strategies.

The security of the cloud vs. on-premises is a key consideration in this debate. Cloud security controls have historically been considered less robust than onprem ones, but cloud computing is no longer a new technology. . A company running its own on-premises servers retains more complete control over security.

Believe it!!

Pls follow me.

python is an example of a low level programming language true or false?​

Answers

False- python is an example of a high level language. Other high levels are c++, PHP, and Java

with the aid of examples explain the differences between open source software and licensed software​

Answers

Answer:

Explanation:

Source is when a company go no limits to run the software but can easily be taken done by a complaint or two or a bug while a licensed it a protected version of the software.

Give minimum computers configuration that can be used by a law firm.​

Answers

Answer:

Processor: Intel i3, i5, or i7 processor or equivalent. Memory: 8 GB or more. Hard Disk Storage: 500 GB or more. Display: 13-inch or larger.

Explanation:

The lowest computers configuration that can be used are:

Operating System: such as MacOS 10.14. Windows 10 or higher version.Processor: such as Intel i3, i5, or i7 processor or others.Memory: 8 GB and more.Hard Disk Storage: 500 GB and more.Display: such as 13-inch or more.

What is  Configuration of a system?

This is known to be the ways that the parts are said to be arranged to compose of the computer system.

Note that in the above case, The lowest computers configuration that can be used are:

Operating System: such as MacOS 10.14. Windows 10 or higher version.Processor: such as Intel i3, i5, or i7 processor or others.Memory: 8 GB and more.Hard Disk Storage: 500 GB and more.Display: such as 13-inch or more.

Learn more about computers from

https://brainly.com/question/26021194

#SPJ9

different types of computer and state the major difference between them​

Answers

Answer:

computers system may be classified according to their size.

four types of computers are;

microcomputers / personal computers- micro computers are also called personal computers which is PC this computer came in different shapes size and colors. a personal computers are designed to be used by one person at a time.

some examples of the computer are;

laptopdesktopa palmtopa work station

2. mini computers- mini computers are sometimes called mid-range computers which are more powerful than microcomputers and can support a number of users performing different tasks, they were originally developed to perform specific tasks such as engineering calculations.

3. Mainframe computers- Mainframe computers are larger systems that can handle numberous users, store large amounts of data and process transaction at a high rate. these computers are expensive and powerful.

4. super computers- super computers are the most largest, fastest and most powerful computer. this systems are able to process hundreds of million of instructions per second they are used for job requiring and long complex calculation.

3. Using Assume the following list of keys: 36, 55, 89, 95, 65, 75, 13, 62, 86, 9, 23, 74, 2, 100, 98 This list is to be sorted using the quick sort algorithm as discussed in this chapter. Use pivot as the middle element of the list. a. Give the resulting list after one call to the function partition. b. What is the size of the list that the function partition partitioned

Answers

Answer:

a. 36, 55, 13, 9, 23, 2, 62, 86, 95, 65,74, 75, 100, 98, 89

b. 15

Explanation:

An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two of the websites share the domain name but have different subdomain prefixes.
Which of the following SSL certificates should the administrator purchase to protect all the websites and be able to administer them easily at a later time?
A . One SAN certificate
B . One Unified Communications Certificate and one wildcard certificate
C . One wildcard certificate and two standard certificates
D . Five standard certificates

Answers

Answer:

Option A (One SAN certificate) is the right answer.

Explanation:

A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.

Other alternatives are not connected to the given scenario. Thus the above option is correct.

tinh S(n) = 1+2+3+.....+n

Answers

Answer:

-1/12

Explanation:

[tex]\sum_{k=0}^{k=n} k = \frac{n(n+1)}{2}\\[/tex]

look up the derivation by Srinivasa Ramanujan for a formal proof.

Java there are n coins each showing either heads or tails we would like all the coins to form a sequence of alternating heads and tails what is the minimum number of coins that must be reversed to achieve this

Answers

El número mínimo de monedas que se deben invertir para lograr esto:

45 moas

The basic idea behind DNSSEC is a. providing name resolution from a hostname to an IP address b. ensuring that only local authoritative nameservers have the authorization to contact nameservers higher in the hierarchy (i.e., TLD nameservers, root nameservers) c. encrypting each DNS response so that it cannot be read by a third-party d. authenticating that the data received in a DNS response is the same as what was entered by the zone administrator (i.e., the response has not been tampered with)

Answers

Answer:

authenticating that the data received in a DNS response is the same as what was entered by the zone administrator

outline three difference each of a raster filled and vector file​

Answers

Answer:

Unlike raster graphics, which are comprised of colored pixels arranged to display an image, vector graphics are made up of paths, each with a mathematical formula (vector) that tells the path how it is shaped and what color it is bordered with or filled by.

Explanation:

Over-activity on LinkedIn?

Answers

Answer:

Being over-enthusiastic and crossing the line always get you in trouble even if you’re using the best LinkedIn automation tool in the world.  

When you try to hit the jackpot over the night and send thousands of connection requests in 24 hours, LinkedIn will know you’re using bots or tools and they will block you, temporarily or permanently.    

This is clearly against the rules of LinkedIn. It cracks down against all spammers because spamming is a big ‘NO’ on LinkedIn.    

What people do is that they send thousands of connection requests and that too with the same old spammy templates, “I see we have many common connections, I’d like to add you to my network.”    

It will only create spam.    

The LinkedIn algorithm is very advanced and it can easily detect that you’re using a bot or LinkedIn automation tool and you’ll be called out on it.

If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to a group? What commands would you use? What configuration files would you check and modify?

Answers

Following are the responses to this question:

The user account is "olivia".In the Linux system to see the account go to the "/home directory".For the configuration file we use ".bash_logout , .bash_profile, and .bashrc" files.

Creating users:

We will use the useradd command to achieve this. Using that same command, you can create users who would log in or customers who would log in (in the case of creating a user for a software installation).

In its basic form, the command is as follows:

[Options] useradd username

Take this user olivia, for instance. Assuming that you had been to issue the command prompt:

olivia has become a user.

Users are added to the system without the need for a home directory and are unable to log on. It if we were using this rather than running the command without arguments?

sudo using useradd -m olivia

Using the command above, a new user would be created, including a home directory that corresponded to the username. That means that you might now see the name "olivia" in the directory "/home".

But what about the lockout concern that was raised earlier? Both these methods are possible. After creating the user, you can enter the following command:

Password for olivia is: sudo passwd olivia

You'll be requested to enter & verify your new password once you've completed the process. This unlocks the user profile, allowing them to log in.

This command might look like if you wanted to accomplish it in one go:

sudo useradd -m olivia -p PASSWORD

You should be using Passcodes as the login for the user olivia.

As soon as the user logs in, he or she can update their account password by using the password command to input their current password, and afterward entering/verifying their new one.

To create a user that has no personal account and cannot log in, execute the following instructions:

sudo use useradd as  the-M USERNAME ​sudo use usermod as the -L USERNAME

The user to be added is identified by USERNAME.

It establishes a user with really no root folder and prevents them from signing in with a second operation.

To add an existing user to a group on Linux, follow the instructions:

As root, log in to your accountUse the useradd instruction to add a new user (for example, useradd roman)If you'd like to log on as a new customer, type su plus that user's name.Entering the word "exit" will logout you from your account.

Another way to add a user to a group under Linux would be to use the following syntax:

Alternatively, you can use the usermod command.The name of the club should be substituted for example group in this sentence.Example username should be replaced with the name of the user you'd like added.

The following operations are performed when a new login is added to the system.

The user's home directory (/home/username by default) is now created.To set configuration files for the user's session, the following secret files are copied into another user's home directory.

.bash_logout

.bash_profile

.bashrc

/var/spool/mail/username includes the user's mail spool.The new user account is arranged in groups with the same name.

Learn more:

Linux system: brainly.com/question/13843535

Illustrate why sally's slide meets or does not not meet professional expectations?

Answers

Your missing info to solve this

Tuesday
write the
correct
answer
Text can be celected using
2 A mouse
device of
is
ch
3 Scrolls bars are
buttons which assist
upwards downwards
sideways to
skole

Answers

Answer:

?

Explanation:

these are instructions to a question?

Write a program that uses linear recursion to generate a copy of an original collection in which the copy contains duplicates of every item in the original collection. Using linear recursion, implement a function that takes a list as user-supplied runtime input and returns a copy of it in which every list item has been duplicated. Given an empty list the function returns the base case of an empty list.

Answers

Answer: b

Explanation:

Program using linear recursion to duplicate items in a list:

def duplicate_list(lst):

   if not lst:

       return []

   else:

       return [lst[0], lst[0]] + duplicate_list(lst[1:])

# Example usage

user_input = input("Enter a list of items: ").split()

original_list = [item for item in user_input]

duplicated_list = duplicate_list(original_list)

print("Duplicated list:", duplicated_list)

How can a program use linear recursion to duplicate items in a list?

By implementing a function that utilizes linear recursion, we can create a copy of an original list with duplicated items. The function duplicate_list takes a list lst as input and checks if it is empty. If the list is empty, it returns an empty list as the base case.

Otherwise, it combines the first item of the list with itself and recursively calls the function with the remaining items (lst[1:]). The duplicated items are added to the resulting list. This process continues until all items in the original list have been duplicated and the duplicated list is returned.

Read more about linear recursion

brainly.com/question/31313045

#SPJ2

] Write a Java program to build an integer HashSet from scratch without using any built-in hash libraries. Your program should include these functions: a. insert (value): Insert any integer of your choice into the HashSet. b. contains(value) : Check the HashSet for the "value". Return "True" if the particular integer exists in the HashSet else return "Hey Nothing there".

Answers

Answer:

Explanation:

The program was written in Java, it created the HashSet and the two seperate functions. Each of the functions uses the created HashSet and input values from the user to perform the appropriate actions on the HashSet. While also returning or printing the values if needed. The program has been tested and can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below as well.

Suppose a Huffman tree is to be built for 5 characters. Give a set of 5 characters, and their distinct probabilities (no duplicates), that would result in the tallest possible tree. Show the tree. Derive the average code length: write the expression, you don't have to simplify it down to a single value.

Answers

I love chipotle do you live chipotle

Write a program that uses input to prompt a user for their name and then welcomes them. Note that input will pop up a dialog box. Enter Sarah in the pop-up box when you are prompted so your output will match the desired output.

Answers

user_name = str (input = ("Please enter your name: "))

def greet (user_name):

print ("Welcome to your ghetto, {0}!".format(user_name) )

You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its weight, screen size and price. You consider a number of different models, and narrow your list based on its speed and monitor screen size, then finally select a model to buy based on its weight and price. In this decision, speed and monitor screen size are examples of:_______.
a. order winners.
b. the voice of the supplier.
c. the voice of the customer.
d. order qualifiers.

Answers

In this decision, speed and monitor screen size of a laptop are examples of a. order winners.

What is a laptop?

A laptop can be defined as a small, portable computer that is embedded with a keyboard and mousepad, and it is usually light enough to be placed on an end user's lap while he or she is using it to work.

What are order winners?

Order winners are can be defined as the aspects of a product that wins the heart of a customer over, so as to choose or select a product by a specific business firm. Some examples of order winners include the following:

SpeedMonitor screen sizePerformance

Read more on a laptop here: https://brainly.com/question/26021194

Calculate the total time required to transfer a 500KB file in the following cases. Assume an RTT of 50ms, a packet size of 2KB, and an initial 2xRTT of handshaking before data is sent. A. If the bandwidth is 2Mbps, what is the Bandwidth-Delay Product (BDP)

Answers

Answer:

i) Total time = 2457.73 secs

ii) BDP = 0.01 Mbyte

Explanation:

Packet size : 2 Kb = ( 2 * 8192 ) bits = 16384 bits

Bandwidth : 2Mbps = 2,000,000 bits/sec

RTT = 50 ms = 0.050 secs

i) Determine total time required to transfer 500 kB

= Initial handshake + Time for transmission of all files + propagation delay

= 2 x RTT +  Time for transmission + RTT /2

Total time = ( 2 * 0.05 ) +  (1500 * 1.6384 )+ ( 0.050 / 2 ) = 2457.73 secs

ii) Determine the Bandwidth-delay product

= data link capacity * RTT

= 2 Mbps  * 50 ms =  100,000 =  0.01 MByte

Write an algorithm to solve general formula? ​

Answers

Answer:

2+2=4

Explanation:

simple math cause of that bubye

You are consulting with another medium sized business regarding a new database they want to create. They currently have multiple normalized source databases that need consolidation for reporting and analytics. What type of database would you recommend and why

Answers

Answer:

The enormous amount of data and information that a company generates and consumes today can become an organizational and logistical nightmare. Storing data, integrating it and protecting it, so that it can be accessed in a fluid, fast and remote way, is one of the fundamental pillars for the successful management of any company, both for productive reasons and for being able to manage and give an effective response to the customers.

Good big data management is key to compete in a globalized market. With employees, suppliers and customers physically spread across different cities and countries, the better the data is handled in an organization, the greater its ability to react to market demand and its competitors.

Databases are nowadays an indispensable pillar to manage all the information handled by an organization that wants to be competitive. However, at a certain point of development in a company, when growth is sustained and the objective is expansion, the doubt faced by many managers and system administrators is whether they should continue to use a database system, or if they should consider the leap to a data warehouse. When is the right time to move from one data storage system to another?

You are the network administrator for the ABC Company. Your network consists of two DNS servers named DNS1 and DNS2. The users who are configured to use DNS2 complain because they are unable to connect to internet websites. The following shows the configuration of both servers:

Server Configurations:

DNS1: _msdcs.abc.comabc.com
DNS2: .(root)_msdcs.abc.comabc.com

The users connected to DNS2 need to be able to access the internet. What should be done?

Answers

Answer:

ABC Company

The action to take is to:

Delete the .(root) zone from the DNS2.  Then configure conditional forwarding on the DNS2 server.  If this is not done, the users will be unable to access the internet.

Explanation:

DNS forwarding enables DNS queries to be forwarded to a designated server, say DNS2, for resolution according to the DNS domain name.  This stops the initial server, DNS1, that was contacted by the client from handling the query, thereby improving the network's performance and resilience and enabling the users to be connected to the DNS2 in order to access the internet.

write a programmimg code in c++ for school based grading system, the program should accept the subject in the number of students from a user and store their details in the array of type student(class) the student class you have:
1. number student name, index number remarks as variables of type string, marks as integer and grade as char.
2. avoid function called getData which is used to get student details
3. avoid function called calculate which will work on the marks and give the corresponding great and remarks as given below on
Marks 70-100 grade A remarks excellent Mark 60-69 Grade B remarks very good marks 50-59 grade C remarks pass maths 0-49 grade F remarks fail​

Answers

Answer:

The program is as follows:

#include <iostream>

#include <string>

using namespace std;

class Student{

string studName, indexNo, remarks; int marks;  char grade;

public:

 void getData(){

     cin.ignore();

     cout<<"ID: "; getline(cin,indexNo);

  cout<<"Name:"; getline(cin,studName);

  cout<<"Marks: ";cin>>marks;  }

 void calculate(){

  if(marks>=70 && marks<=100){

      remarks ="Excellent";       grade = 'A';   }

  else if(marks>=60 && marks<=69){

      remarks ="Very Good";       grade = 'B';   }

  else if(marks>=50 && marks<=59){

      remarks ="Pass";       grade = 'D';   }

  else{

      remarks ="Fail";       grade = 'F';   }

  cout << "Grade : " << grade << endl;

  cout << "Remark : " << remarks << endl;  }

};

int main(){

int numStudents;

cout<<"Number of students: "; cin>>numStudents;

Student students[numStudents];

for( int i=0; i<numStudents; i++ ) {

 cout << "Student " << i + 1 << endl;

 students[i].getData();

 students[i].calculate(); }

return 0;}

Explanation:

This defines the student class

class Student{

This declares all variables

string studName, indexNo, remarks; int marks;  char grade;

This declares function getData()

public:

 void getData(){

     cin.ignore();

Prompt and get input for indexNo

     cout<<"ID: "; getline(cin,indexNo);

Prompt and get input for studName

  cout<<"Name:"; getline(cin,studName);

Prompt and get input for marks

  cout<<"Marks: ";cin>>marks;  }

This declares funcion calculate()

 void calculate(){

The following if conditions determine the remark and grade, respectively

  if(marks>=70 && marks<=100){

      remarks ="Excellent";       grade = 'A';   }

  else if(marks>=60 && marks<=69){

      remarks ="Very Good";       grade = 'B';   }

  else if(marks>=50 && marks<=59){

      remarks ="Pass";       grade = 'D';   }

  else{

      remarks ="Fail";       grade = 'F';   }

This prints the grade

  cout << "Grade : " << grade << endl;

This prints the remark

  cout << "Remark : " << remarks << endl;  }

};

The main begins here

int main(){

This declares number of students as integer

int numStudents;

Prompt and get input for number of students

cout<<"Number of students: "; cin>>numStudents;

This calls the student object to declare array students

Student students[numStudents];

This is repeated for all students

for( int i=0; i<numStudents; i++ ) {

Print number

 cout << "Student " << i + 1 << endl;

Call function to get data

 students[i].getData();

Call function to calculate

 students[i].calculate(); }

return 0;}

Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickel, and 2 pennies. That is 27=1*25+0*5+2*1.
Example program run 1:
Enter number of cents: 185
Pennies: 0
Nickels: 0
Dimes: 1
Quarters: 7
Example program run 2:
Enter number of cents: 67
Pennies: 2
Nickels: 1
Dimes: 1

Answers

Answer:

The program in Python is as follows:

cents = int(input("Cents: "))

qtr = int(cents/25)

cents = cents - qtr * 25

dms = int(cents/10)

cents = cents - dms * 10

nkl = int(cents/5)

pny = cents - nkl * 5

print("Pennies: ",pny)

print("Nickels: ",nkl)

print("Dimes: ",dms)

print("Quarters: ",qtr)

Explanation:

The program in Python is as follows:

cents = int(input("Cents: "))

This calculate the number of quarters

qtr = int(cents/25)

This gets the remaining cents

cents = cents - qtr * 25

This calculates the number of dimes

dms = int(cents/10)

This gets the remaining cents

cents = cents - dms * 10

This calculates the number of nickels

nkl = int(cents/5)

This calculates the number of pennies

pny = cents - nkl * 5

The next 4 lines print the required output

print("Pennies: ",pny)

print("Nickels: ",nkl)

print("Dimes: ",dms)

print("Quarters: ",qtr)

Write a program that reads a list of 10 integers, and outputs those integers in reverse. For coding simplicity, follow each output integer by a space, including the last one. Then, output a newline. coral

Answers

def reverse_list (num_list):

try:

if num_list.isdigit() == True:

return num_list[::-1]

elif num_list < 0:

return "Negative numbers aren't allowed!"

except ValueError:

return "Invalid input!"

user_list = list (int (input ("Please enter ten random positive numbers: " )))

print (reverse_list (user_list))

Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

Answer:

void stringReverse(string s, int start){

   if(s[start]=='\0'){

       return;

   }

   else{

       stringReverse(s.substr(1,s.length()-1),start+1);

       cout<<s[start];

   }

}

Explanation:

please give me correct answer

please give me very short answer​

Answers

Answer:

1.A table is a range of data that is defined and named in a particular way.

2.Table tools and layout

3.In insert tab Select the table and select the number of rows and colums

4.Split cell is use to split the data of a cell.Merge cell is used to combine a row or column of cells.

5.Select the cell and click down arrow next to the border button.

Other Questions
Find the least positive integer, written only by numbers 0, 1 and 2, which is divisible by 225. How did the era of Westward Expansion and Industrialization transform American culture and force Americans to confront traditional understandings of freedom and equality The value of Tonya's car is $21,000. The car's value depreciates at a rate of 15% per year.Which function represents the value of the car after t years?f(t)=0.85(21,000)tf(t)=1.15(21,000)tf(t)=21,000(0.85)tf(t)=21,000(1.15)t 6. In a toy factory, 200 wooden closed cylinders of diameter 35 mm and height 7 cm have to be painted. What is the total surface area, in cm, that needs to be painted? (Take pi to be 3.142.) 7. A tank in the shape of a cylinder of diameter 2.4 m and height 6.4 m contains oil to the brim. Find the number of complete cylindrical containers of base radius 8.2 cm and height 28 cm which can be filled by the oil in the tank.Please help with the 2 questions. thank you!!Unhelpful answer will be deleted Correct answer + with explanation will be chosen as the Brainliest Answer which element can help you identify the theme of a story Give the following reaction: ammonium nitrate> dinitrogen monoxide + water. a.) Write a complete balanced chemical equation. b.) Calculate the number of molecules of water produced by 11.2g of ammonium nitrate What is spider mans type of mutation ? what is the answer to this? Ammonia is produced by the reaction of nitrogen and hydrogen: N2(g) + H2(g) NH3(g)(a) Balance the chemical equation. (b) Calculate the mass of ammonia produced when 35.0g of nitrogen reacts with hydrogen. 10-10A. Exponential growthB. Linear increasingC. Exponential decayD. Linear decreasing Protein digestion begins in the ________; fat digestion begins in the ________. Stomach; small intestine Mouth; stomach Esophagus; stomach Small intestine; small intestine Small intestine; large intestine What has the job is to interpret laws and punish lawbreakers?A. Judicial BranchB. Executive BranchC.Legislative Branch Mr. Benton had better watch out for that new assistant bf his. He's a one. O a. bright O b. crafty O c. clever Which of the following choices can change the meaning of a sentence?personificationmnemonicsinflection .Unlike a theory, a scientific law describes an observed pattern without attempting to _____ it.explainprovetestverify describe how and where each typeweathering, erosion, or deposition occurs What is the area of area of 7 meters, 15 meters and 9 meters? Which occupation is an example of a civil service position?A. doctorB. police officerC. lawyerD. web designer Choose the sentence that has correct parallel structure,A. The kids who got the sickness first were the kids who had thesickness the longest,B. Misery, sickness, and exhaustion entered my house,C. My housed was invaded by some strange illness, followed bymisery, and in the end, we were all exhausted,D. None of the above are correctHelp ???? 7. Draw an equilateral triangle of side 6.5 cm and after locating its circumcentre. Draw its circumcircle. send it with image