1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Julli [10]
3 years ago
9

Scenes that are shot outside are known as

Computers and Technology
1 answer:
Maru [420]3 years ago
3 0

Answer:

Location shooting

Explanation:

Most films feature a combination of locations and studio shoots; often‚ interior scenes will be shot on a soundstage while exterior scenes will be shot on location second unit photographs is not considered a location shoot. before filming the location are generally surveyed in pre-production‚

a process known as location scouting and recce.

You might be interested in
If Word finds a potential error in a document, a red, green, or blue wavy underline flags the problem.
dlinn [17]
As for this problem of true or false, the most probable answer the most likely one to be the correct answer would be A. True.

In Microsoft Word, or commonly referred to as MS Word, or simply Word itself as what is utilized in the problem, the program has the ability to recognize in spelling and grammar. When a red wavy underline is present, the word or words above it are usually wrong in spelling. Though this can be corrected by the user by adding the word in the dictionary so as not to be corrected in the future. The green one would be more about grammar. The blue wavy underline would indicate a word spelled correctly, but might be misused in the sentence it belongs. This usually happens to words that are almost identical in spelling like too and to.
8 0
3 years ago
Which character is used to begin a comment?
Aloiza [94]
# is used to begin a comment.
8 0
3 years ago
Which of the following applications can be used as a data source for a Microsoft® Word® mail merge? A.Outlook Contacts B.Microso
Xelga [282]
<span>Word can pull data from a variety of data sources to perform a mail merge. As part of the Microsoft Office suite, Word easily accepts data from Outlook, Excel, and Access, and other data sources such as web pages, OpenDocument text files, and delimited data files stored as plain text. And if you don't have an existing data source, you can create a new one in Word.
ALL OF THE ABOVE

</span>
8 0
3 years ago
Read 2 more answers
Which of the following are the functions of an os?
cricket20 [7]
Manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.
6 0
3 years ago
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it ma
Rashid [163]

Answer:

Blocking Mode    

Explanation:

Spanning Tree Protocol is used to allow path redundancy in the network without creating cycles/circles also called loops.

When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.

This affects the performance of the network as the result of broadcast packets flooding.

STP puts one port of the switch to forwarding mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to blocking mode and the one port that is left after this is placed in forward mode.

Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.

Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.

This information helps STP to eliminate the redundant paths.

So this is how STP allows only one active path to the destination while blocking all other paths to avoid switching loop.

6 0
3 years ago
Other questions:
  • In today's society, unethical actions are: A) Easier than ever to get away with, because the general public and insurers are les
    13·2 answers
  • You want to implement a mechanism that automates ip configuration, including ip address, subnet mask, default gateway, and dns i
    14·1 answer
  • Give a recursive implementation for the function: def is_sorted(lst, low, high) This function is given a list of numbers, lst, a
    10·1 answer
  • Pros and cons of access to a wide range of online services when it comes to an individual's safety?
    14·1 answer
  • 1. provide at least 3 properties and 3 methods of the object computer.
    8·1 answer
  • Write a program that uses nested loop or for statements to display Pattern A below, followed by an empty line and then another s
    5·1 answer
  • If tech is smarter than us. How did a human make something smarter than him/her?
    9·2 answers
  • What feature allows you to access previous copies of a document on OneDrive?
    15·2 answers
  • Que es tarjeta madre resumen porfa
    13·2 answers
  • Tiền tệ ra đời là kết quả
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!