answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr402 [8]
2 years ago
10

Which selections are possible for controlling the start time of audio playback? Check all that apply. Automatic Rewind when done

playing Trim audio On click Play across slides
Computers and Technology
1 answer:
sergij07 [2.7K]2 years ago
5 0

Trim audio on click would be your answer

You might be interested in
Insert an IF function in cell F5 to calculate the total due. If the customer has chosen home delivery, there is an additional de
adoni [48]

Answer:

=IF((D5="Yes"),(C4*1.05),C4)

Explanation:

If condition accepts 3 parameters, where the 1st parameter is the condition and second parameter is the one which needs to be executed “if the condition is true” and the third argument is executed when the “condition is false”.

Here the condition is if there is an delivery ie. D5 = yes, then we add some amount of additional charges through the formula (c4*1.05) and if not we retain the base price C4.

Here the additional delivery charges are considered as 5%. You can change the number according to your need.

5 0
2 years ago
Read 2 more answers
Considering the following algorithm, which of the following requirements are satisfied?
Alisiya [41]

Answer:

b) Bounded Waiting

Explanation:

int currentThread = 1;

bool thread1Access = true;

bool thread2Access = true;

thread1 { thread2 {

While (true) {

                   While (true)

                                   {

                     while(thread2Access == true)

                                       {

                                      while(thread1Access == true)

                                       {

                                            If (currentThread == 2) {

                                              If (currentThread == 1)

                                                {        

                                                  thread1Access = false; thread2Access = false;

                                                  While (currentThread == 2);

                                                 While (currentThread == 1);

                                                  thread1Access = true; thread2Access = true;

} }

/* start of critical section */ /* start of critical section */

currentThread = 2 currentThread = 1

… ...

/* end of critical section */ /* end of critical section */

thread1Access = false; thread2Access = false;

… ...

} }

} }

} }

It can be seen that in all the instances, both threads are programmed to share same resource at the same time, and hence this is the bounded waiting. For Mutual exclusion, two threads cannot share one resource at one time. They must share simultaneously. Also there should be no deadlock. For Progress each thread should have exclusive access to all the resources. Thus its definitely the not the Progress. And hence its Bounded waiting.

4 0
2 years ago
Using range(1,101), make two list, one containing all even numbers and other containing all odd numbers. How can I do this on Py
jeka94

Answer:

even = []

odd = []

for i in range(1,101):

if i % 2 == 0:

even.append(i)

else:

odd.append(i)

4 0
1 year ago
In one to three sentences describe one reason you would import data into a datebase
Bond [772]

The primary reason that you would import data into a database is because the data already exists somewhere else.

As an example, you may have a spreadsheet that contains names and telephone numbers of a group of people. It is much faster to import this data into a database instead of manually entering the information.

8 0
2 years ago
A small company is moving towards sharing printers to reduce the number of printers used within the company. The technician has
Misha Larkins [42]

Answer:

Security risk associated with sharing a printer are

  1. Printer Attacks
  2. Theft
  3. Breach of data
  4. Vulnerable Network

Explanation:

Printer Attacks

A network printer can be used for a DDoS attack.As printer are not very secured and are a weak link in network these can be easily exploited by the hackers for any kind of malicious activities and even lanching a DDoS attack.

DDoS attack is denial of service attack in which network is flooded with malicious traffic which cause it to choke and make it inaccessible for users.

Theft

Physical theft of document can be an issue.Anyone can just took printed pages from printer tray by any one.

Breach of Data

The documents which are printed are usually stored in printer cache for some time which can be accessed by any one connected to the network. Any document containing confidential information which are printed on network printer can fall in wrong hands.

Vulnerable Network

As mentioned a single unsecured network printer can pose great threat to entire network as it can provide a way into the network.

8 0
2 years ago
Other questions:
  • A _______ is a shortcut to a web page saved in a list in the internet explorer desktop application.
    14·1 answer
  • Targeting encourages drivers to scan far ahead and _____________. A. focus their visual attention on the next point on the road
    8·2 answers
  • A(n) ______of the audio or video clip makes the content easily accessible to people with hearing disabilities.
    10·2 answers
  • Lance is at a bus station. His friend is using the ATM machine to withdraw some money. Lance notices a stranger deceptively watc
    6·2 answers
  • Why can't you use Friedman's attack on block ciphers?
    12·1 answer
  • Enter a nested function in cell G8 that displays the word Flag if the Payment Type is Credit and the Amount is greater than or e
    9·1 answer
  • The base class Pet has private fields petName, and petAge. The derived class Dog extends the Pet class and includes a private fi
    6·1 answer
  • What does NOT match with Agile Manifesto?
    9·1 answer
  • Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of s
    11·1 answer
  • Choose the response that best completes the following statement.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!