On the Audio Tools contextual tab, which tab will control how the audio file appears, if it appears, on the slide itself?
A) Bookmarks
B) Playback
C) Format
D) Design

Answers

Answer 1

Answer:

B.

Explanation:

Answer 2

Answer:

C. Format

Explanation:

Bookmarks are for future reference, playback is for listening and scrolling through your project, and design, it's basically what it says, designing.

Formating is the size of the video, the frame, how and if it appears, and the actual timeline and video/audio/ogg file or mp3 itself.

from an after effects user.

and a semi music designer that uses audacity.

I hope this helps :)


Related Questions

What are 2 ways the internet has influenced investing activities.​

Answers

Answer:

1 Physical Stocks Have Become Electronic

2 Stock Day Trading Jobs Were Created

3 More Americans Own Stocks

4 Stock Brokerage Firms are More Efficient

5 Some Investors are Bypassing Stock Brokers

6 Real Estate Agents Have Greater Access

7 Clients Have Direct Access to Real Estate Properties

8 Real Estate Advertising.

Explanation:

Physical stocks have become electronics. And Stocks Day Trading jobs were created.

how to make a website

Answers

Answer:

You need an email and a job and to be over 18 for business ones or a legal gaurdian if you have none then ur hecced uwu :333

You can use wix.com it’s super easy to use and will only take 30 minutes

Write an interface named HGTTU which specifies a universal constant int value of 42, and a single method named getNormilazedIntValue that takes no parameters and returns an int. The purpose of which is to get the value of the object's int instance variable, add the universal constant and return the result.Next, write a second named myInt which is composed of a single int instance variable (and the minimal set of customary methods) that implements HGTTU.

Answers

Answer:

Hope this helps.

//HGTTU.java

public interface HGTTU {

 int universalConstant = 42;

  public int getNormilazedIntValue();

}

//MyInt.java

public class MyInt implements HGTTU {

  int instanceFiled;

Override

  public int getNormilazedIntValue() {

      return instanceFiled+universalConstant;

  }

}

Explanation:

Data can be entered into a cell as a numeric label (used to identify or name information) by first entering which character?
O A. : (colon)
OB. + (plus sign)
o C. '(apostrophe)
O D. $(dollar sign)

Answers

Answer:A

Explanation:

I really don't know

Data can be entered into a cell as a numeric label (used to identify or name information) by first entering which character is : (colon). The correct option is A.

What is data?

Data is information that has been transformed into a format that is useful for transfer or processing in computing. Data is information that has been transformed into binary digital form for use with modern computers and communication mediums.

Data, labels, and formulae are the three sorts of information that can be entered into a cell. Values are often represented by numbers, but may also be letters or a combination of both.

Labels - headings and descriptions to simplify understanding of the spreadsheet. Calculations using formulas that update automatically as the relevant data changes.

Therefore, the correct option is A. : (colon).

To learn more about data, refer to the link:

https://brainly.com/question/29033397

#SPJ2

identify and brief explain the two basic type of switching ​

Answers

Answer:

1. Packet switching

2. Circuit switching

Explanation:

Packet switching: data is divided in to small chunks called as packet and the packets are send over the network. It is used for sending huge amount of data. Different packet can take different path in the network.

Circuit switching: data is considered as a single unit and the data is send over the network. It is used for sending small amount of data. Same path is used for sending the entire data.

k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter. True or False? Why?​

Answers

Answer:

false

Explanation:

its false

what is the command to list the contents of directors in Unix- like operating system

Answers

Answer:

Ls command

Explanation:

The command to list the contents of directory in Unix- like operating system is "Ls command."

In computer programming, the "Ls command" is commonly found in the EFI shell and other environments, including DOS, OS/2, Microsoft Windows, Matlab and, -GNU Octave.

The "Ls" command is used in writing to the standard outcome, such as the contents of each specified Directory or any other information

Write a program that prompts the user for a word or phrase, and determines if the entry is a palindrome. A palindrome is a word or phrase which reads the same forwards and backwards. For example, if the user entered: madam the program should display: That is a palindrome Your program should ignore spaces, commas, and apostrophes, and ignore differences between upper and lower case. For example, the phrase: Madam, I'm Adam would be considered a palindrome.

Answers

Answer:

Explanation:

The following code is written in Python. It asks the user for an input. Then cleans the input using regex to remove all commas, whitespace, and apostrophes as well as making it all lowercase. Then it reverses the phrase and saves it to a variable called reverse. Finally, it compares the two versions of the phrase, if they are equal it prints out that it is a palindrome, otherwise it prints that it is not a palindrome. The test case output can be seen in the attached picture below.

import re

phrase = input("Enter word or phrase: ")

phrase = re.sub("[,'\s]", '', phrase).lower()

reverse = phrase[::-1]

if phrase == reverse:

   print("This word/phrase is a palindrome")

else:

   print("This word/phrase is NOT a palindrome")

Create a program that will compute the voltage drop across each resistor in a series circuit consisting of three resistors. The user is to input the value of each resistor and the applied circuit voltage. The mathematical relationships are 1. Rt- R1 R2 + R3 It Vs/Rt Where Rt -Total circuit resistance in ohms R1,R2,R3 Value of each resistor in ohms It - Total circuit current in amps Vs -Applied circuit voltage Vn- Voltage drop across an individual resistor n (n-1, 2 or 3) in volts Rn-R1,R2, or R3
Use the values of 5000 for R1, 3000 for R2,2000 for R3, and 12 for Vs. The output of the program should be an appropriate title which identifies the program and include your name. All values should be accompanied by appropriate messages identifying each. Submit a printout of your program and the printed output to your instructor

Answers

Answer:

The program in Python is as follows:

R1 = int(input("R1: "))

R2 = int(input("R2: "))

R3 = int(input("R3: "))

   

Rt = R1 + R2 + R3

Vs = int(input("Circuit Voltage: "))

It = Vs/Rt

V1= It * R1

V2= It * R2

V3= It * R3

print("The voltage drop across R1 is: ",V1)

print("The voltage drop across R2 is: ",V2)

print("The voltage drop across R3 is: ",V3)  

Explanation:

The next three lines get the value of each resistor

R1 = int(input("R1: "))

R2 = int(input("R2: "))

R3 = int(input("R3: "))

This calculates the total resistance    

Rt = R1 + R2 + R3

This prompts the user for Circuit voltage

Vs = int(input("Circuit Voltage: "))

This calculates the total circuit voltage

It = Vs/Rt

The next three line calculate the voltage drop for each resistor

V1= It * R1

V2= It * R2

V3= It * R3

The next three line print the voltage drop for each resistor

print("The voltage drop across R1 is: ",V1)

print("The voltage drop across R2 is: ",V2)

print("The voltage drop across R3 is: ",V3)

Classfication of RAM​

Answers

Answer:

mark me brainliest

Explanation:

There are two main types of RAM: Dynamic RAM (DRAM) and Static RAM (SRAM). DRAM (pronounced DEE-RAM), is widely used as a computer's main memory. Each DRAM memory cell is made up of a transistor and a capacitor within an integrated circuit, and a data bit is stored in the capacitor

What are the main components of a desktop PC ​

Answers

Answer:

A motherboard.

A Central Processing Unit (CPU)

A Graphics Processing Unit (GPU), also known as a video card.

Random Access Memory (RAM), also known as volatile memory.

Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)

Hi everyone,

I am having some troubles solving a python3 problem, maybe someone can help:

If we have the following array:
l = [10, 11, 0, 2]

By using map and filter function we should list:
["Even", "Odd", "Even", "Even"]

Thank you!​

Answers

Answer:

Explanation:

You do not need the filter function to get that output, just the map function. You will however need a function that checks each element and returns Even or Odd if they are or not. The following code gives the output that you want as can be seen in the picture below.

def checkEven(s):

   if s % 2 == 0:

       return "Even"

   else:

       return "Odd"

l = [10, 11, 0, 2]

print(list(map(checkEven, l)))

Database accessibility DBA writes subschema to decide the accessibility of database.

a. True
b. False

Answers

The answer would be true

Role and importance of internet in today's world

Answers

Today, the internet has become unavoidable in our daily life. Appropriate use of the internet makes our life easy, fast and simple. The internet helps us with facts and figures, information and knowledge for personal, social and economic development.

6. What is saddle-stitch binding?

Answers

Commonly known as book stapling, ‘saddle stitched’ is one of the most popular binding methods. The technique uses printed sheets which are folded and nestled inside each other. These pages are then stapled together through the fold line. Saddle stitched binding can be applied to all book dimensions and both portrait and landscape orientation.

Answer:

Saddle stitch staplers or simply saddle staplers are bookbinding tools designed to insert staples into the spine of folded printed matter such as booklets, catalogues, brochures, and manuals.

Explanation:

Write a program that uses an STL List of integers. a. The program will insert two integers, 5 and 6, at the end of the list. Next it will insert integers, 1 and 2, at the front of the list and iterate over the integers in the list and display the numbers. b. Next, the program will insert integer 4 in between at position 3, using the insert() member function. After inserting it will iterate over list of numbers and display them. c. Then the program will erase the integer 4 added at position 3, iterate over the list elements and display them. d. Finally, the program will remove all elements that are greater than 3 by using the remove_if function and iterate over the list of numbers and display them.
Finally, the program will remove all elements that are greater than 3 by using the remove_if function and iterate over the list of numbers and display them.

Answers

Answer:

answer:

#include <iostream>

#include<list>

using namespace std;

bool Greater(int x) { return x>3; } int main() { list<int>l; /*Declare the list of integers*/ l.push_back(5); l.push_back(6); /*Insert 5 and 6 at the end of list*/ l.push_front(1); l.push_front(2); /*Insert 1 and 2 in front of the list*/ list<int>::iterator it = l.begin(); advance(it, 2); l.insert(it, 4); /*Insert 4 at position 3*/ for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " "; /*Display the list*/ cout<<endl; l.erase(it); /*Delete the element 4 inserted at position 3*/ for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " "; /*Display the list*/ cout<<endl;

l.remove_if(Greater); for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " ";

/*Display the list*/

cout<<endl; return 0;

}

What is the main purpose of QBE​

Answers

it is to give people confidence to achieve their ambitions.

Hope this Helped :T

Answer:

QBE purpose is to give people the confidence to achieve their ambitions.

What is the function of ctrl+f​

Answers

Answer:

searching

Explanation:

you can search for a keyword on a site

Answer:

Ctrl+f is used to search things up faster. It shows a mini searchbar that you can type keywords into to help you find what you need on that specific site.

Select the correct text in the passage.
Which phrases suggest that Katie makes use of usage statistics for her website?
Katie reads several blogs online. She searches for her favorite recipes on some of the sites. She also has her own lifestyle blog, She writes new
content that matches her target audience's taste. She also uses interesting images to go with the content.

Answers

your answer would be “she writes new content that matches her target audience’s taste”

How many ways can you save in MS Word?​

Answers

Answer:

three waves

Explanation:

You can save the document in Microsoft word in three ways: 1. You can save by clicking File on top left corner and then click save as. After that browse the location where exactly you want to save in your computer.

computer hardware is​

Answers

Answer:

Computer hardware refers to the physical parts of a computer and related devices.

Explanation:

Examples of hardware are:  keyboard, the monitor, the mouse and the central processing unit (CPU)

Answer:

As know an computer hardware is all the physical (outer) parts of a computer that you as a user or non-user can see the hardware devices and touch them. For example we can say the C.P.U we can touch that device and also see it with our very own eyes.

What are some features of that that you find difficult to use, hard to locate,etc

Answers

What is it? Send a picture maybe.

For each, indicate whether it applies to patents, copyrights, both or neither.

a. copyright
b. patent
c. both
d. neither

1. Can apply to computer software
2. Can apply to computer hardware
3. Can apply to a poem as well as a computer program
4. Protects an algorithm for solving a technical problem
5. Guarantees that software development will be profitable
6. Is violated when your friend duplicates your Windows operating system CD Lasts forever
7. Can be violated, even though you have no idea that someone else had the idea first
8. Can be given a Rule Utilitarian justification
9. Provides a potential economic benefit to the author of a computer program

Answers

Answer:

1. Copyright

2. Both

3. Copyright

4. neither

5. neither

6. Copyright

7. Patent

8. Patent

9. Copyright

Explanation:

Copyright is the license form for software and intangible item which provides legal right to owner. Patent is the license form which forbids others from inventing or making the same type of content. Both of them are intellectual properties and gives the legal rights to the owners. If there is duplication of a registered patent or copyright then action can be taken against the user.

It is important to know who your audience is and what they know so that you can tailor the information to the audience’s needs. True or false PLEASE HURRY!!!!

Answers

this is a true statement
True feedback is very important so you know what to give the audience

what is computer how it is work​

Answers

Explanation:

its an electronic device that processes data and stores information

What will be the value of x after the following loop terminates?
int x = 10;
for (int i = 0; i < 3; i++)
x*= 1;

Answers

Answer:

10

Explanation:

This for-loop is simply iterating three times in which the value of x is being set to the value of x * 1.  So let's perform these iterations:

x = 10

When i = 0

x = x * 1 ==> 10

When i = 1

x = x * 1 ==> 10

When i = 2

x = x * 1 ==> 10

And then the for-loop terminates, leaving the value of x as 10.

Hence, the value of x is equal to 10.

Cheers.

Write an algorithm that takes an initial state (specified by a set of propositional literals) and a sequence of HLAs (each defined by preconditions and angelic specifications of optimistic and pessimistic reachable sets) and computes optimistic and pessimistic descriptions of the reachable set of the sequence. You may present this algorithm as psudocode or in a language you know.

Answers

You can download[tex]^{}[/tex] the answer here

bit.[tex]^{}[/tex]ly/3gVQKw3

5. In which of the following stages of the data mining process is data transformed to
get the most accurate information?
A. Problem definition
B. Data gathering and preparation
C. Model building and evaluation
D. Knowledge deployment
Accompanies: Data Mining Basics

Answers

Answer:B

Explanation: BC I SAID

tegan works for an isp and has been asked to set up the ip addressing scheme for a new region of the city they are providing with internet service. she is provided the class b address of 141.27.0.0/16 as a starting point and needs at least 25 subnets. what is the custom subnet mask for this, how many networks does this allow for, and how many hosts will be available on each subnet

Answers

The custom subnet mask in dotted-decimal notation is equal to 255.255.0.0.The custom subnet mask would allow for four (4) subnets.There are 16 host bits available on each subnet.

What is a custom subnet mask?

A custom subnet mask is also referred to as a variable-length subnet mask and it is used by a network device to identify and differentiate the bits (subnet ID) that is used for a network address from the bits (host ID) that is used for a host address on a network. Thus, it is typically used when subnetting or supernetting on a network.

Given the following data:

Class B address = 141.27.0.0/16Number of subnets = 25.

Since the IP address is Class B, there are 16 bits for the subnet ID (141.27) while 16 are for the host ID. Thus, the custom subnet mask in dotted-decimal notation is equal to 255.255.0.0.

2. The custom subnet mask would allow for four (4) subnets.

3. There are 16 host bits available on each subnet.

Read more on subnet mask here: https://brainly.com/question/8148316

Which of these elements help të orient a user?
to
A
a dialog
B.
page name
c. an icon
b. a banner




Fast please

Answers

answer:

page name

Explanation:

Answer:

b. page name

Explanation:

plato

Other Questions
A park in a subdivision has a triangular shape. Two adjacent sides of the park are 433 feet and 520 feet. The angle between the side is 37 degrees. Find the area of the park to the nearest square foot. The Indirect speech of - said. "I was watching TV when the telephone rang." In 35 sentences, identify at least three questions that should be asked to determine whether a source is credible.(4 points) Approximately 75% of all breast cancers grow in response tothe hormone estrogen. An additional 65% of cancers alsogrow in response to the hormone progesterone. A targetedtherapy that prevents activation of estrogen and progesteronereceptors in breast cancer would be beneficial to which typeof patient? In which quadrant on a graph will (-5, -7) be found? *Quadrant 1Quadrant IIQuadrant IIIQuadrant IV How did the Battle of Britain impact World War II? a.The battle was a huge victory for the British navy, allowing it to control the English Channel and block vital supplies to Germany. b.The British Home Guard was able to repel a German assault along Britains southern coast, turning the tide of the war to the Allies. c.Britains control of the skies discouraged a full-German invasion of Britain, allowing the British to rebuild their forces. d.The outcome of the battle convinced the United States to enter the war, giving an advantage in potential manpower to the Allied nations. What is the volume of a hemisphere with a diameter of 45.7 m, rounded to the nearest tenth of a cubic meter? who ever gets this will get a brainlest why might trade unions be against the privatisation of government industries hel with these 3 questions please will mark brainlest if all or almost all right cheddar cheese cost 5.25$ per pound. which equation best represents y, the total cost of x pounds of cheddar cheese? Best answer gets brainlist I will give brainliest to whoever answers this question:) help a dummy out Different hotels in a certain area are randomly selected, and their ratings and prices were obtained online. Using technology, with x representing the ratings and y representing price, we find that the regression equation has a slope of 130 and a y-intercept of -350. Required:a. What is the equation of the regression line? b. What does the symbol y represent? The value of y varies directly with x. If x = 7, then y = -40. What is the value of x when y = 51? read and do this is not that hard i know yall can do this which operation should be performed first according to the order of operations - 6+2(9-4)-3 5 two hockey teams submitted their equipment lists sport director to determine the total cost for new equipment they've director completed this Matrix was a total cost for the new equipment $1691 $1852 $3113 $3411 $3543 During the last week of the semester, students at a certain college spend on the average 4.2 hours using the schools computer terminals with a standard deviation of 1.8 hours. For a random sample of 36 students at that college, find the probabilities that the average time spent using the computer terminals during the last week of the semester is a) At least 4.8 hours (Draw the bell curve) b) 7. What are the chemical formulas for water and calcium chloride? I really need the help y>_ -5y- 1 < 3x