1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
3 years ago
11

Identify at least five different Arts, A/V Technology, and Communications careers that you could pursue in your home state, and

choose the three that appeal to you the most. Out of the three, write a one-page essay describing which one would be your career choice and the educational pathway that you would have to follow in order to obtain that career. Finally, identify at least three colleges, universities, or training programs that are suited to that career choice. You can use the following resources to help you:
Computers and Technology
1 answer:
maxonik [38]3 years ago
3 0

Answer:

Five careers in the Arts, A/V Technology, and Communications cluster that would be interesting to me are choreographer, museum conservator, reporter, singer, and fashion designer. Of those careers, being a museum conservator, singer, or fashion designer sounds the most appealing to me. Out of all those choices, I think that being a fashion designer seems the most interesting and would allow me to use my creativity.

Fashion designers create patterns and construct sample garments for a target market. They use models to determine how the garments will fit and modify them as necessary to get the desired look. In order to excel in this position, I would need to be able to think creatively; establish working relationships with models, designers, and others in the industry; and organize my time in order to accomplish the necessary work and meet deadlines.

There are several schools that offer a degree in fashion design, such as Savannah College of Art and Design, Academy of Art University in San Francisco, Kent State University, and the University of Cincinnati. Several technical schools also focus on fashion design, such as the Fashion Institute of Design & Merchandising. I think I would choose to attend Parsons in New York, which has turned out many famous fashion designers, such as Marc Jacobs, Jenna Lyons, and Tom Ford.

Explanation:

plato answer

You might be interested in
Assume the system with 256B memory and 64B cache and the block size of 16 bytes. I.e., there are 4 blocks in the cache.
Arada [10]

Answer:

a. 100%

b. 50%

c. 66.6%

Explanation:

a.

The memory references D6, 58, D8, 9A, DE and 5C all results in misses and the miss ratio is 100 (that is , 6 misses/ 6 references*100 = 100%)

b.

If fully associative cache is used, there will be a 3 cache misses with miss ratio of (3/6*100) = 50%.

c.

With a 2-way set-associative cache, 4 memory reference misses will occur, with a miss ratio of (4/6*100)= 66.6% misses.

6 0
3 years ago
A developer writes a trigger on the Account object on the before update event that increments a count field. A workflow rule als
Andreyy89

Answer:

The answer is "2"

Explanation:

In the given question, the answer is "2" because if the user is new. so very first, the user creates its account and after creating his account, he will update his account value.

When the user creates its account, the value will be 1, and when he updates its account value. so, the value will be 2, that's why 2 is the correct answer.

4 0
4 years ago
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
4 years ago
The italic button is located on the
SashulF [63]
It is located on Mini Tool Bar 
6 0
3 years ago
_____ refers to displaying information for the user's view.
Fantom [35]
It is A outputting (if you want I can show what it says in the dictionary)
7 0
3 years ago
Read 2 more answers
Other questions:
  • We will pass you 2 inputsan list of numbersa number, N, to look forYour job is to loop through the list and find the number spec
    12·1 answer
  • A motherboard uses dual channeling, but you have four DIMMs available that differ in size. The motherboard supports all four siz
    7·1 answer
  • A Network Attached Storage device is good for _____.
    11·2 answers
  • In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the l
    11·1 answer
  • Which statement best describes what happen to the temoporary working memory (RAM) of a computer when it shut down
    12·2 answers
  • Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
    7·2 answers
  • List any two programs that are required to play multimedia products
    8·1 answer
  • Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and
    12·1 answer
  • 8. Give regular expressions with alphabet {a, b} for
    6·1 answer
  • Writing queries in sql to compile data from a database is related to the physical level of databases true or false?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!