1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
5

Filmmakers must often establish information quickly in a film in order to give the audience context for the plot. In this film,

the filmmaker establishes information about several of the main characters, including Lina and Don. What information do we as the audience learn about Don and Lina from time code 01:35 to 04:00 of the film? How does the filmmaker give us this information? Discuss at least two different ways that the filmmaker gives the audience information about these characters.
Computers and Technology
1 answer:
Dimas [21]3 years ago
8 0
One thing evident about the two individuals is that Don and Lina are famous. The filmmaker, in the beginning uses the announcer to introduce them as "known all over the world." Another thing to note is that Don and Lina personified themselves a certain way to their fans. The announcer believed sincerely that they were courting. While the announcer played a huge part in giving the audience information that Don and Lina were courting, the filmmaker made sure that audience (crowd in the scene) played a vital part too. Once Don and Lina posed for a picture together, the crowd went wild. This implies that the audience believed that they were together.
You might be interested in
In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and ano
salantis [7]

Answer:

(A) The CPU time for J1 is =2 ms other time is =18 ms, for J2 CPU time =6 ms other time = 24 ms, for J3 CPU time = 3 ms and other time = 12 ms (B) The CPU Utilization for uni-programming is 0.203 or 20.3% (C) For Multi-programming, when a program is not free and busy with an operation, the CPU is allocated to other programs.

Explanation:

Solution

Given that:

A(1)Job J1 = CPU time = 2ms  

Other time =18 ms

Total time = 20 ms

(2)Job J2 = CPU time 6ms

Other time = 24 ms

Total time = 30 ms

(3)Job J3 = CPU time = 3ms

Other time =12ms

Total time = 15 ms

(B) For the CPU Utilization for uni-programming, we have the following as follows:

CPU utilization =The total time of CPU/The total real time

Thus,

=(2 +6+3) / (18+24+12)

= 11/54

=0.203 or 20.3%

(C) For the CPU utilization for multi-programming,  when a program is not available that is busy in an operation, such as the input and output the CPU can be allocated or designated to other programs

5 0
3 years ago
In a List of Positive Integers, Set MINIMUM to 1. For each number X in the list L, compare it to MINIMUM. If X is smaller, set M
Dvinal [7]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given problem scenario is:

In a List of Positive Integers, Set MINIMUM to 1. For each number X in the list L, compare it to MINIMUM. If X is smaller, set MINIMUM to X.

The answer to question A is: this algorithm will not run because:

If you a list of a positive number and you have already set it MINIMUM to 1, the comparison result with MINIMUM will not obtain. For example, lets suppose a list of numbers L. L={1,2,3,1,1,5,4,3,2}. You have already set the Minimum to 1. When you compare each number X in the list, if X >MINIMUM, then set MINIMUM to X.  

This will not work, because there are positive numbers in the list and the minimum positive number is 1. So the algorithm, will not execute the if-part.

In short, the pseudo-code of this problem is given below:

<em>L={list of positive number e.g. 1,2,3,.......Xn}</em>

<em>MINIMUM=1</em>

<em>foreach ( X in L)</em>

<em>{</em>

<em>(if X<MINIMUM)</em>

<em>    { </em>

<em>        MINIMUM=X</em>

<em>    }</em>

<em>}</em>

The answer to question B is X will not be replaced because X  replaced with MINIMUM only when if-part of this algorithm get executed. However, it is noted that X will not replace any value, if if-part will get executed, the Variable MINIMUM will get replaced with any value.

4 0
3 years ago
Why do we use console.log in javascript when changing variables?
Fiesta28 [93]
It helps to debug the code. Instead of going through every line of code to find an error, using console.log can tell us where to look.
8 0
3 years ago
Read 2 more answers
which of the following is the full path and filename of the file that contains information about which interrupt request (IRQ) c
Drupady [299]

Answer:

INCOMPLETE QUESTION.... Options not provided, However, the answer is

/proc/interrupts

Explanation:

This file records the number of interrupts per IRQ on the x86 architecture. The output of this file is tabular.. with the first column for the IRQ number, another column for each CPU in the system, a third column the reports the type of interrupt and finally the last column holds the name of the device located at that IRQ

7 0
4 years ago
The part of the computer that provides access to the internet is the-?
Rina8888 [55]
The answer is D. Modem
7 0
3 years ago
Read 2 more answers
Other questions:
  • Exp19_Excel_AppCapstone_Intro_Collection
    10·1 answer
  • Difference between windows 2000 professional and service pack
    11·1 answer
  • If you have cable internet service, what protocol is used between the head end connection and the cable company's network
    8·1 answer
  • Describe a scenario for which a find unmatched query could be used.
    12·1 answer
  • To quickly jump to the last cell in a worksheet press ____.
    15·1 answer
  • The variable named var2 declared above will include an ending NULL character.
    9·1 answer
  • Text and graphics that have been out of copied are stored in area called the _____
    15·2 answers
  • 5. The image file format most suited for photographs is what? *
    8·2 answers
  • Using this feature keeps the message thread intact.
    14·2 answers
  • A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!