1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tia_tia [17]
4 years ago
10

According to the video, what education and experience do employers look for in Reporters and Correspondents? Check all that appl

y.
Computers and Technology
2 answers:
butalik [34]4 years ago
7 0

Answer:

a journalism degree and reporting experience in college news outlets

Explanation:

Drupady [299]4 years ago
4 0

Answer:

The answer to this question can be defined as below:

Explanation:

Capacity to operate under either the stress of a time limit: Actually, this is an ability and also very necessary not because of this field and for most of the field.

Pry: It should be a desire to bring people the latest and fascinating content and write without clarity the same.

Skills of people: It is the most important skill for both journalist and interviewer since the key task is to communicate with people.

A language flair: Such a researcher needs to obtain consistent data or correct information.

You might be interested in
What is an example of using the internet of things (iot) to deliver innovative cloud-based solutions to customers?
Elina [12.6K]

Answer:

Wearable technology

Explanation:

An example of using the Internet of Things (IoT) to deliver innovative cloud-based solutions to customers is the wearable technology that provides customers with on-the-spot personalized experiences.

4 0
2 years ago
Explain the tearms alink and vlink​
Aleks [24]

Answer:

The <u>alink (active link)</u> color appears while the mouse is clicking the link. The <u>vlink (visited link)</u> is the color of the link after the user has already visited it.

4 0
3 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
3 years ago
How much mobile data does maps use
aleksandrvk [35]
Open up setting, cellular option, and you can view the amount of mobile data each of your apps take
5 0
4 years ago
Pros and cons of using the internet
MAVERICK [17]
It is easy to find information, but it is not always right.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power
    7·1 answer
  • ______ engineers build prototype cars and troubleshoot them.
    8·2 answers
  • Which column and row references are updated when you copy the formula: =F$5+12? Value 12 Column F Column F and row 5 Row 5
    8·1 answer
  • When communicating with a server on another subnet, which of the following settings is used to determine which direction it need
    6·1 answer
  • A) Suppose a computer has an instruction pipeline with 4 phases. How many cycles (if there are no delays) would it take to compl
    13·1 answer
  • Complete the GiftCard class shown below. A GiftCard keeps track of the current balance on the card. A gift card starts with a be
    11·1 answer
  • Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
    5·1 answer
  • What does the following code print to the console?<br> if 88 * 100:<br> print("cardio")
    8·1 answer
  • Who would benefit from using self-driving cars
    10·2 answers
  • Write a function solution that given an array a of n integers (between -100 and 100), returns the sign (-1,0,1) of product of al
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!