A user tries to open a movie in Windows Media Player but no image is displayed and only audio plays Which software must be installed on the computer?​

Answers

Answer 1

There are software that are often installed in systems for audio player. The software must be installed on the computer is Codec.

Codec is simply refered to as a short form for the word coder-decoder. It is known as an algorithm that is often used when encoding data. Example an audio or video clip.

The encoded data is often decoded as it is played back.

It act by limiting the size of media file and it also increases the processing power that is needed to play the file back correctly.

Learn more from

https://brainly.com/question/14338673


Related Questions

by what order of magnitude is something that runs in nanoseconds faster than what runs in milliseconds

Answers

A nanosecond is a billionth of a second, whereas a millisecond is a thousandth of a second. The nanosecond process is 1,000,000 times faster. Briefly explain two breakthroughs in the history of computing.

The _______ margin is the one required for APA formatted papers.

Answers

Answer:

1-inch

Use 1-inch margins on every side of the page for an APA Style paper. However, if you are writing a dissertation or thesis, your advisor or institution may specify different margins (e.g., a 1.5-inch left margin to accommodate binding).

Explanation:

Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's managerial role of enforcing these functions

Answers

Answer:

Coordinating, monitoring, and allocating database administration resources

Explanation:

people and data. Defining goals and formulating strategic plans for the database administration function.

Separate database servers and web servers.  

Use web application and database firewalls.  

Secure database user access.  

Regularly update your operating system and patches.  

Audit and continuously monitor database activity.  

Test your database security.  

Encrypt data and backups.

The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.

Software installation and Maintenance.

Data Extraction, Transformation, and Loading.

Specialized Data Handling.

Database Backup and Recovery.

Security.

Authentication.

Capacity Planning.

Performance Monitoring.

What are the process of hacking computers

Answers

Answer:

Reconnaissance- Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.

Scanning- Next comes Scanning the system.Scanning also means to collect information but active information.For eg. Pinging on the system, checking the ports, services, etc.

Gaining Access- Then according to information gathered from the above two phases, we plan and implement our attack.

Maintaining Access- After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.

Clearing tracks- The final step is to clean all traces which indicate the attackers presence so that all logs or tracks are cleared as this is an evidence of attacker's presence.

Explanation:

Have a great day!

Which group on the Note Master tab contains the command to add footers to the notes pages?

Answers

Answer:

Place Holders

Explanation:

The date of creation can be added to a slide using the:

a.

"Insert" tab, "Add note" group


b.

"Edit" group of the ribbon


c.

"Insert" tab, "Text" group

Answers

Answer:

The answer to your question is Insert tab Tex group.

The date of creation can be added to a slide by using the: "Insert" tab, "Text" group.

What is a slide?

A slide refers to a single page of a presentation that is made up of text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic, subject matter, event or idea.

In Microsoft Powerpoint, an end user can add the date of creation to a slide by using the "Insert" tab, "Text" group.

Read more on slides here: https://brainly.com/question/11741377

#SPJ2

Activity 4 - Accomplishing the Scoring Card Direction: Evaluate yourself by checking the appropriate boxes to indicate the degree of competency in nail care tools and equipment.

pls help guys:-(​

Answers

The score that will be given to the identification of nail care tools, materials, and equipment will be 15.

Nail cure tools and equipment are the tools that are used for taking care of the nails. These include a nail file, nail clipper, nail cleaner, nail brush, etc.

The score that will be given to the identification of nail care tools, materials, and equipment is 15. The demonstration of knowledge on the safety practices of nail care tools, materials, and equipment will be 15 while the classification will be 10.

In conclusion, the total score will be 40.

Read related link on:

https://brainly.com/question/25711916

Technician A says that a DPDT switch is equivalent to two SPST sets. Technician B says that
the circuit diagram of a DPDT switch is the same as an SPST switch. Who is correct?
Select one:
O a. Technician A only
O b. Technician B only
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B

Answers

Answer:

Socratic app

Explanation:

it will help you

What is true about client-side scripting?

Answers

Answer:

A client-side script is a program that is processed within the client browser. These kinds of scripts are small programs which are downloaded , compiled and run by the browser. JavaScript is an important client-side scripting language and widely used in dynamic websites.

Explanation:

Client-side scripting refers to the execution of scripts on the client's device (typically in a web browser) rather than on the server.

Given that,

To write about client-side scripting.

Since, Client-side scripting simply means running scripts, such as JavaScript, on the client device, usually within a browser.

All kinds of scripts can run on the client side if they are written in JavaScript because JavaScript is universally supported.

Therefore, client-side scripting enables the execution of scripts on the client's device, enhancing web interactivity and reducing server load.

JavaScript is a widely used language for client-side scripting.

To learn more about scripting visit:

https://brainly.com/question/26121358

#SPJ4

Best sustainable practices for delivering digital technologies to clients

Answers

Answer:

Recommend the client spread out their data centers to distribute energy usage globally.

Explanation:

Have a great day!

The technology can be made sustainable by asking clients to spread the data centers and by sustainably incorporating the design.

What are sustainable practices?

Sustainable practices are the approach that uses technology with respect to the protection of the environment. The social, economic, and environmental balances are established when sustainable computational technologies are implemented.

This practice allows the client to spread the centers and applications globally on a large scale and can be accomplished by building the software once and should avoid redeveloping.

Therefore, to distribute the energy the data centers must be established.

Learn more about computational sustainability here:

https://brainly.com/question/26133975

#SPJ2

Do you trust machine learning application?

Answers

Answer:

Trusting a machine learning model, in general, can be interpreted as creating a robust model which gives largely accurate results and has a high generalization ability. Classification models learn from past experience, so the robustness of a model primarily depends on the given training set

Explanation:

Hope it helps

                         Please mark as brainliest

what does project manager do?

Answers

project managers (PMs) are responsible for planning, organizing, and directing the completion of specific projects for an organization while ensuring these projects are on time, on budget, and within scope.

It specifies the amount of memory needed to store data.

Answers

magbigay ng limang magandang lugar na tinatawag na tourist spot sa iyo sa inyong lugar o probinsya

Answer: Is it RAM? Random Access Memory

Explanation: Ram is used to reading/writing data. It might control the amount of memory that is stored.

the document area is where you save your file true or false

Answers

Answer:

A few popular places to save files are under “desktop” or “documents" and then in a specific folder. If you saved the file to your desktop, you do not need to go through finder to access it. You can simply minimize all your windows, and click on it there. Double click on the file and you're ready to open it.

Explanation: TRUE. A.

Lewis wrote an informational academic paper about deer. He rereads his work and is starting to revise for academic voice.

Which sentence needs to be revised for an academic voice?

The buck, or male deer, is a noble animal that has great speed.
Deer enjoy corn, but they get most of their nutrition from grass.
Some people think they can tame deer, but I just don’t buy it.
Deer tend to be extremely nervous and dash away when startled.

Answers

Answer: C. Some people think they can tame deer, but I just don’t buy it.

Answer:

The answer is C

Explanation:

Hope this helped! :)

The process of redefining the functionality of a built-in operator, such as , -, and *, to operate on programmer-defined objects is called operator _____. a. overriding b. overloading c. initializing d. testing

Answers

It should be noted that the process of redefining the functionality of a built-in operator to operate is known as operator overloading.

Operator overloading simply means polymorphism. It's a manner in which the operating system allows the same operator name to be used for different operations.

Operator overloading allows the operator symbols to be bound to more than one implementation. It's vital in redefining the functionality of a built-in operator to operate on programmer-defined objects.

Read related link on:

https://brainly.com/question/25487186

Say yes if you hate edge2021?

Answers

Answer:

Yes I hate it

Explanation:

Yes it's simple

Backup software creates backups and prevents you from losing all your data, so would backup software be considered an application software or utility software?

A). application software

B). utility software

Answers

Answer:I also think it's b because it litterlottery says or a utility software so obviously a utility software WOULD be considered a utility software.

Explanation:

Option(B). Utility software is the correct answer.

Antivirus, backup software, file managers, and disk compression tools are examples of utility software. These programs evaluate and keep up computers. These programs are designed with an emphasis on how the OS functions, and they carry out tasks to make the machine run efficiently.

What is a Utility software?A computer's databases, directories, and files are all backed up using backup utility software. It frequently works by creating an exact clone of the entire disk. If data loss happens, the user might be able to recover the lost data using the computer's backup utility tool.All systems and applications on a computer system that keep it functional are referred to as utility software.The utility software on a computer consists of parts that help the operating system to organize, maintain, and manage its performance under all conditions.In addition to supporting the computer's architecture, this kind of software is distinct from application software, which carries out tasks for the user.Utility software may need the consent of a user with administrative rights on the computer before executing its functions or being replaced.An operating system and a collection of utility apps are often installed when manufacturers create a computer.Although the user has the option to replace or install other utility apps, this utility software is generally seen as a part of the operating system. A computer's databases, directories, and files are all backed up using backup utility software.Often, it functions by making an exact copy of the entire disk. Using the computer's backup utility program, the user may be able to retrieve lost data if it happens to them.



To know more click here-
https://brainly.com/question/2909686

#SPJ2

Which of the following is not an artificial intelligent technology?

Speech recognition

Text analytics and NLP

Computer vision

Robotic desktop automation

None of the above

Answers

Robot desktop automation

Write two statements to assign numApples with 10 and numOranges with 3. Sample output for given program: Apples: 10 Oranges: 3

Answers

numApples = 10

numOranges = 3

print(f"Apples: {numApples}")

print(f"Oranges: {numOranges}")

The statements should assign numApples with 10 and numOranges with 3.

The code is written in python.

The variable numApples is used to assign the number of apples and numOranges is used to assign the number of oranges.

The number of apples and oranges were outputted with the print statement in python.  

I used the f strings in python to concatenate strings and integers.

The bolded values in the code are python key words.

read more: https://brainly.com/question/13785329?referrer=searchResults

Microcomputer hardware consists of three basic categories of physical equipment _____a. System unit, Input/output, Memory b. System unit, input/output, secondary c. Keyboard, monitor, hard_drive d. System unit, primary storage, secondary storage.​

Answers

Answer:

c

Explanation:

Hope it helps!!

sure po ako dyaan

switches use resistors in series and parallel and can function well as digital inputs
to electronic control systems.
Select one:
O a. Proximity
O b. Smart
O C. Touch-sensitive
O d. Push button

Answers

Answer:

d push button bc it will cut all power when in off

A while loop uses a(n) ___________ at the top of every iteration to test whether to continue or not.

Answers

Answer:

boolean

Explanation:

while loops test to see if something is true or false to know when to continue the loop

____allow(s) visually impaired users to access magnified content on the screen in relation to other parts of the screen.

Head pointers
Screen magnifiers
Tracking devices
Zoom features

Answers

I think the answer is Screen Magnifiers

Answer: screen magnifiers

Explanation: got it right on edgen

What is the difference between Background and Watermark?​

Answers

Background is the very back of a photo, watermark is an overlay to the photo

What are software applications?

Answers

Answer:

the first option is obviously the correct answer

Write a statement that declares an anonymous enumerated type with the enumerators SMALL, MEDIUM, and LARGE.

Answers

Enumerated data types are simply data types that contains a set of named values called enumerators.

The required statement is enum {SMALL, MEDIUM, LARGE} ssize;

The syntax of the anonymous enumerated type is:

enum {List of enumerators} name of variable;

From the question, the enumerators are SMALL, MEDIUM, LARGE.

The name of the variable could be ssize

Hence, the anonymous enumerated type statement is:

enum {SMALL, MEDIUM, LARGE} ssize;

Read more about enumerated data types at:

https://brainly.com/question/15518342

ANY KIND PERSON HERE?
in our new situation. what are the things we already use before but we value more now a days to protect our self from virus, write your answer on space provided. ___1. __________________________ ___2.__________________________ ___3.__________________________ ___4.__________________________ ___5.__________________________​​

Answers

Answer:

1. face mask

2. face shield

3. following the social distance

4. taking a vaccine

5. taking care of ourselves

Explanation:

hope this helps

Answer:

1. Face mask
2. Hand sanitizer
3. Alcohol
4. Drinking vitamins
5. Hand wipes/tissues


Hope this helped:)

If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only community, what kind of software would this be?

Answers

Answer:

Explanation:

crm

Create an 80x86 program that define an array of doubleword numbers then read two values, first one indicates how many actual numbers will be in the array, and an integer n. The program should display all of the numbers in the array that are greater than the number n.

Answers

The program requires user to read a specified number of values beyond a set limit from a given array. The program which performs this task is written in python 3 thus :

from random import randint

#import the randomint module

import random

#import the random module

double_list = [randint(11, 99) for p in range(0, 10)]

#randomly selects a list of 10 double integer values

def rand_num(lis, n_values , n):

#initialize a function named rand_num which takes in 3 parameters

filter = [val for val in lis if val > n]

#filters the variables to contain those only greater than the specified limit

arr_ = random.sample(filter, n_values)

#using the sample function, select the stated number of values from the filtered list

return arr_

#return the selected values

n_values = int(input('Enter number of values : '))

#prompts user for the length of array

n = int(input('Enter limit : '))

#prompts user for the limit of the values to be included in the array

print(rand_num(double_list, n_values, n))

#A sample run of the program is given and output attached.

Learn more :https://brainly.com/question/25434178

Other Questions
How do consumers obtain energy and nutrients?how do consumers obtain energy and nutrients Which type of weld is made by welding around the perimeter of ahole? 4. If the paint costs $30 per gallon and you need to spend $60 on supplies, and you cansave $45 per month, in how many months will you have enough money for the project? 3. Labour Productivity what is the meaning of this? How does this relate to Macro economy? religous issues by charles 1 I need help i have no clue what to do! Happy late Thanksgiving!!! 1. Based on the prediction of the experts, which among the energy resources in the Philippines will reach larger volume in terms of human consumption by year 2030? Explain.1) fossil fuel production 2) carbon3) petroleum The best advantage of sexual reproduction is? It is more efficient than asexual reproduction It is safer than asexual reproduction It results in identical offspringIt increase genetic diversity through meiosis, crossing over, and random assortment of chromosomes In a 30 minute show 12 minutes of airtime are spent on commercials. Determine what percent of the television show air time is spent on commercial How does human insecurity affect health? The poet of "To the Virgins, to Make Much of Time" uses personification to bring the world to life and to create a lively and immediate tone in the poem. In fact, he personifies all of the following except _____.Click here to read the poem.timea flowerthe sunage The area of the hexagon pictured above is ___ units2. Round answerto the hundredths. pLS HELP ME 15 points in total How many grams are contained in the quantity 0.34 mol Ca The business case for why companies should act in a socially responsible manner includes such reasons as si es muy bonito el dinero pero no te sirve tenerlo guardado How did the Mauryan Empire's army help to promote trade?A. It helped defeat rival trading empires.B. It protected trade routes from thieves.C. It helped acquire new colonies for raw materials.D. It stopped the importation of unfamiliar products. The ____________ is an ideal spot for nomadic sheep herding A. Pamirs B. Tian Shan C. Karakum D. Eurasian Steppe(I search this question up and it was either A or D but I have no idea which one is the real correct answer to this question) welp me out hurry Isabelle found shell casings at the secondary crime scene. What type of evidence does this BEST represent?