?
Solved

connecting 2 wav audio files into one file

Posted on 2011-03-03
4
Medium Priority
?
184 Views
Last Modified: 2012-05-11
I am using a cell phone dictation app to record. I then use software to convert into wav format. What I need to do now is connect both files. Since I am limited to 3 minutes and I need to give a 5 minute speech, I'm going to do part 1 and part 2. Ideally I can tack on the part 2 after I've converted into wav format. I am using windows vista. How would I go about doing this?
0
Comment
Question by:libertyforall2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 84

Accepted Solution

by:
Dave Baldwin earned 2000 total points
ID: 35032359
I use Audacity http://audacity.sourceforge.net/ for audio editing.
0
 
LVL 14

Expert Comment

by:VBClassicGuy
ID: 35036526
Not trying to steal points, please use Dave's solution. I just want to add quick bit of info. After downloading Audacity here:

http://audacity.sourceforge.net/download/

Here is how to do what you want:

How do I combine two files into one longer file?
Follow these steps to splice two files together:

1.Import both files into Audacity.
2.Select the second one by clicking on its label (the area around the mute/solo buttons).
3.Choose “Find Zero Crossings” from the Edit menu.
4.Choose “Cut” from the Edit menu.
5.Place the cursor by clicking in the first track, after the end of the audio.
6.Choose “Paste” from the Edit menu.
You can press the Play button to hear the result, and use the Export commands (in the File menu) to save it as a sound file.

0
 

Author Closing Comment

by:libertyforall2
ID: 35184432
ok
0
 
LVL 84

Expert Comment

by:Dave Baldwin
ID: 35184582
Thanks.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This post contains step-by-step instructions for setting up alerting in Percona Monitoring and Management (PMM) using Grafana.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question