1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zarrin [17]
3 years ago
11

Match the job titles to the tasks

Computers and Technology
2 answers:
Serga [27]3 years ago
6 0

Match the job titles to the tasks.

aeronautical engineer

animator

webpage designer

commercial photographer

creates storyboards based on clients’

needs

arrowRight

assesses proposals for airplane designs

to determine if they meet standards

arrowRight

uses special equipment and techniques

to capture images

arrowRight

creates software code, graphics, and

multimedia elements for websites

arrowRight

bija089 [108]3 years ago
5 0

creates storyboards based on clients’ needs- Animator


assesses proposals for airplane designs to determine if they meet standards- Aeronautical engineer


uses special equipment and techniques to capture images- Commercial Photographer


creates software code, graphics, and multimedia elements for websites- Webpage designer

You might be interested in
What is an effective technique for searching the web? Choose one.
kakasveta [241]
Option B is what i would say 

if you are searching something and want a specific answer you are going to need to be specific on how you search it
4 0
3 years ago
Read 2 more answers
When the national economy goes from bad to better, market research shows changes in the sales at various types of restaurants. P
zhannawk [14.2K]

Answer: it will be greater by $2.6 billion

Explanation:

7 0
3 years ago
Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
Nesterboy [21]

Answer:

c. both the user and the provider of encrypted data.

Explanation:

In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.

5 0
3 years ago
3. What is a web directory? What are the key differences between web directories
MrMuchimi

Answer:

web directories are much smaller and more specific than search engines

3 0
1 year ago
github Portfolio Balances An investor opens a new account and wants to invest in a number of assets. Each asset begins with a ba
OLEGan [10]

The following code will be used to determine the maximum amount invested

<u>Explanation:</u>

long maxValue(int n, int rounds_rows, int rounds_columns, int into rounds)

{

   // Define the variable to store

   // the maximum amount invested.

   long max = 0;

   

   // Define an array of size n,

   // to store the n investments.

   long *investments = (long*)malloc(sizeof(long)*n);

   int i=0;  

   // Initially set all

   // the investments to 0.

   for(i=0;i<n;i++)

   {

       investments[i] = 0;

   }

   i=0;

   // Run the loop to

   // perform the rounds.

   while(i<rounds_rows)

   {

       // Get the left value

       // of the current round.

       int left = rounds[i][0];

       

       // Get the right value

       // of the current round.

       int right = rounds[i][1];

       // Get the contribution

       // for the current round.

       int contribution = rounds[i][2];

       // Since the user uses 1-based

       // indexing, subtract 1 from left

       // and right as the program uses

       // 0-based indexing. That is, the

       // investments in the array start

       // from 0 and not 1.

       right = right - 1;

       int j=0;

       // Run the loop to add the

       // contribution to all the investments

       // between left and right, both inclusive.

       for(j=left; j<=right; j++)

       {

           investments[j] += contribution;

       }

       i++;

   }

   // Traverse the investments array

   // to find the maximum element.

   max = investments[0];

   for(i=1; i<n;i++)

   {

       if(investments[i]>max)

       {

           max = investments[i];

       }

   }

   // Return the

   // maximum investment.

   return max;  

}

6 0
3 years ago
Other questions:
  • Which of the following is an example of a problem that could be attributed to poor ergonomics?
    10·1 answer
  • A self improvement plan should begin with planning how you will accomplish your goal.
    11·2 answers
  • When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
    5·1 answer
  • What part of the boot-up process initializes hardware and finds an operating system to load?
    14·1 answer
  • Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, wr
    14·1 answer
  • Question 3 (2 points)
    6·1 answer
  • WHY DO YOU DElete EVERY QUESTIONS THAT IS ASKED! Im a freaking guy, yes and i wont followers for my channel so leave me alone!
    7·2 answers
  • What is the full form of the OS?​
    15·2 answers
  • Alice is watching a speech over the internet. what type of message is alice attending to?
    10·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!