1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
11

Imagine that you are an independent filmmaker making a feature-length narrative film in the United States, with a variety of bot

h indoor and outdoor scenes, to be released first in select theatres. You do not have large financial resources. Which traditional film camera type would you choose for your project and why?
Computers and Technology
2 answers:
Lerok [7]3 years ago
7 0
Although an 8mm or 16mm would be better cost wise, I personally would use a 35 mm camera for this type of film. The 35mm is the only camera that would work well on a big screen. It is a rather expensive camera but no other camera could fit on the big screen.
Artist 52 [7]3 years ago
6 0

Answer:

I would use a digital camcorder with a telephoto lens to be able to capture the animals and their environment. I would also try to use a wide-angle lens to capture their full environment.

Explanation:

You might be interested in
Withdrawal from a conflict is best used when ______.
Liono4ka [1.6K]

Answer:

Neither side can reach an agreement

Explanation:

i just took the test

6 0
3 years ago
Read 2 more answers
What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?
Sati [7]

Question with options:

What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?

-private

-web server

-public web

-web client

Answer:

Web server digital certificate such as SSL(Secure Sockets Layer) Certificate

Explanation:

Digital certificates are certificates issued by trusted authorities (called Certificate Authority such as Encrypt Certificate Authority) and allow users determine the originality of a resource. With these certificates, users can confirm who the issuer of the certificate is and to whom the certificates are issued. They give users more confidence when using the web.

To determine the authenticity of a web server to a client, a web server digital certificate such as SSL certificate is used.

8 0
3 years ago
Which element can be changed using the Print pane? Check all that apply
asambeis [7]

Answer:B C D E

Explanation:

EDGE 2021

3 0
3 years ago
Select the pieces of information that are added on to data to get it where it is going.
oksian1 [2.3K]

Answer:

IP address and MAC address

Explanation: The IP address tells the server what network to send the information to, the MAC address tells the local network what device to send it to.

5 0
3 years ago
Why should you limit what information is in your digital footprint?
oee [108]

Answer:

Your “digital footprint” includes all traces of your online activity, including your comments on news articles, posts on social media, and records of your online purchases. When you know the boundaries of your digital footprint and take steps to contain it, you can help protect your identity and your reputation.

Explanation:

3 0
4 years ago
Other questions:
  • In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating system
    5·1 answer
  • Using the spreadsheet below, which formula can be used to determine Albert's hourly wage?
    6·2 answers
  • Mr. Ray is looking for a platform to launch his product. His marketing team advises him to launch the product via as it is free
    15·2 answers
  • 18
    6·1 answer
  • Provide a class Letter for authoring a simple letter. In the constructor, supply the names of the sender and the recipient: def
    11·1 answer
  • At one college, the tuition for a full-time student is $6,000 per semester. It has been announced that the tuition will increase
    7·1 answer
  • The following procedure is intended to return the number of times the value val appears in the list nylist. The procedure does n
    15·2 answers
  • 2. 25 POINTS!!!!!!!!!
    8·2 answers
  • Which type of information should never be given out on social media?
    5·2 answers
  • Which type of malware prevents you from accessing files stored on your computer?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!