1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
4 years ago
15

Which best compares and contrasts visual and performing arts? Both careers use communication skills; however, people involved in

the visual arts perform live in front of an audience. Both careers use a high level of creativity; however, the performing arts includes musicians. Both careers speak to an audience; however, people involved in the performing arts speak only to a live audience. Both careers focus on technology; however, the visual arts involves both private and commercial customers.
Computers and Technology
2 answers:
Marysya12 [62]4 years ago
5 0

Answer:

C. Both careers speak to an audience; however, people involved in the performing arts speak only to a live audience.

Explanation:

trust me

Vlad1618 [11]4 years ago
3 0

Answer:

Both careers speak to an audience; however, people involved in the performing arts speak only to a live audience.

Explanation:

sorry im late but im not sure

You might be interested in
I just logged onto brainly and all my questions were deleted and i lost 2 brainliest. What has brainly done to my account I also
krok68 [10]
I’d say message Brainly directly through email!! it would be easier for them to help solve the issue since all we really can do is assume what happened, I hope you’re able to figure it out =)
5 0
3 years ago
Read 2 more answers
Desktop publishing design tools are represented by A. icons. B. windows. C. trackballs. D. modems.
AnnZ [28]
The best answer is A
Windows are the screens you can maximize and minimize.
Trackballs make the mouse move.
Modems are associated with internet connection.
Those three answers are unrelated leaving icons to be the most reasonable.
3 0
3 years ago
An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files f
LenKa [72]

Answer: Virus Hoax

Explanation:

A computer virus hoax is a message that warns someone of a false virus threat. It is a a chain email that encourages who ever has received the message to pass it to other people as a form of warning.

5 0
3 years ago
When making programmed decisions, the information needed to make this decision is __________, and the problem is highly structur
pentagon [3]

Answer:

readily available

Explanation:

The information needed to make this decision is readily available. That is because such decisions have been made countless times that strict guidelines have been created to handle any similar future decisions. These strict guidelines are organized as a sequence of events that must be followed accordingly and are always available for when the situation arises. Examples of this would be "What to do when a machine breaks?" or "What constitutes firing an employee?"

7 0
3 years ago
What is the advantage of using handouts?
Dvinal [7]
Handouts give options to provide detailed more information than putting it in a powerpoint slide, and it gives the audience the chance of getting more takeaways from the given presentation, and it is very useful if the presenter wants to be very technical and complex.
6 0
3 years ago
Other questions:
  • What is the definition of legal intrusion
    14·1 answer
  • Define scanning and why it’s considered one of the most important phases of intelligence gathering for an attacker. Also discuss
    10·1 answer
  • Why is it important to open the Map Custom Fields dialog box before importing/exporting a list of contacts? Check all that apply
    6·2 answers
  • : What is the difference between the Audio Mixer and the<br> Audio Meters Panel?
    7·2 answers
  • Considering current online newspaper editions and the characteristics of digital age media, how do you think newspaper design mi
    7·1 answer
  • Which domain ending can only be used by the U.S. government?
    14·2 answers
  • Please help!!! I am very confused about this question!
    10·1 answer
  • Explain working principle of computer.​
    5·2 answers
  • Why linked list is better than an array?
    7·1 answer
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!