1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
11

When creating a documentary, what is not an appropriate source for footage?

Computers and Technology
1 answer:
Lorico [155]3 years ago
3 0
The answer to this is similar documentaries on youtube!! Hope i helped
You might be interested in
A Variable can only hold numbers<br><br> True<br><br> False
Effectus [21]

Answer:

true

Explanation:

tere are two types of variables and one can hold nos

5 0
3 years ago
Read 2 more answers
Suppose that a client performs an intermixed sequence of (queue) enqueue and dequeue operations. The enqueue operations put the
Ivanshal [37]

Answer:

b,c and d can't occur.

Explanation:

Queues always preserve sequence.

8 0
4 years ago
Discuss, in brief thedifferent variations of BLAST. (Maximum 5 innumber)
schepotkina [342]

Answer:

Five variations od BLAST are as following:-

  1. BLASTP
  2. BLASTX
  3. TBLASTX
  4. BLASTN
  5. TBLASTN

Explanation:

BLASTP - Searches a protein database with a protein sequence.

BLASTX - This program searches protein database using a translated nucleotide sequence.

TBLASTX - Searches DNA databases using a protein query.

BLASTN -Searches a nucleotide sequence against DNA database.

TBLASTN - Searches nucleotide sequence to a DNA database.

5 0
4 years ago
What is closeable interface in java.
alisha [4.7K]

Answer:

A Closeable is a source or destination of data that can be closed. The close method is invoked to release resources that the object is holding (such as open files).

Explanation:

hope it help?

8 0
3 years ago
What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
GrogVix [38]

Answer:

PAP authentication method

Explanation:

PAP known as Pass word authentication protocol Basically, PAP works like a standard login procedure; the remote system authenticates itself to the using a static user name and password combination, so not recommended for applications.

6 0
3 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • Compilers can have a profound impact on the performance of an application. Assume that for a program, compiler A results in a dy
    8·1 answer
  • Brock wants to use several images on his hiking blog. However, the images are making his pages load very slowly. Explain to Broc
    6·1 answer
  • Each brochure template produces _____ pages of graphics, business information text boxes, and story boxes.
    15·1 answer
  • Ted reads a sentence: The man said that it would take 10 to 12 days for a reply. He believes the hyphen symbol can replace the w
    11·1 answer
  • You have heard that it is possible to improve your computer's performance by storing all related files for a particular program
    9·1 answer
  • In the negative side of the battery, there are millions and millions of _________.
    14·1 answer
  • Convert one billion byte into one storage unit​
    6·1 answer
  • Hi I'm new here can everyone add me as frein ​
    8·1 answer
  • What are the chances of a baby zombie to spawn in full golden armor in MC? ​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!