1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
2 years ago
14

Read the description of Mike’s work, and identify his profession. Mike’s job is to record sounds in a studio. He studies a video

and physically recreates ambient sounds such as the opening and closing of a drawer, the creaking of a chair when a person sits down, and the sound of a keyboard when a person types on it. Mike is a
.
Computers and Technology
2 answers:
adoni [48]2 years ago
8 0

Answer:

The correct answer would be, Audio Engineer.

Explanation:

An Audio Engineer is also called as Sound Engineer or Recording Engineer. The work of an Audio Engineer is to produce ambient sounds. The Audio Engineer recreates sounds of things that cannot be produced by mouth of a person, like for example they may create sound of trees in the stormy night, the sound of wind, the sound of windows, the creaking of chair when a person sits on it, sound of keyboard when a person types on it, opening and closing of doors, etc. All such type of sounds are made by audio engineers. They use a mix of audio effects to produce the most accurate sounds of the type. So Mike is An Audio Engineer.

kipiarov [429]2 years ago
7 0
Mike is a Sound Engineer
You might be interested in
Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
pshichka [43]
Int   k=0.total=0;
while(k++<50)
    total+=k*k;
    

5 0
3 years ago
Which of the following formats can algorithms NOT be written in:
Zina [86]
The answer is Flow chart
6 0
3 years ago
Part B: Find the value of G: if A = 3, b=4, and C = 5.
antiseptic1488 [7]

Answer:

G=(A^3 + B) * 4-c^2

To calculate G if A=3, b=4 and C=5

cobegin

p1: A^3 = 27

P2:C^2 =25

P3: p1 +B =31

P4:P3*4 =124

P5:P4-P2 =99

coend

Explanation:

One operation is performed at a time, and on the basis of priority as we have only one processor.

6 0
3 years ago
Which two settings must you configure when fortigate is being deployed as a root fortigate in a security fabric topology?
Goryan [66]

The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices.
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

<h3>What is security fabric settings?</h3>

The term Security Fabric is known to be a tool that aids one or allows one's network to be able to automatically see and also dynamically isolate any kinds of affected devices.

Note that is one that can also partition network segments, update rules, and they can bring out new policies, and delete malware.

Hence, The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

See full question below

Which two Security Fabric features are on FortiManager? (Choose two.)

Select one or more:

A. Enables you to view the logical and physical topology of Security Fabric devices

B. Enables you to run security rating on FortiGate devices

C. Enables you to view the security ratings of FortiGate Security Fabric groups

D. Enables you to view and renew Security Fabric licenses for FortiGate devices

Learn more about security from

brainly.com/question/25720881

#SPJ1

8 0
2 years ago
When you use an external style sheet with an html document, you get all but one of the benefits that follow. which one is it?
Lina20 [59]
The answer to this is your CCS files are easy to create and maintain
6 0
3 years ago
Other questions:
  • Information systems security is the collection of activities that protect the information system and the data stored in it.
    12·1 answer
  • Which of these automotive repair areas helps the vehicle change speeds to operate efficiently under all conditions?
    5·1 answer
  • PLEASE HELP
    12·2 answers
  • ______ is an example of unauthorized access to your computer or accounts.
    14·1 answer
  • Can you get financial aid with average grades
    15·1 answer
  • Machine-to-machine (M2M) technology enables sensor-embedded products to share reliable real-time data ________.Select one:a. ove
    14·1 answer
  • All of the following are examples of being computer literate, EXCEPT ________. Group of answer choices knowing how to build and
    7·1 answer
  • CORRECT ANSWER GETS BRAINLIEST
    8·2 answers
  • The graphic shows a cause and effect organizational aid.
    6·1 answer
  • What are the features of the title bar for the Microsoft word application?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!