1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
3 years ago
6

Nina aspires to be a digital media specialist. What should Nina be familiar with in order to pursue this career?

Computers and Technology
2 answers:
Alecsey [184]3 years ago
8 0

Answer:

The correct answer is letter "D": software programs.

Explanation:

Digital Media Specialists create content displayed in videos and other design software such as videogames. Most of the time they start working with an associate's degree but the idea is for them to pursue a bachelor's degree.  

<em>Digital Media Specialists must be familiar with design software programs such as InDesign</em>. According to the U.S. Bureau of Labor and Statistics (BLS), these professionals can make around $72,520 per year (2018).

never [62]3 years ago
6 0
D because they do more about software
You might be interested in
Why is it important to follow a consistent naming convention for variables?
Vitek1552 [10]

Answer:

today I am going to be out for the job interview so if I will make it happen I am going to New Orleans this week to get the kids to work on the spot and I can get ready to go out to dinner and I can make a few more people

4 0
2 years ago
Match each item with a statement below. - A parameter in a method header. - A set of methods that can accept a call given the pa
Bas_tet [7]

Answer:

                                 

Explanation:

6 0
2 years ago
UML is a graphical language that is used for designing and documenting software created within the _____________ framework. (a)
stealth61 [152]

Answer:

The answer is "option d".

Explanation:

UML stands for Unified Modeling Language. It is an OOPs based language that is used to design a graphic by software developers. This language can also be used to build diagrams and provide some tools to ready-to-use, interactive templates for users and other options are not correct that can be described as:

  • In option a, The Top-down approach is not followed by UML.
  • In option b, UML uses an object-oriented programming language that follows a bottom-up approach. It refers to a style of programming.
  • In option c, It does not use structured programming because it uses procedural languages.

7 0
2 years ago
How do you insert text into a presentation?
ElenaW [278]

Answer:

Its most likely the last one

Explanation:

But like, what kind of quesiton is this?

7 0
2 years ago
Read 2 more answers
Describe how to deploy a website and make it as secure as possible while reducing its resources used
erastova [34]

Answer:

Explanation:

in order to deploy a website, you use these 5 steps, the first step is the preparation step, the second step is to set up DNS record, in step 3 a live testing is set up, in step 4 you set up email accounts while in step 5, you back up and now go live.

in order to secure your website from any threat, malware it hacker it it is necessary to use HTTPS. HTTPS, protects the websites integrity. it also provides data protection as data encryption provides such security. parameterized queries can also be used.

5 0
2 years ago
Other questions:
  • After a normal system shutdown, when the computer is turned off, contents of the memory used to store bios settings are
    12·2 answers
  • If r is an instance of the above Person class and oddNum has been declared as a variable of type boolean, which of the following
    8·1 answer
  • The Sumif formula will add numbers together from a range of numbers ONLY IF they contain the criteria. True or false
    8·1 answer
  • How do computers find servers, requests information from the server, and receives it?
    12·1 answer
  • In the Word 2016 window, where is the Status bar located?
    11·1 answer
  • IOS jail broken or Android unrooted which is better to hack with
    6·1 answer
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • A business letter is not written:
    6·1 answer
  • In this exercise, first run the code as it is given to see the intended output. Then trace through each of the 3 variables to se
    8·1 answer
  • What would be an ideal scenario for using edge computing solutions?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!