1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
7

In the scene where we see Don and Lina acting in a silent film (beginning at time code 11:05), describe the silent film. How is

it different from the films that are produced today?
Computers and Technology
1 answer:
asambeis [7]3 years ago
4 0
Well, it was black and white…and it was silent. That's a lot different from today because we have surround sound, color TV, 3D/4D etc.

(I wish there was more to go on, but from time code 11:05 it only lasted for a few seconds. Hope this helps!)

You might be interested in
What is the name and purpose of the star next to a slide in a PowerPoint presentation?
Finger [1]
If you observe closely, you may see that these stars are shown only against some slides and not all of them.

The stars are just an indication that the particular slide has custom animation. That was you can quickly see at a glance if a slide has content that is animated.

The same star symbol is also shown when the slide itself has any slide transition set.
7 0
3 years ago
_______ requirements are courses that build knowledge and skills in a specific
snow_tiger [21]
B. Specialization :))
7 0
3 years ago
If you were the manager at a firm which deals with sensitive information of its customers, employees and other stake holders, ho
Rzqust [24]

Answer:

explanation below

Explanation:

Management controls are some of the techniques and mechanisms that can be put in place to implement security policies – which ensure information and information systems are protected.  These controls are not only used by managers but can be exercised by selected users.  

These controls must be put in place to cover all forms of information security, physical security and classification of those information.  

5 0
3 years ago
A director notices that one of his camera operators is carrying an accessory without packing it properly in a bag to avoid hurti
slega [8]

Answer:

B. a tripod

Explanation:

We cannot have any problem with the electronic viewfinder, because is part of the camera, with this viewfinder we can see the picture that we will take.

A camera lens can be huge or tiny, but we cannot hurt anyone with them, and headphones are harmless.

In this example we have a tripod, there are different types of tripods, but always have three legs, and we could hurt someone if we don't carry it properly.

7 0
3 years ago
In your own words, what is your definition of cybercrime and computer forensics?
mr_godi [17]

Answer:  

Cyber crime is also known as computer crime in which the illegal activities are done by the computer and many mobile devices. There are many types of crime but the cyber crime are associated with the computer crime by hacking personal documents and email spamming.

To resolve these type of cyber crime there is special type of police which is known as cyber cell. Data theft, cyber stalking and accessing other user data without there permission is all comes under the cyber crime.

Computer forensics is type of application that are used in investigation purpose and gathering the information from the computer.

The main aim of computer forensic is to perform and maintain the various type structured investigation and also maintain the systematic documents for the evidence.

7 0
3 years ago
Other questions:
  • Will the fcc ruin the internet affect uk
    5·1 answer
  • The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
    10·1 answer
  • Linguist study_____
    8·1 answer
  • You need to know the MAC address of a Windows 8 computer. How can you accomplish this?
    7·1 answer
  • Which type of connection is needed to synchronize data with a cloud service?
    8·1 answer
  • In a meeting, Juan hears someone say a product mix is "wide." What does
    13·1 answer
  • Nonverbal messages from the movie it​
    5·2 answers
  • Find the basic period and basic frequency of the function g(t)=8cos(10πt)+sin(15πt)
    9·1 answer
  • Upload your completed project including the following:
    13·1 answer
  • You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. No matter
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!