1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Julli [10]
3 years ago
9

Scenes that are shot outside are known as

Computers and Technology
1 answer:
Maru [420]3 years ago
3 0

Answer:

Location shooting

Explanation:

Most films feature a combination of locations and studio shoots; often‚ interior scenes will be shot on a soundstage while exterior scenes will be shot on location second unit photographs is not considered a location shoot. before filming the location are generally surveyed in pre-production‚

a process known as location scouting and recce.

You might be interested in
The following types of websites are
zzz [600]
Mmm what are u talking abouy
3 0
3 years ago
Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
pishuonlain [190]

Answer:

d. define

Explanation:

DMAIC is an acronym for Define, Measure, Analyze, Improve and Control is a data-driven improvement cycle used for improving processes and driving Six Sigma projects.

Important tools used in the define phase of the Define, Measure, Analyze, Improve, and Control (DMAIC) process include;

- A project charter.

- A description of customer requirements.

- Process maps.

- Voice of the Customer (VOC) data.

5 0
3 years ago
A bakery collects data on sales. Each sales record includes the date of the sale and some metadata about the items that were par
professor190 [17]

Answer:

B. Which customer most frequently purchases bread.

Explanation:

As per the scenario, the data we are receiving from the sales record of the bakery is :

The date on which the items are sold

Each items name which are sold

The number of each item sold and

The price of each item sold  

These data are required to estimate how much the company has earned the profit during a given period of time.

So from the above scenario, there is no data given about the customer i.e customer name, customer number, etc. So there is no chance to track the details of a customer purchase history.

Therefore, the most appropriate answer is option B

6 0
3 years ago
¿Por qué es importante que lo países crezcan a nivel tecnológico?
IrinaK [193]

Answer:

Importancia de la tecnología en el crecimiento económico de los países. ... El desarrollo de estas vías tecnológicas aporta un aspecto positivo como el ahorro del tiempo, la disminución de los esfuerzos de los trabajadores que permite una economía progresiva.

Explanation:

4 0
3 years ago
A key step in the ____ approach to incident response is to discover the identify of the intruder while documenting his or her ac
muminat

Answer:d)apprehend and prosecute

Explanation: A intruder is a person who tries to access the system or damage it in an unauthorized manner. The person who is found with any intruding activity should be discovered.

Apprehending means of getting aware and prosecute defines the accusing of any person committing a crime .These activities define the nature of the intruder whose trying to commit the crime and should be detected while he  is pursuing the activity.Thus , the correct option is option(d).

7 0
3 years ago
Other questions:
  • Your friend, who is a little computer phobic, is going to create his first web page, and he asks you to recommend some software
    13·1 answer
  • A geologist is part of what career feild
    6·1 answer
  • The create_python_script function creates a new python script in the current working directory, adds the line of comments to it
    9·1 answer
  • What country threatens Denmark at the beginning of Hamlet as evidenced in Marcellus’s question, "Why this same strict and most o
    13·1 answer
  • How to search for the largest files on my computer vista?
    5·1 answer
  • You are testing a web application for sql injection vulnerabilities. you send various sql statements which return results on the
    5·1 answer
  • Digital communications describes a process in which two or more computers or devices transfer ____, ____ and instructions.
    12·1 answer
  • Which result is most likely if a network packet has no header?
    9·2 answers
  • Identify the benefit of modeling to communicate a solution.
    10·1 answer
  • Why is Linux widespread in academic environments?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!