7
Select the correct answer from each drop-down menu.
Complete the statement about multimedia file formats and hardware.
MPEG is a common file format for
images
videos
text
This multimedia component can be captured using

Answers

Answer 1
MPEG is a common file format for: videos.This multimedia component can be captured using a Video Camera (Video Recorder).

What is a file?

A file can be defined as a computer resource or type of document that avails an end user the ability to save or record data as a single unit on a computer storage device.

In Computer technology, a sequence which best reflects the size of various files that are used on a computer system, from smallest to largest is:

TextCompressed filesPictureAudio (Music)Video

Also, all multimedia file comprises five major components and these include the following:

TextImagesSoundVideoAnimation

Read more on multimedia files here: https://brainly.com/question/24138353

#SPJ1


Related Questions

Which type of testing requires the tester to enter erroneous data into an application?
A.
usability testing
B.
data comparison
C.
validation testing
D.
stress testing

Answers

A. Usability testjng

write a program in BASIC to calculate the factorial of a number N​

Answers

The program in BASIC to calculate the factorial of a number N​ is

10 INPUT "Enter a number: ", N

20 F = 1

30 FOR I = 1 TO N

40 F = F * I

50 NEXT I

60 PRINT "Factorial of "; N; " is "; F



What is Basic Program?

This abbreviation stands for "Beginner's All-purpose Symbolic Instruction Code." BASIC is a computer programming language created in the mid-1960s to allow students to create simple computer programs.

BASIC is a family of general-purpose, high-level programming languages that are intended to be simple to use. Dartmouth College's John G. Kemeny and Thomas E. Kurtz designed the first version in 1963. They wanted non-scientific pupils to be able to utilize computers.

Learn more about Basic Program:
https://brainly.com/question/29797769
#SPJ1

Which of the following groups might sign a non-disclosure agreement between them?

the local government and its citizens

a group of employees or contractors

a company and an employee or contractor

two competing businesses or companiesc​

Answers

Answer: I believe the right answer is between a company and employee or contractor.

Explanation: I think this is the answer because a non-disclosure is a legal contract between a person and a company stating that all sensitive. information will be kept confidential.

Answer:a

Explanation:

What instructions would a computer have the hardest time completing correctly

Answers

The instructions which a computer would have the hardest time completing correctly are complex instructions.

What is an instruction?

An instruction can be defined as a set of executable codes that are written and developed to instruct the central processing unit (CPU) of a computer system on how to perform a specific task and proffer solutions to a particular problem.

This ultimately implies that, it is a segment of executable codes which contain steps that are to be executed by the central processing unit (CPU) of a computer system.

In Computer programming, the instructions which a computer would have the hardest time completing correctly are complex instructions.

Read more on instructions here: https://brainly.com/question/26324021

How serious are the risks to your computer security?
Why is it important to protect a Wi-Fi network? What should you do to protect your Wi-Fi network?

Answers

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

What are the risk results for information and computer security?

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

https://brainly.com/question/12010892

#SPJ1

What are the characteristics of desktop alerts in Outlook 2016? Check all that apply.
On-screen notifications will pop up for new emails, meeting invites, and new tasks.
Email pop-ups will display the sender's name, subject, and a small bit of the message.
Reading the pop-up alert is the best way to read email messages.
Desktop alerts cannot be turned off.
O Sound notifications can be customized.

Answers

Answer:

A & B

Explanation:

Answer:

A. On-screen notifications will pop up for new emails, meeting invites, and new tasks.

B. Email pop-ups will display the sender’s name, subject, and a small bit of the message.

E. Sound notifications can be customized.

Explanation:

this is for Outlook 2019

What do you think the need for ethics in data science? Is it really important to include ethical
rules when dealing with big data? If your answer is yes, why?​

Answers

Yes, the need for ethics in data science is crucial, especially when dealing with big data.

What is the ethics  about?

Protecting privacy: Data science often involves handling sensitive information, such as personal data or health records. This information must be protected from misuse and unauthorized access, which is why ethical considerations must be taken into account when processing this data.

Avoiding bias: Data science algorithms are only as good as the data that is fed into them, and if the data is biased, the results of the analysis will also be biased. By considering ethics in data science, it is possible to prevent bias and ensure that results are fair and accurate.

Learn more about ethics  from

https://brainly.com/question/13969108

#SPJ1

What missing condition will give you the output shown? numB = 2 while _____: numB = numB + 3 print(numB) Output: 14 numB 10 numB > 12 numB < 10

Answers

Answer:

A. numB < 12

Explanation:

Correct answer edge 2020

Answer: A. numB < 12

Explanation: got it right edgen

IN JAVA
4.17 LAB: Count characters
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1.
Ex: If the input is:
n Monday
the output is:
1 n
Ex: If the input is:
z Today is Monday
the output is:
0 z's
Ex: If the input is:
n It's a sunny day
the output is:
2 n's
Case matters.
Ex: If the input is:
n Nobody
the output is:
0 n's
n is different than N.
import java.util.Scanner;
public class LabProgram {
public static void main(String[] args) {
/* Type your code here. */
}
}

Answers

Note tha the required code in Java is:

import java.util.Scanner;

public class CharacterCount {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       

       // Get the character and the string from the user

       System.out.print("Enter a character: ");

       char ch = scnr.nextLine().charAt(0);

       

       System.out.print("Enter a string: ");

       String str = scnr.nextLine();

       

       // Count the number of times the character appears in the string

       int count = 0;

       for (int i = 0; i < str.length(); i++) {

           if (str.charAt(i) == ch) {

               count++;

           }

       }

       

       // Output the result

       System.out.print(count + " " + ch);

       if (count != 1) {

           System.out.print("'s");

       }

   }

}

How does the above code work?

The program first prompts the user to enter a character and a string. It then uses a for loop to iterate through the string and count the number of times the character appears.

Finally, it outputs the result in the format specified in the problem statement, including the input character and using the plural form if necessary.

Learn more about Code at:

https://brainly.com/question/28848004

#SPJ1

Computer is a versative Idiot, explain with respect to teaching and learning

Answers

Answer:

Computer is a versative Idiot, explain with respect to teaching and learning

Explanation:

Primary Logo

Introduction to Computer

Subject: Computer

Home Grade 9 Computer Introduction To Computer Introduction To Computer

Search for notes, Q&As, Videos, etc.

Syllabus

Introduction to Computer

Introduction to Computer

History of Computer

Applications of Computer

Electro Mechanical Computers

Generation of Computer

Computer Systems

Types of computer

Computer Hardware

Computer Software

Number System

Operating System

Information System and Social Impact of Computer

Information Technology Policy

Concept of E-Governance

Webpage Designing

Algorithm and Flowchart

Program and Programming Languages

QBASIC Programming

Overview

Computers are the machines that can perform tasks or calculations according to set of instructions or programs. This note introduces you with the computer.

Note

Things to remember

Videos

Exercise

Quiz

Introduction to Computer

Computers are the machines that can perform tasks or calculations according to set of instructions or programs. The term computer is derived from the word compute which means to calculate. Computer is an electronic device that can perform arithmetic and logical calculations faster. The first fully electronic computers, introduced in 1940s, were huge machines that required teams of people to operate. Compared to those early machines, today's computers are not only thousand times faster, they can fit on your desk, lap and even pocket. You must appreciate the impact of computer in our day-to-day life. The computer has been useful in reservation of tickets in Airlines and Railways, payment of telephone and electricity bills, deposits etc.

Advantages of computer

Computers are very fast due to which thousands of job can be performed within a short period of time.

Complex mathematical problems and logical operations can be solved by using this computer.

As computer is a versatile device, multiple task like communication, graphics, documentation can be done.

A huge amount of data can be stored and retrieved as it has high storage capacity.

Disadvantages of computer

Computers are machine hence, they have no brain so they work according to the program instructions set inside it.

It is an electronic device and it uses electrical sources to work, so it is very risky to store data and information on the computer independently because some electrical and electronic damages may damage the data. So we have to make regular backup of the data.

Since computers are very expensive device, it becomes beyond the capacity of general user. But now a day its price is going down than past.

Computers require dustless and temperature maintained environment for best performance

The phrase simply implies that computer can be used for communication and information in schools.

What is a computer?

It should be noted that a computer is an electronic machine that can be used to make one's work easier and faster.

With respect to teaching and learning, the phrase implies that computer is vital in schools. It can be used to enhance learning.

Learn more about computers on:

https://brainly.com/question/24540334

A company has a number of employees. The attributes of EMPLOYEE include Employee ID (identifier), Name, Address, and Birthdate. The company also has several projects. Attributes of PROJECT include Project ID (identifier), Project Name, and Start Date. Each employee may be assigned to one or more projects or may not be assigned to a project. A project must have at least one employee assigned and may have any number of employees assigned. An employee’s billing rate may vary by project, and thecompany wishes to record the applicable billing rate (billing Rate) for each employee when assigned to a particular project.

Required:
Draw an ERD for this company.

Answers

Answer:

The ERD is attached.

Explanation:

See the attached document for ERD

You open your browser and sign into the OneDrive website. Now you need to find the poster from Liam so you can make the changes Indie gave you. Which file do you need?

Answers

Type Liam's name or the name of the poster into the OneDrive search field to find the file, then open it and make the necessary adjustments as directed by Indie.

How do I access OneDrive from a web browser?

Open a web browser and navigate to OneDrive.com. Choose the file name, then choose the folder where you saved your work. The proper Microsoft 365 for the Web programme launches when the document is clicked.

The best way to access files an editable link to OneDrive files be made?

Choose OneDrive from the user properties page. Choose Make link to files under Gain access to files. To access the file location, select the link. Choose Move to or Copy to move the files to your computer.

To know more about OneDrive visit:-

https://brainly.com/question/17163678

#SPJ1

What formatting changes do spreadsheet applications permit in the rows and columns of a spreadsheet?
Row and Column Formatting Options
Formatting rows and columns is similar to cell formatting. In an OpenOffice Calc spreadsheet, you can format data entered into rows and columns with the help of the Rows and Columns options. You can insert rows and columns into, or delete rows and columns from, a spreadsheet. Use the Insert or Delete rows and columns option on the Insert tab. Alternatively, select the row or column where you want new rows or columns to appear, right-click, and select Insert Only Row or Only Column options.

You can hide or show rows and columns in a spreadsheet. Use the Hide or Show option on the Format tab. For example, to hide a row, first select the row, then choose the Insert tab, then select the Row option, and then select Hide. Alternatively, you can select the row or columns, right-click, and select the Hide or Show option.

You can adjust the height of rows and width of columns. Select Row and then select the Height option on the Format tab. Similarly, select Column, then select the Width option on the Format tab. Alternatively, you can hold the mouse on the row and column divider, and drag the double arrow to the position. You can also use the AutoFit option on the Table tab to resize rows and columns.

Answers

Formatting rows and columns in a spreadsheet is similar to cell formatting. In OpenOffice Calc, users can insert or delete rows and columns, hide or show them, and adjust the height and width of the rows and columns.

What is spreadsheet?

A spreadsheet is an electronic document that stores data in a tabular format and is used to perform calculations and analysis. It is a type of software program designed to assist with data entry, calculations, and other analysis tasks. Spreadsheets often contain formulas and functions that allow users to quickly and accurately calculate values based on the data they enter. Spreadsheets also provide users with the ability to present data in an organized and visually appealing way. Spreadsheets are an essential tool for businesses, schools, and other organizations to help them make decisions, track progress, and manage resources.

Users can access these options from the Insert, Format, and Table tabs. Alternatively, they can select the row or column they want to format, right-click, and select the relevant option. Additionally, users can hold the mouse on the row or column divider and drag the double arrow to the desired position. The AutoFit option on the Table tab can also be used to resize rows and columns.

To learn more about spreadsheet
https://brainly.com/question/30039670
#SPJ1

where can i learning cybersecurity for free

Answers

Answer:

You can learn cybersecurity for free on Coursera. They offer 90 cybersecurity courses from top universities and companies to help you start or advance your career skills in cybersecurity. You can learn online for free today!

Explanation:

You would like to create a practical program that will randomly select student names from a list for your instructor to be able to call on people. What are the steps for creating this program? Explain your answer in 3-5 sentences

Answers

To create a program that randomly selects student names from a list, begin by crafting the roster. Names can be manually typed or loaded from a saved document.

What is the next step?

Next, generate a random number that falls within the range of the listed students. This created value will coincide with the assigned index for selection.

To avoid repetitiveness until all names have been used, display the chosen name to your preference and remove it from the list. For this project any programming language could suffice, however, selecting an easily readable option like Python is highly recommended.

It readily enables loading information from files as well as generating appropriately guided random numbers.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

Why might you use a navigation form instead of tab pages? The navigation form allows for several levels and sublevels to be collected. The navigation form allows for duplicate records of information to be collected. The navigation form requires all entries to be complete before adding to a database. The navigation form requires report headers and footers to make publication neater.

Answers

Answer:

Access includes a Navigation Control that makes it easy to switch between various forms and reports in your database. A navigation form is simply a form that contains a Navigation Control. Navigation forms are a great addition to any desktop database.

Explanation:

yes

Answer:

answer c

Explanation:

correct answer on edge

A motor takes a current of 27.5 amperes per leaf on a 440-volt, three-phase circuit. The power factor is 0.80. What is the load in watts? Round the answer to the nearer whole watt.

Answers

The load in watts for the motor is 16766 watts

To calculate the load in watts for the given motor, you can use the following formula:

Load (W) = Voltage (V) × Current (I) × Power Factor (PF) × √3

In this case:
Voltage (V) = 440 volts
Current (I) = 27.5 amperes per phase
Power Factor (PF) = 0.80
√3 represents the square root of 3, which is approximately 1.732

Now, plug in the values:

Load (W) = Voltage (V) × Current (I) × Power Factor (PF) × √3

Load (W) = 440 × 27.5 × 0.80 × 1.732

Load (W) = 16765.7 watts

Rounded to the nearest whole watt, the load is approximately 16766 watts.

Know more about the motor here :

https://brainly.com/question/29713010

#SPJ11

Veronica is shooting a series of action shots in the studio for an advertising campaign. She is using a specific kind of lighting that offers much brighter light than any camera flash and will capture detail in a way other lighting cannot. She loves the surprise that this type of lighting offers since she cannot see the final effect until after the shot is taken. What type of lighting is Veronica using?

low-wattage bulbs

continuous lighting

hot bulbs

studio strobes

Answers

Since Veronica is shooting a series of action shots in the studio for an advertising campaign. The type of lighting Veronica is using is

continuous lighting

What type of lighting is Veronica using?

Continuous lighting offers much more brilliant light than camera flash and supports constant light, allowing photographers to visualize the final effect before attractive the shot.

This type of lighting is particularly beneficial in the studio background as it allows the cameraperson to control the light and shadows in the scene, and capture more detail than added types of lighting.

Learn more about lighting  from

https://brainly.com/question/19697218

#SPJ1

Assistive technology has gained currency in the 21st century since it facilitates the inclusion agenda in the country.Give four reasons to justify your point.​

Answers

Answer:

Assistive technology has gained currency in the 21st century because it provides various benefits that support inclusion. These include:

Increased accessibility: Assistive technology can make it easier for individuals with disabilities to access and interact with technology and digital content. This can increase their independence and enable them to participate more fully in society.Improved communication: Assistive technology can facilitate communication for individuals with speech or hearing impairments, enabling them to express themselves and connect with others.Enhanced learning opportunities: Assistive technology can provide students with disabilities with access to educational materials and resources, enabling them to learn and succeed in school.Greater employment opportunities: Assistive technology can provide individuals with disabilities with the tools they need to perform job tasks and participate in the workforce, increasing their opportunities for employment and economic independence.

Explanation:

Assistive technology refers to tools, devices, and software that are designed to support individuals with disabilities. In recent years, assistive technology has become increasingly important in promoting inclusion and accessibility for people with disabilities. The four reasons mentioned above provide a brief overview of the key benefits that assistive technology can offer, including increased accessibility, improved communication, enhanced learning opportunities, and greater employment opportunities. These benefits can help individuals with disabilities to participate more fully in society, achieve greater independence, and improve their quality of life.

what is the CPU's role?

Answers

Answer:

The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program. The computer industry used the term "central processing unit" as early as 1955.

Answer:

The Cpu is like the brain of the computer it's responsible for everything from running a program to solving a complex math equation.

Warzone Players Drop Activison ID!!!

Answers

Answer:

I don't know what that is!!!

Explanation:

bc i only play rblx with two o's!!!

Answer: xXPanda_SenseiXx is my ID

Explanation:

4) Create a text file (you can name it sales.txt) that contains in each line the daily sales of a company for a whole month. Then write a Java application that: asks the user for the name of the file, reads the total amount of sales, calculates the average daily sales and displays the total and average sales. (Note: Use an ArrayList to store the data).

Answers

Answer:

Here's an example Java application that reads daily sales data from a text file, calculates the total and average sales, and displays the results:

import java.util.ArrayList;

import java.util.Scanner;

import java.io.File;

import java.io.FileNotFoundException;

public class SalesDemo {

   public static void main(String[] args) {

       // Ask the user for the name of the file

       Scanner input = new Scanner(System.in);

       System.out.print("Enter the name of the sales file: ");

       String fileName = input.nextLine();

       // Read the daily sales data from the file

       ArrayList<Double> salesData = new ArrayList<>();

       try {

           Scanner fileInput = new Scanner(new File(fileName));

           while (fileInput.hasNextDouble()) {

               double dailySales = fileInput.nextDouble();

               salesData.add(dailySales);

           }

           fileInput.close();

       } catch (FileNotFoundException e) {

           System.out.println("Error: File not found!");

           System.exit(1);

       }

       // Calculate the total and average sales

       double totalSales = 0.0;

       for (double dailySales : salesData) {

           totalSales += dailySales;

       }

       double averageSales = totalSales / salesData.size();

       // Display the results

       System.out.printf("Total sales: $%.2f\n", totalSales);

       System.out.printf("Average daily sales: $%.2f\n", averageSales);

   }

}

Assuming that the sales data is stored in a text file named "sales.txt" in the format of one daily sale per line, you can run this program and input "sales.txt" as the file name when prompted. The program will then calculate the total and average sales and display the results.

I hope this helps!

Explanation:

Some scientists hypothesize that Earth's ozone layer is being damaged by ____.
a.
ultraviolet radiation
c.
plant life on Earth
b.
chlorofluorocarbons
d.
global warming


Please select the best answer from the choices provided

A
B
C
D

Answers

Some scientists hypothesize that Earth's ozone layer is being damaged by the emission of certain chemical compounds known as ozone-depleting substances (ODS), such as chlorofluorocarbons (CFCs).

b. chlorofluorocarbons

What are ozone-depleting substances (ODS)?

These substances have been widely used in various industrial processes, aerosol propellants, refrigerants, and fire suppression systems. When released into the atmosphere,

CFCs can reach the stratosphere and interact with ozone molecules, leading to their depletion and thinning of the ozone layer. Ultraviolet radiation is a consequence of ozone layer depletion, and global warming, while impacting the Earth's climate, is not directly linked to ozone layer damage.

Plant life on Earth plays a vital role in oxygen production and carbon dioxide absorption but is not a direct cause of ozone layer depletion.

Learn more about ozone layer at

https://brainly.com/question/520639

#SPJ1

The reading element punctuation relates to the ability to

pause or stop while reading.

emphasize important words.

read quickly yet accurately.

understand word definitions.

Answers

Answer:

A

Explanation:

Punctations are a pause or halt in sentences. the first one is the answer so do not mind the explanation.

semi colons, colons, periods, exclamation points, and question Mark's halt the sentence

most commas act as a pause

Answer: (A) pause or stop while reading.

Explanation:

Read the following scenario what type of business letter do you think is required in this situation?

Read the following scenario what type of business letter do you think is required in this situation?

Answers

Answer:

Cover letter

Explanation:

The type of business letter Melissa and Melrose would need to write is a Cover letter.

The Cover Letter is usually not more than a page document which gives a kind of summary or hint about who individual is and the quality of the individual, while highlighting why an individual is the best fit for the role they are seeking for.

Most recruiters usually make use of the cover letter, as a first hurdle, to screen out applicants especially when applications are much.

Melissa and Melrose, in addition to the resume they would submit for the volunteering job, would need a cover letter.

why is NAND gate known as universal gate? expain​

Answers

It's universal because it can be used to implement any gate, so you can use it as the only type of gate in a logic circuit.

jimmy is preparing a slide show; what is also known as a visual aid in a presentation?; alicia is working on a presentation about the top 10; harry wants to change the background of all his presentation slides; which feature of a presentation program interface provides; what is the name of the option in most presentation applications; which element should he use in order to hold their attention?; post test: working with presentations

Answers

A slide show, also known as a visual aid, is a collection of slides or images that are used to support and enhance a presentation.

What is Slide Master?

Presentation programs, such as PowerPoint, typically have a feature called a "Slide Master" that allows users to make global changes to the design and layout of all the slides in a presentation.

This could be useful for Harry if he wants to change the background of all his presentation slides.

To hold the audience's attention, Alicia could use elements such as images, videos, animations, and engaging content to make her presentation more interesting and interactive.

Post-test refers to a test or assessment that is given after a lesson or training has been completed. Working with presentations involves creating and organizing the content, designing and formatting the slides, and delivering the presentation to an audience.

To Know More About Slide Master, Check Out

https://brainly.com/question/28700523

#SPJ4

What is the advantage of using a translation look-aside buffer (TLB), also called associative memory, in the logical-physical address mapping process? Explain how the logical-physical address mapping logic works using an inverted page table. When does the MMU detect page-fault? Explain four of the main steps for resolving page faults.

Answers

Answer:

A) The advantage of using TLB is that it is used for storing the recent transactions of the virtual memory to the physical memory and this is used for the sole purpose of fast retrieval of data

B) When using an inverted table the logical-physical address mapping logic works as a hashing function by  connecting pieces of the hardware of logical address and getting them translated to the physical address. this hash function in turn generates the index to the frame table

C) The MMU detect page-fault when there is an exception been raised by the computer when a program is ran to access a memory page and this program is not mapped out by the MMU in the process

The four steps are :

The first step is to check on the memory address requested to make sure of  a  valid memory request.

 The second step is to setup A free frame  and a disk operation that is scheduled for getting the necessary page from the disk.

As the the I/O is been completed the processor table is been updated

Finally the   Instruction will get restarted from the beginning indicating what might have been caused by a page fault.

Explanation:

A) The advantage of using TLB is that it is used for storing the recent transactions of the virtual memory to the physical memory and this is used for the sole purpose of fast retrieval of data

B) When using an inverted table the logical-physical address mapping logic works as a hashing function by  connecting pieces of the hardware of logical address and getting them translated to the physical address. this hash function in turn generates the index to the frame table

C) The MMU detect page-fault when there is an exception been raised by the computer when a program is ran to access a memory page and this program is not mapped out by the MMU in the process

The four steps are :

The first step is to check on the memory address requested to make sure of  a  valid memory request.

 The second step is to setup A free frame  and a disk operation that is scheduled for getting the necessary page from the disk.

As the the I/O is been completed the processor table is been updated

Finally the   Instruction will get restarted from the beginning indicating what might have been caused by a page fault.

Type the correct answer in the box. Spell all words correctly.
Julio Is a manager in an MNC. He has to make a presentation to his team regarding the life cycle of the current project. The life cycle should
follow a specific sequence of steps. Which style of presentation is best suited for Julio's purpose?
Jullo should make a presentation
Reset
Next
s reserved.

Answers

Answer:

Julio is a manager at an MNC. He has to make a presentation to his team regarding the life cycle of the current project. The life cycle should follow a specific sequence of steps. Which style of presentation is best suited for Julio's purpose? Jullo should give a speech.

Explanation:

Answer: linear

Explanation:

Just got it right.  Linear presentations are sequential.

WHICH OF THE FOLLOWING TASKS ARE PART OF THE SOFTWARE EVALUATION PROCESS?
TESTERS...

Answers

With regard to software evaulation, note that the correct options are -

Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.

How is this so?

The tasks that are part of the software evaluation process include  -

Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.

Tasks not directly related to the software evaluation process are  -

Software developers writing code line by line.Creating a design for the software program.

Learn more about software evaluation at:

https://brainly.com/question/28271917

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Choose all that apply: Which of the following tasks are part of the software evaluation process?

testers check that the code is implemented according to the specification document

an specification document is created

software developers write code line by line

any issues with the software are logged as bugs

bugs are resolved by developers

a design for the software program is created

Other Questions
PLEASSEEEE HELPPP ME HURRRYY Which term refers to the ability to begin with specifics, such as accumulated facts, and then make general conclusions In August, 1963, Martin Luther King gave one of his most famous speeches at the Lincoln Memorial in Washington, DC? What do you think he is trying to say? Why do you think this speech was so important Which scatter plot represents the data shown in the table? A spring has a length of 0.200 m when a 0.300-kg mass hangs from it, and a length of 0.750 m when a 1.95-kg mass hangs from it. (a) What is the force constant of the spring The recognition in healthy people that risk factors are different depending on one's age and that certain health interventions are more effective at different critical moments is best described as a Environmental occurrences such as floods or hurricanes can change history true or false What is the circumference A middle-aged female presents complaining of recent weight loss. The physical exam reveals an enlargedpainless cervical lymph node. The differential diagnosis for this patient's problem includes: Carbon moves from place to place in areas called 50 POINTS!!! ANSWER ALL FOR BRAINLYIST!!! PLEASE HELP ASAPJackson is around his friend who is constantly sick. Jackson begins coughing and sneezing the next day at school. What is the possible stimulus and response?ResponsesInternal stimulus is coughing, the response is getting sickExternal stimulus is coughing, the response is getting sickExternal stimulus is getting sick, the response is coughingInternal stimulus is germs/bacteria, the response is coughingYou are growing a tomato plant in your house. Which of the following would the plant probably do to help maintain homeostasis?ResponsesNone of theseGrow toward the light coming from the windowGrowth is not affected by the light coming from the windowGrow away from the light coming from the windowWhich example is an internal stimulus?Responsesan increase in the amount of water available to a planta decrease in oxygen levels in the blood during exercisean artificial light that attracts insectsa sudden change of air temperatureWhich type of stimulus is an allergen, such as pollen?Responsesinternal stimulusinborn stimulusexternal stimulusresponse to stimulusWhen a plant responds to touch it is known as:Responsesgeotropismphototropismhydrotropismthigmotropism .2, A car starting from rest has an acceleration of0.5m/s2, what will be its final velocity after 5seconds? What distance will be covered bythe car at the end of 5 seconds? Which action shows good conflict resolution?A. yellingB.being selfishC.using "you" statementsD. compromising Plz help..How to name alcohols... ~h e l p~Choose the correct answer. Riddle tales ________________.A) are questions that are like jokesB) feature a character who must solve a riddle or puzzling problemC) are math story problemsD) are stories with a lot of "holes" in them what method was used to assign ipv4 tcp/ip parameters to the workstation in this example? abby bought 5 chocolate bars from the store she gave 1/4 a bar to her friends. how many friends got chocolaate. John C. Calhouns (from South Carolina) response to high tariffs was that.a) the federal government was right to use tariffs to raise revenue.(b) states had the right to nullify tariff laws that they felt did not serve their citizens.(c) tariff revenue should only be spent in the states from which the duties were collected.(d) high tariffs were necessary to protect southern agriculture A sample of helium gas is allowed to expand in a process that is adiabatic and quasistatic. As the gas cools from 105 degree C to 101 Degree C, it does 3.05 J of work on a piston. How many helium atoms are there in the sample? What is the value of x? Round the answer to the nearest tenth. DONT RESPOND WITH A LINK!!!!!!!