1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
9

What are the five elements of video production

Computers and Technology
2 answers:
Y_Kistochka [10]3 years ago
7 0
I’m pretty sure it’s the first one: sight, color, emotion, etc.
goldenfox [79]3 years ago
3 0
Answer: sight, color, emotion, sound, motion
You might be interested in
Q1: what is significant about the contents of the destination address field?
Stells [14]
<span>The destination address field must contain the MAC address.
The MAC address is needed to help find a device for an ARP request.</span>
All hosts on the LAN will receive this broadcast frame. The host with the IP address of 192.168.1.1 (default gateway) will send a unicast reply to the source (PC host). This reply contains the MAC address of the NIC of the Default Gateway.
5 0
3 years ago
Read 2 more answers
Computer-based networks that trigger actions by sensing changes in the real or digital world are known as: global marketing plat
Gennadij [26K]
It known as the smart systems

It make decision by describing and analyzing the available data in a predictive or adaptive manner thereby performing an efficient and smart actions based on that analysis

A lot of smart systems evolved from micro systems
8 0
3 years ago
A key step in the ____ approach to incident response is to discover the identify of the intruder while documenting his or her ac
muminat

Answer:d)apprehend and prosecute

Explanation: A intruder is a person who tries to access the system or damage it in an unauthorized manner. The person who is found with any intruding activity should be discovered.

Apprehending means of getting aware and prosecute defines the accusing of any person committing a crime .These activities define the nature of the intruder whose trying to commit the crime and should be detected while he  is pursuing the activity.Thus , the correct option is option(d).

7 0
3 years ago
Select the correct answer from each drop-down menu.
tia_tia [17]

Answer:

<dd> tag is used

Explanation:

The <dd> tag is used in HTML document to explain set of terms. The <dd> tag list is used in conjunction with the <dl> term. Inside a <dd> tag we can insert text, sentence, paragraph or links. There are 4 primary tags to build any website. Every HTML document begins and ends with HTML tag.

6 0
3 years ago
You send a report to your boss for feedback and she returns it to you with her edits noted in the electronic file. This Word fea
Lesechka [4]
Edits in the document are called, C. Track changes
3 0
3 years ago
Read 2 more answers
Other questions:
  • In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
    12·1 answer
  • Consider what fact-finding techniques you would use to identify the important facts needed to develop a database system. Please
    7·1 answer
  • Which of the following devices is used to connect a computer to a network
    7·1 answer
  • Do AirPods Pro have a green flashing light when charging?
    11·2 answers
  • What was the first fully computer animated feature film?
    13·1 answer
  • In class, we discussed static local variables in C. Answereach question below; if necessary, find and consult a reference on the
    10·1 answer
  • Let’s define a new language called dog-ish. A word is in the lan- guage dog-ish if the word contains the letters ’d’, ’o’, ’g’ a
    6·1 answer
  • Which statement correctly compares blank presentations and themed presentations?
    12·2 answers
  • Which of the following is NOT an example of soft skill?
    8·1 answer
  • Describe some common types of charts.​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!