1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
12

Jason is an aspiring filmmaker. He manages finance and makes sure that everyone is involved in the project. Which role is Jason

playing? Jason is playing the role of a(n)
Computers and Technology
1 answer:
lana66690 [7]3 years ago
7 0

Answer:

a film producer.

is the role he is playing

You might be interested in
Readability is the level of vocabulary used on the page. True or false
konstantin123 [22]

Answer:

FALSE....john has no idea what hes talking about. i knew this was false yet i looked it up and got it wrong anyway because of john its freaking false

Explanation:

8 0
3 years ago
Where can elicitation techniques be used?
Nikitich [7]

Answer:

An elicitation technique is any of a number of data collection techniques used in anthropology, cognitive science, counseling, education, knowledge engineering, linguistics, management, philosophy, psychology, or other fields to gather knowledge or information from people.

Explanation:

3 0
3 years ago
An image can be copied from the Internet or another location and pasted into Paint.
Furkat [3]
It is true. You can copy and paste a picture into microsoft paint, using either the right click task bar or Ctrl c-ctrl v, you can then adjust the image to the desired size.
5 0
3 years ago
Someone help me out eh?
Elodia [21]

Line 4

It should be font-size: 15px

Also there should be curly braces in line 5.

6 0
3 years ago
Read 2 more answers
What is network management?
melamori03 [73]
Network management is  a broad range of  functions including activities, methods, procedures and the  use of  tools to administrate,operate,and  reliably maintain computer network system.  <span />
3 0
3 years ago
Other questions:
  • What is one problem you should keep in mind when researching information on the Internet?
    6·2 answers
  • Obtain a file name from the user, which will contain data pertaining to a 2D array Create a file for each of the following: aver
    5·1 answer
  • Betrand Meyer developed the ______ programming language which is not type-safe because it violates the law of contravariance.
    9·1 answer
  • / Looks up author of selected books
    15·1 answer
  • What are benefits of virtualizing servers ?
    5·1 answer
  • Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to
    9·1 answer
  • A computer program that enables users to create and work with files and folders is called what?
    8·2 answers
  • Which of the following is NOT an example of soft skill?
    10·2 answers
  • What is my mistake on this code? (Python)
    9·1 answer
  • Many large companies use the word(s), _____, to refer to the huge network of computers that meets their diverse computing needs.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!