1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
3 years ago
13

What is the fifth and final stage in the process of media production

Computers and Technology
1 answer:
Mama L [17]3 years ago
6 0

edit is the 5th and distribute is the final stage in process of media production


You might be interested in
Which type of unshielded twisted pair (UTP) is commonly used in Ethernet 10BASE-T networks, which carry data at a rate of 10 Mbp
tino4ka555 [31]

Answer:

Category 3 (CAT3) Unshielded Twisted Pair cable

Explanation:

A Category 3 (CAT3) Unshielded Twisted Pair cable is a cable that makes use of the conductivity of copper to transmit data and power. These cables are an older standard for Ethernet cables and can handle data speeds of up to 10mbps.The succeeding standard for Ethernet cables include CAT5 which has speeds of up to 100 mbps, CAT 3 is mostly used in applications where speed is not of great importance such as in PBXs and VoIP telephone systems.

6 0
3 years ago
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
The following code segment is a count-controlled loop going from 1 to 5. At each iteration, the loop counter is either printed o
quester [9]

Answer:

True.

Explanation:

For all the count values, if Ranfun() returns true then all the values of count would be printed. Then the sequence of count values printed would be 1 2 3 4 5. Also for all the values of count if Ranfun() returns false then all the values would be enqueued. When we try to dequeue elements from queue we would get them in the same order of their entry into the queue. Thus, the sequence would be 1 2 3 4 5. Hence, we can say that this output sequence is possible. TRUE.

4 0
3 years ago
When encountering another vessel in darkness or reduced visibility, what do visible red and green lights indicate
mina [271]
The sides of the vessel.
5 0
4 years ago
__init__(self, features, phones): create/initialize instance variables for features and the list of phones (optional) in the pla
vredina [299]

Answer:

class Phone(object):

   def __init__(self, features, phones=[]):

       self.features = features

       self.phones = phones

Explanation:

In python object-oriented programming, an instance variable of a class object is created in the "__init__()" method. the "self" is a convention name used to represent the instance of an object class. The input values are assigned to the object variable with the self.'argument_name' statement.

When the phone argument is not given, the self.phones variable is initialized as an empty list.  

8 0
3 years ago
Other questions:
  • TRUE/FALSE: In order to use an object in a program, its class must be defined.
    10·1 answer
  • When you are duplicating an object, what does the Rows field number tell you?
    10·1 answer
  • If you need to reprogramming your gps after you begin driving __.
    15·2 answers
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • Which spreadsheet operation does a look function perform?
    5·1 answer
  • The desktops of computers running the same OS all look the same
    8·1 answer
  • One interesting application of computers is to display graphs and bar charts. Write an application that reads five numbers betwe
    5·1 answer
  • Anyone Free to Talk??????? I'm Bored :(
    6·2 answers
  • You CANNOT add text to any filled shape.<br> O True<br> False
    8·1 answer
  • What is 11100111 to decimal form?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!