Which of the following web design software would allow the web designer to create videos?
A. FTP
B. Text editor
C. Storyboard
D. Flash

Answers

Answer 1

Answer: FTP

Option A.

Explanation:

Answer 2

The answer is D. Flash.


Related Questions

you are the network administrator for contoso. your company's network contains an active directory domain containing a user named user1. all computers in the domain run windows 10. you enable windows powershell remoting on the computers. you need to ensure that user1 can access and schedule logging of performance counters. the solution must use the principle of least privilege. to which group should you add user1?

Answers

Right-click contoso.com in the Directory Users and Devices window. An Directory domain with the name contoso.com is present on your network.

What is the purpose of PowerShell?

PowerShell is frequently used as a scripting to automate system management. In CI/CD setups, it is frequently used to create, test, and publish solutions as well. Built atop the. NET Common Language Framework is PowerShell (CLR).

What makes PowerShell so well-liked?

It's a distinctive feature that gives IT specialists the ability to remotely automate and carry out unique operations on any Windows PC connected to the corporate network. The best part is that by simply typing a piece of control code, PowerShell gives IT administrators complete control and visibility of each of those network capacity.

To know more about powershell visit:

https://brainly.com/question/29835395

#SPJ4

scarlet is developing a system compliant with the pci dess. waht type of information sithe most likely type she want sto protect

Answers

Organizations that process, store, or transport cardholder data are subject to the PCI DSS set of security standards. It addresses issues including malware prevention, firewalls, authentication, encryption, and incident response.

What is PCI DSS?For businesses that deal with branded credit cards from the main card brands, the Payment Card Industry Data Security Standard (PCI DSS) is a security standard for information.The Payment Card Industry Security Standards Council is in charge of enforcing the PCI Standard, which is imposed by the card companies. In order to tighten safeguards over cardholder data and decrease credit card fraud, the standard was developed.Annual or quarterly [better source needed] validation of compliance is carried out using a technique appropriate to the volume of transactions processed.Assessor of Self-Assessment Questionnaire (SAQ) for Internal Security particular to Firm (ISA)Independent Security Assessor (QSA)Twelve requirements are listed in the PCI Data Security Standard, and they are grouped into six logically linked categories termed "control objectives."

To learn more about PCI DSS refer to:

https://brainly.com/question/28335079

#SPJ4

what are some challenges that existing data centers face as they move toward supporting cloud computing? group of answer choices increased it labor costs to manager the cloud environment. greater energy consumption for the same load of applications.

Answers

As long as you have internet connectivity, cloud computing enables you to access resources, data, services, and applications from anywhere.

What is cloud computing?

Simply described, cloud computing is the distribution of computing services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence, in order to provide speedier innovation, adaptable resources, and scale economies.

Here are the main challenges facing cloud computing, in brief:

concerns with cyber security.

cost containment and management.lacking in resources or knowledge.Governance/Control.Compliance.managing several clouds.Performance.creating a private cloud.

Here, there are a number of important difficulties that need to be addressed, including lengthy troubleshooting, application unavailability, migration agents, and cutover complexity.

As long as you have internet connectivity, cloud computing enables you to access resources, data, services, and applications from anywhere. Some tools and strategies will enable you to access information even if you are not connected to the internet.

To learn more about cloud computing refer to:

https://brainly.com/question/19057393

#SPJ4

how many bits will you need to borrow from the host portion to create the required number of subnets? (each bit borrowed doubles the number of subnets.) 2. how many subnets will you create (2 to the power of the number of borrowed bits)? 3. what is the subnet mask for your new subnetted networks? 4. what is the total number of host addresses per subnet (2 to the power of the number of un- borrowed bits)? 5. how many host addresses per subnet are available for devices (the answer to the above question minus 2) 6. build the network ip address scope. if there are more than 8 subnets, show the first 8 and the last one. if there are 8 or fewer subnets, show all subnets. do not show more subnets than you need.

Answers

We can build twice as many subnets when we borrow a host bit, so if we borrow two host bits, we can create four subnets. The number of subnets you can build doubles for every host bit you "steal." 128 + 64 = 192 is the binary to decimal conversion. A new subnet mask of 255.255 will be used.

What is meant by decimal?

The accepted method for representing both integer and non-integer numbers is the decimal numeral system. It is the expansion of the Hindu-Arabic numeral system to non-integer values.A decimal numeral refers broadly to the notation of a number in the decimal numeral system (also frequently merely called a decimal or, less accurately, a decimal number). A decimal separator can occasionally be used to identify decimals (usually "." or "," as in 25.9703 or 3,1415).As in "3.14 is the approximate value of to two decimals," "decimal" may also refer specifically to the digits that follow the decimal separator. The function of zero-digits following a decimal separator is to denote the accuracy of a value.

To learn more about decimal refer to

https://brainly.com/question/26090574

#SPJ4

Other Questions
what is the length of the y component shown below? you are called to a 'patient down' at a private residence. as you get inside and into the back bedroom, you can see that there is a woman face down and motionless. she does not appear to be conscious and there is a pool of saliva next to her head. your partner maintains spinal precautions as you roll her onto her back. the husband states that she has a history of heart problems, takes a lot of medications, and has no allergies. what would you do next? What is the fourth root of 625 __________ rules refer to culturally sanctioned regulations about what emotions are appropriate to show in a given situation.a. Hedonicb. Contextualc. Displayd. Affective when everyone chooses their best response to the choices that other players are making, we call the outcome . Use the excerpt and your knowledge of social studies to answer the following question.Dear Brother, . . . Houses are very sorry in this country for it is a considerable job to build a cabin owing to the timber being so scarce and plank is out of the question. The people use what they call puncheon which is ash saplings split open and laid down for floors. . . . a man can raise as many cattle as he pleases without feeding them at all and can kill fat beeves anytime in the winter. . . . The grass is now green . . . Excerpt from a letter written by C. Baker in 1853. Switzer, David. Its Our Dallas County. 1954.The excerpt above describes which era in Texas history?A Spanish Colonial B Revolution and Republic C Early Statehood D Civil War and Reconstruction how many bits will you need to borrow from the host portion to create the required number of subnets? (each bit borrowed doubles the number of subnets.) 2. how many subnets will you create (2 to the power of the number of borrowed bits)? 3. what is the subnet mask for your new subnetted networks? 4. what is the total number of host addresses per subnet (2 to the power of the number of un- borrowed bits)? 5. how many host addresses per subnet are available for devices (the answer to the above question minus 2) 6. build the network ip address scope. if there are more than 8 subnets, show the first 8 and the last one. if there are 8 or fewer subnets, show all subnets. do not show more subnets than you need. What is the original issues leading to the French and Indian war of 1763? when kendra challenged her friends on their prejudicial thinking, she was rejected by her group and no longer gets invitations to go out with them. this is a consequence of . please select all of the locations where coccidioidomycosis is endemic.check all that apply semi-arid desert areas semi-arid desert areas the western hemisphere the western hemisphere the south atlantic states of the united states the south atlantic states of the united states the mississippi and ohio river drainage areas of the united statesthe mississippi and ohio river drainage areas of the united states Wright Construction specializes in the construction of communications towers for various cell carriers. On one of the companys recent projects, there was one fatality. Workers have reported several injuries since then. In light of this situation, the company is redoubling its efforts to prevent accidents, also known as industrial hygiene. Name three potentially fatal accidents that could occur during the construction of a communication tower and the corresponding health effects workers might experience (acute, chronic, local, or systemic). Also, identify the corresponding OSHA standard that would help the company prevent the accident from occurring, including any relevant personal protective equipment. Constitution is said to have beautiful features, but . . . they appear to me horribly frightful. . . . Your President may easily become king. . . . If your American chief be a man of ambition and abilities, how easy it is for him to render himself absolute! In what way do Henrys words show an Antifederalist point of view? A nurse is caring for a client who has an indwelling urinary catheterA. Initiate fluid resuscitation. B. Medicate for pain. C. Insert an indwelling urinary catheter. D. Maintain the airway. a process focused on the identification and location of porential evidence related to a specefic legal action after it was collce What is the capital city of France? canadian-american reciprocity treaty buchanan-pakenham treaty hay-herbert treaty convention of 1818 webster-ashburton treaty. t/f Order the steps that occur as a protein is synthesized within a cell and finally excreted for use outside of the cell. perceiving the color, motion, and form of a bird in flight illustrates a. parallel processing. %. opponent-process theory. q. trichromatic theory. d. serial processing. place theory. Please help asap! Also explain how you did it... Tys m! If you vertically compress the absolute value parent function, F(x) = |x|, by multiplying by 3/4, what is the equation of the new function?A. G(x) = | 3/4 x |B. G(x) = |x| - 3/4 C. G(x) = 3/4 |x|D. G(x) = | x + 3/4 |