1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serggg [28]
3 years ago
10

Christopher is part of a film production. His job is to analyze the movie script and create a shooting schedule. What is Christo

pher’s designation?
A. production manager
B. scriptwriter
C. lead actor
D. casting director
Computers and Technology
2 answers:
chubhunter [2.5K]3 years ago
7 0

Answer:

I personally think myself that if I had this answer I would pick the scriptwriter so B

Oksi-84 [34.3K]3 years ago
3 0
I am pretty sure he would be the production manager
You might be interested in
Rest or take a break every __ minutes when typing. Please help!
Talja [164]
Maybe like 3-5 I think im right
3 0
3 years ago
Read 2 more answers
Hi I paid for brainy plus, but it says the it can't renew and try paying for it again but it won't work. Please help
Scorpion4ik [409]

Answer:

Contact CS, ( customer support ) They should be able to help you. Go to this link for more info. brainly.com/contact/index

Explanation:

8 0
3 years ago
An algorithm whose worst-case time complexity is bounded above by a polynomial function of its size is called a(n)
Sedaia [141]

Answer:

polynomial-bounded algorithms

Explanation:

There are two algorithm complexities and they are time and space complexities. They can be denoted with the big-O notation. The big-o notation for a time and space complexity gets the worst-case time and space respectively.

The time complexity gets the measure of the execution time of an algorithm. When the time function is a polynomial ( k^n + k^n-1 ...) then the algorithm is said to be a polynomial-bounded algorithm.

4 0
2 years ago
Real GDP removes any inflation from the calculation of GDP. Why is it important to remove a general increase in prices from the
Katen [24]
<span>C. Not including inflation into the caluculation will over-estimate the GDP.</span>
8 0
4 years ago
hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
aalyn [17]

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

3 0
3 years ago
Other questions:
  • You can put a small level on your camera to help keep the horizons straight? TRUE OR FALSE
    14·2 answers
  • Write a C++ program that determines if a given string is a palindrome. A palindrome is a word or phrase that reads the same back
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • What forms the foundation of cloud computing?
    12·1 answer
  • Write a complete Java program called Stewie2 that prints the following output. Use at least one static method besides main. ////
    9·2 answers
  • Complete the do-while loop to output every number form 0 to countLimit using printVal. Assume the user will only input a positiv
    9·1 answer
  • Wrtie a program in which we will pass a value N. N can be positive or negative. If N is positive then output all values from N d
    8·1 answer
  • Each drop-down menu.
    8·1 answer
  • What distinguishes Accenture’s Cloud capabilities from our competitors?
    12·1 answer
  • What is the difference between compliled and intebrated language?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!