Danielle wants to record a voice-over to add to a presentation. Other than a microphone, what does danielle need to record the audio?.

Answers

Answer 1

Answer:

Sound recorder software

Explanation:


Related Questions

For email links, use anchor elements to link to an email address by including the href attribute followed by?

Answers

For email links, use anchor elements to link to an email address by including the href attribute followed by mailto: and then the email address.

What are anchor elements used for?

The anchor element is known to be one that is often used to make hyperlinks that tend to between a source anchor and that of a destination anchor.

Note that the source is said to be the text, image, as well as the button that connect to another resource and the destination is seen as the resource that the source anchor tends to connect to.

Therefore, For email links, use anchor elements to link to an email address by including the href attribute followed by mailto: and then the email address.

Learn more about anchor elements from

https://brainly.com/question/11526390

#SPJ1

For email links, use anchor elements to link to an email address by including the href attribute followed by _____ and then the email address.

The nurse is reviewing a client's history, which reveals that the client is participating in a psychiatric rehabilitation program. the nurse understands that which is the goal of this program?

Answers

The client is enrolled in a mental rehabilitation programme, the nurse discovers while analyzing the client's history. The nurse is aware that clients should be empowered to participate in this programme at their best level of functioning.

What is a psychiatric rehabilitation program?

A psychiatric rehabilitation programme, or PRP for short, aims to provide people with mental illnesses with a range of services, treatments, and supports. These programmes seek to improve patients' quality of life, recovery, and results while successfully integrating them with social and community services.

People with serious and persistent mental diseases must develop the emotional, social, and intellectual skills essential to live, learn, and work in society with the least amount of professional support possible (1).

A crucial component of a mental health care is psychiatric rehabilitation. For individuals who have been diagnosed with any mental health disease that seriously hinders their capacity to lead meaningful lives, it encourages recovery, community integration, and enhances quality of life.

To learn more about psychiatric rehabilitation program, refer to:

https://brainly.com/question/25818042

#SPJ4

To which state does a process move when the cpu scheduling algorithm determines it may next use the cpu?

Answers

When a process is in Running state, it may be moved by the CPU scheduling algorithm when it is determined that the process may next use the CPU. This can happen for a variety of reasons, including when the process is preempted by another process or when the process itself voluntarily relinquishes the CPU.

There are two types of process Scheduling algorithms- those that preempt running processes, and those that don't. The preemptive scheduling algorithms are further classified as either voluntary or involuntary.

Voluntary algorithms allow a process to voluntarily relinquish the CPU before its time slice is complete- usually in response to an event like an I/O completion. Involuntary algorithms preempt a running process and move it to a waiting state when another process needs the CPU.

The most common involuntary algorithms are priority-based. A process with a higher priority is given the CPU first, regardless of when it last ran. If two processes have the same priority, then the process that has been waiting the longest is given the CPU next.

Learn more here:

https://brainly.com/question/14400616

#SPJ4

What routing protocol must be used to support dynamic routing when using windows server 2016 and ipv6 routing?

Answers

Border Gateway Protocol routing protocol must be used to support dynamic routing when using windows server 2016 and ipv6 routing.

The Border Gateway Protocol (BGP) routing protocol is a key ingredient in supporting dynamic routing when using Windows Server 2016 and IPv6 routing. BGP is a standards-based protocol that enables routers to exchange routing information so that they can make informed decisions about the best paths to reach destination networks.

BGP is the de facto standard for inter-domain routing and is the only routing protocol that can be used to support dynamic routing in Windows Server 2016. When configuring BGP, you must specify a number of parameters, such as the AS number, router ID, and other BGP attributes.

BGP is a complex protocol, but it is essential for supporting dynamic routing in Windows Server 2016. By configuring BGP, you can ensure that your network can take advantage of the latest IPv6 routing features and capabilities.

Learn more on Border Gateway Protocol here:

https://brainly.com/question/28446917

#SPJ4

If you want to become a digital citizen you only have to buy a piece of technology.
a. true
b. false

Answers

If you want to become a digital citizen you only have to buy a piece of technology is a false statement.

What does it means to be a digital citizen?

Digital Citizenship is known to be a term that connote  the ability of a person to be able to engage positively in conversations that are known to be made critically and competently in regards to the digital world.

Note that it is one that is said to be drawing on the use of the skills of effective communication as well as creation, to work on the forms of social participation that are said to be respectful of human rights as well as the dignity via the use of technology.

Therefore, saying that If you want to become a digital citizen you only have to buy a piece of technology is a false statement because not buying it makes you one but using it.

Learn more about digital citizen from

https://brainly.com/question/28433866

#SPJ1

In a file processing environment, descriptions for data and the logic for accessing the data are built into?

Answers

In a file processing environment, descriptions for data and the logic for accessing the data are built into application programs.

What are Computer Application?

In regards to Software classification, one can say that the application program is known to be a kind of a computer program that is said to be set up so that it can be able to carry out a particular work or task.

It is one that is often used by a lot of end-users. A good example of this applications software are Word processors, media players, and others.

Therefore, In a file processing environment, descriptions for data and the logic for accessing the data are built into application programs.

Learn more about application programs from

https://brainly.com/question/24264599

#SPJ1

Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications?

Answers

Tracking protection internet explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications

The internet can be a dangerous place, and it's important to take steps to protect your privacy. One way to do this is to enable tracking protection in your web browser.

Tracking protection is a security feature that restricts the information that can be tracked by external websites and applications. This means that your browsing session will be more private, and your data will be less likely to be collected and used without your consent.

To enable tracking protection in Internet Explorer, go to the Tools menu and select Internet Options. On the Privacy tab, click the Tracking Protection button. You can then choose to enable tracking protection for all websites, or only for certain websites that you trust.

Enabling tracking protection can help to keep your data safe and your privacy protected. So if you're concerned about online privacy, be sure to enable this feature in your web browser.

Learn more on internet explorer here:

https://brainly.com/question/28431103

#SPJ4

In database applications, reports are created to display selected information.
a. true
b. false

Answers

In database applications, reports are created to display selected information is a true statement.

What are reports in DBMS?

A report is known to be a kind of a database object that is aid to be used a lot especially if a person want to depict or show the information in their database for:

Show or distribute a summary of data. Save snapshots of the data. Provide details about some records.

Therefore, based on the above,  In database applications, reports are created to display selected information is a true statement.

Learn more about database from

https://brainly.com/question/518894

#SPJ1

Machine language is the set of binary-coded instructions that are executed directly by a computer. True or false

Answers

Answer:

true

Explanation:

In a category of games known as _________, millions of players connect to various servers to team up with other players in very large virtual worlds.

Answers

In a category of games known as MMORPGs, millions of players connect to various servers to team up with other players in very large virtual worlds.

What do MMORPGs mean?

The term  MMORPG connote  massively multiplayer online role-playing games.

This is known to be a type of video game that tends to make use of different elements of role-playing games (RPGs) along with those of the gameplay of multiplayer online gaming worlds.

Therefore, In a category of games known as MMORPGs, millions of players connect to various servers to team up with other players in very large virtual worlds.

Learn more about virtual worlds from

https://brainly.com/question/13873769

#SPJ1

1.21 lab: divide by x write a program using integers user_num and x as input, and output user_num divided by x three times. ex: if the input is:_________

Answers

A program using integers user_num and x as input, and output user_num divided by x three times is given below:

The Program

#include <stdio.h>

int main(void) {

  int userNum;

  int x;

  int ans1;

  int ans2;

  int ans3;

 

  scanf("%d", &userNum);

  scanf("%d", &x);

 

  ans1 = userNum/x;

  ans2 = ans1/x;

  ans3 = ans2/x;

 

  printf("%d %d %d\n", ans1, ans2, ans3);

  return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

The most widely used operating systems on larger servers is one of the many versions of ____.

Answers

Answer: UNIX

Explanation: Unix is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.



As a Social Media Strategist you know that which of the following is typically used to build relationships with customers instead of selling products
to them?

Answers

Answer:

Post product reviews and promotions

Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program?

Answers

A type of threat actor which would benefit the most from accessing your enterprise's new machine learning algorithm research and development program is: D. competitors.

What is machine learning?

Machine learning (ML) is also referred to as deep learning or artificial intelligence (AI) and it can be defined as a subfield in computer science which typically focuses on the use of computer algorithms, data-driven techniques (methods) and technologies to develop a smart computer-controlled robot that has the ability to automatically perform and manage tasks that are exclusively meant for humans or solved by using human intelligence.

Who is a competitor?

A competitor can be defined as a type of threat actor who is generally fond of who launching attacks against its opponent's information system in order to steal sensitive and classified information such as industry research and development program or customer list.

Read more on competitors here: https://brainly.com/question/28431554

#SPJ1

Complete Question:

Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program? a. Shadow IT b. Brokers c. Criminal syndicates d. Competitors.

The operating system monitors the overall activity of the computer and provides services. True or false

Answers

The operating system monitors the overall activity of the computer and provides services true

In the context of the types of data in a database, which is a source of internal data?

Answers

Answer:sales records

Explanation:

How many residues separate amino acids that are stabilized by hydrogen bonds in α helices?.

Answers

The numbers of residues separate amino acids that are stabilized by hydrogen bonds in α helices is  3.6 amino acid residues.

Why are amino acids called residues?

The  Amino acids are known to be compounds that are said to be called residues if there is  two or more amino acids that are known to be bond with each other.

Note that the amino group on one amino acid is one that tends to interacts with the carboxyl group and as such  form a peptide bond.

Therefore, The numbers of residues separate amino acids that are stabilized by hydrogen bonds in α helices is  3.6 amino acid residues.

Learn more about amino acids from

https://brainly.com/question/2526971

#SPJ1

When inputting a formula into excel or other spreadsheet software, what components are required for the formula to function properly? lab flow

Answers

The components that are required for the formula to function properly are:

There should be a Closing parentheses for every opening form of parentheses.There should be an equal sign at the start of the formula.

What is a spreadsheet software?

A spreadsheet is known to be a kind of a computer program that is one that functions by helping to take in, display as well as alter data that are arranged in rows and columns.

Note that the Spreadsheets are said to be part of the most famous tools available for every personal computers.

Hence, The components that are required for the formula to function properly are:

There should be a Closing parentheses for every opening form of parentheses.There should be an equal sign at the start of the formula.

Learn more about spreadsheet from

https://brainly.com/question/4965119

#SPJ1

The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages. True or false?.

Answers

The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages; True.

What is the Unicode coding scheme?

The Unicode coding scheme is sometimes referred to as the Unicode data set and it typically comprises 65,536 characters in order to provide support for several international languages and symbols.

In this context, we can reasonably infer and logically deduce that it is very true that the Unicode coding scheme supports a variety of characters, symbols, and international languages such as:

The Chinese language.The Japanese language.The Arabic language.YorubaIgboFrench

Read more on Unicode coding scheme here: https://brainly.com/question/24846400

#SPJ1

What will happen if you are not media literate?

Answers

Answer:

You will be missing out alot. And it will effect you in the long run.

Explanation:

The reason why it will effect you in the long run is

- Unessary cost

Which is an action that an operating system preforms?
A) stores all data
B) gives signals and instructions to the computer
C) gives information processed by the computer
D) facilitates a computers basic functions between hardware and software

Answers

Answer:

acilitates a computers basic functions between hardware and software

Explanation:

What positive integers have the following binary representations?
(a) 10010
(b) 10011
(c) 101010
(d) 10011110000

Answers

The positive integers have the following binary representations  are,

a.18    b.19

c.42  d.1264

What is a positive integer meaning?

An integer is positive if it is greater than zero; otherwise, it is negative. Zero is defined as not having either a positive or negative value. Consequently, the following is a list of positive integers: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. and so on.

The lowest positive integer is 1, and there is no way to calculate the greatest positive integer, whose size is limitless. Zero is a positive integer since it lacks a negative sign. All the numbers on a number line that are to the right of zero are known as positive integers.

To learn more about positive integers, refer to:

https://brainly.com/question/13292955

#SPJ4

The set of analytical techniques that yield a best course of action is _____ analytics.

Answers

The set of analytical techniques that yield the best course of action is prescriptive analytics.

What is Analytics?

This refers to the systematic computational analysis of data or statistics that is used to interpret data and find patterns in the data.

Hence, we can see that The set of analytical techniques that yield the best course of action is prescriptive analytics.

This is because when the best course of action is taken into consideration, it has to do with finding the best solutions.

Finding the best solutions also has to do with finding best courses of action and this type of analysis is known as prescriptive analytics.

Read more about analytical techniques here:

https://brainly.com/question/28139087

#SPJ1

In addition to oracle, another source of hypervisors for macos desktops is ________.

Answers

In addition to Oracle, another source of hypervisors for macOS desktops is Parallels. Therefore, the correct answer option is B. Parallels.

What is virtualization?

Virtualization can be defined as the creation of an abstract layer over computer hardware primarily through the use of a software, in order to enable the operating system (OS) such as macOS, storage device, server, etc., to be used by end users over the Internet.

In Cloud computing, some of the components (features) which is not required for a successful virtualization environment include the following:

Virtual machineHost machineHypervisors

In Macintosh computers, oracle and parallel are sources of hypervisors.

Read more on virtualization and hypervisors here: https://brainly.com/question/28528924

#SPJ1

Complete Question:

In addition to Oracle, another source of hypervisors for macOS desktops is _____. A. Microsoft B. Parallels C. Apple D. Intel. B. Host key.

Assume double[][][] x = new double[4][5][6], what are x.length, x[2].length, and x[0][0].length?
a. 4, 5, and 4
b. 4, 5, and 6
c. 6, 5, and 4
d. 5, 5, and 5

Answers

If we assume double[][][] x = new double[4][5][6], then  x.length, x[2].length, and x[0][0].length are; b; 4, 5 and 6

How to Interpret Multidimensional Array?

In C/C++, we can define multidimensional arrays in simple words as an array of arrays. Data in multidimensional arrays are stored in tabular form (in row-major order).  

General form of declaring N-dimensional arrays:  

data_type  array_name[size1][size2]....[sizeN];  

data_type: Type of data to be stored in the array.  

Now, if we Assume double[][] x = new double[4][5], then we can say that x.length and x[2].length are; 4 and 5

In a similar form, If we assume double[][][] x = new double[4][5][6], then  x.length, x[2].length, and x[0][0].length are; 4, 5 and 6

Read more about Multidimensional Array at; https://brainly.com/question/23459333

#SPJ1

Jonathan spends his free time writing and testing code. what type of software does he work with?

Answers

Since Jonathan spends his free time writing and testing code, the type of software that he work with is Open source software.

What is open source software?

Open source software is known to be some line of code that is said to be set up so as to be publicly available to everyone to see, change, and distribute the code as they want to.

Note that  Open source software is made  in a decentralized as well as collaborative way and as such, Since Jonathan spends his free time writing and testing code, the type of software that he work with is Open source software.

Learn more about Open source software from

https://brainly.com/question/4593389

#SPJ1

reads a line of input, including leading and embedded spaces, and stores it in a string object.

Answers

A getline reads a line of input, including leading and embedded spaces, and stores it in a string object.

What is a Getline?

The term  C++ getline() is known to be a kind of  standard library function that  is known to be used by a programmer to be able to read a string or a line usually from an input stream.

It is said to be an aspect  of the <string> header. The getline() function tends to obtain or extracts characters from the input stream and attach it to the string object.

Therefore, A getline reads a line of input, including leading and embedded spaces, and stores it in a string object.

Learn more about string object from

https://brainly.com/question/17157424

#SPJ1

________ reads a line of input, including leading and embedded spaces, and stores it in a string object.

Select one:

a. cin.get

b. getline

c. cin.getline

d. get

e. None of these

You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protocols a security issue that you should be concerned about?

Answers

The reason nonessential protocols are a security issue that you should be concerned about is that: A. nonessential ports provide additional areas of attack.

What is information security?

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

In Cyber security, the reason nonessential protocols are a security issue that an end user should be concerned about is that nonessential ports would provide additional areas of attack because all protocols have weaknesses based on the principle of least privilege.

Read more on information security here: brainly.com/question/14286078

#SPJ1

Complete Question:

You have instructed all administrators to disable all nonessential ports on servers at their sites. Why are nonessential protocols a security issue that you should be concerned about?

Nonessential ports provide additional areas of attack.

Nonessential ports can't be secured.

Nonessential ports require more administrative effort to secure.

The composite of your self-awareness, self-concept, and self-esteem is called _______ question 8 options: perception social comparison self attribution

Answers

The composite of your self-awareness, self-concept, and self-esteem is called is self.

What is the idea of self-concept and self awareness?

The idea of Self-awareness is known to be one that tends to influences the self-concept.

It is seen as the quality or any given  trait that entails the  conscious awareness of a person's  own thoughts, feelings, as well as their behaviors, and traits.

Therefore, based on the above, one can say that the composite of your self-awareness, self-concept, and self-esteem is called is self.

Learn more about self-awareness from

https://brainly.com/question/26728098
#SPJ1

An instruction set has 8 steps and each step takes one clock cycle. What is the number of cycles needed to complete the instruction set using pipelined process to complete 100 instruction sets?

Answers

The number of cycles that is said to be needed to complete the instruction set using pipelined process to complete 100 instruction sets is 800.

What do you mean by instruction set?

An instruction set is known to be a set of commands that is known to be made for a central processing unit (CPU) in regards to machine language.

Note that it is one that is seen or connote any form of possible instructions that is made for a CPU or a sub group of instructions that is often used to enhance its performance in some situations.

Note also that CPU clock cycles = Instruction count x CPI.

100 X 8 = 800

Therefore, based on the above, The number of cycles that is said to be needed to complete the instruction set using pipelined process to complete 100 instruction sets is 800.

Learn more about instruction set from

https://brainly.com/question/13164100

#SPJ1

Other Questions
A firm has sales of $4690, costs of $2490, interest paid of $164, and depreciation of $463. the tax rate is 30 percent. what is the cash coverage ratio? Which nursing theory is based on the assumption that beavior is based on the current dynamics confronting an individual versus prior experience? which statement correctly analyzes the rebuttal? Exercise 1 Underline the adjective clause, and circle the noun or pronoun it modifies.The forecast, which called for rain, was incorrect. When working at the scene of a motor vehicle crash at night, you should not use? 26.12/2(x+6)=2x-921 Angie has two choices for living arrangements when she goes to college. She can choose to live in the dorm, which costs about $450 per month. She can walk to her classes and wont need a car. She will also have one roommate she doesnt know. Her other choice is to live in an apartment with two friends from high school. The apartment will cost about $500 per month, and there will be additional expenses like electricity and cable television. It is also about five miles from campus. Use the PACED decision process to decide what Angie should do. Show each step. Exercise 1 In the blank write n if the italicized word is used a noun. Write p if it is used as a pronoun. Write v if it is used as a verb. Write adj. if it is used as an adjective. Write adv. if it is used as an adverb. Write c if it is used as a conjunction. Write prep. if it is used as a preposition. Write i if it is used as an interjection.When I found out about the concert, I was really upset. Identify the reasons why orthodontic problems have arisen in recent homo sapiens. Using the text excerpt below, write a summary of the text. Then select a sentence to paraphrase in your own words.He, sir, proposed a Convention without distinction of caste-a proposition which no doubt will be acceptable, because by exchanging views with those who have everyadvantage, we are materially benefitted Persons likely to associate with our people in such manner, are generally educated people, and possessed of depth ofsentiment. Their influence on us should not be lightly considered. We have been holding conventions for years have been assembling together and whining over ourdifficulties and afflictions, passing resolutions on resolutions to any extent, but it does really seem that we have made but little progress, considering our resolves. Wehave put forth few practical efforts to an end. I, as one of the people, see no need for our distinctive meetings, if we do not do something. We should do more, and talkless-Mary Ann Shadd Cary, Letter to Frederick Douglass, January 25, 1849 What are reasons why strategic planning may not occur sequentially? Determine whether the statement is always, sometimes, or never true if three points are collinear , then they are also coplanar always sometimes never The transport of sugars into cells up their concentration gradient along with sodium ions that are moving down their concentration gradient is called ______. Which of the following steps should happen FIRST when Writing ?a. Students circle their letter that best matches the model letter. b. Students write the letter on their own. c. Students trace the letter several times. d. The teacher models writing the letter, stroke by stroke What is one subject do you think you would be able to locate the best source material for? A 20-year-old woman has a bottle of wine along with her other groceries that she is purchasing. is this a legal off-premise sale of alcohol? Exercise 1 Write P above each proper noun and C above each common noun. In every city where a game was played, fans of each country cheered their players. Was the Black Hand's nationalistic cause equal to that of theFrench and American revolutionaries. Explain Which regions are considered the cradles of western civilization, history and architecture? (select all that apply) rome mesopotamia egypt byzantium The sears tower in chicago is 443 m tall. Joe wants to set the worlds stair climbing record and runs all the way to the roof of the tower. If joes average upward speed is 0. 60 m/s, how long will it take joe to climb from street level to the roof of the sears tower?.