1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
3 years ago
13

Perform online or offline research to learn more about film elements. Then, write a short report on the essentials of filmmaking

. Explain how these elements are dependent upon each other.
Computers and Technology
1 answer:
pshichka [43]3 years ago
3 0

Answer:

Screenplay

Financing

Theme

cinematography

editing

sound and music

Acting and Genre

Explanation:

There are various essential elements that needs to be considered to become a famous and a good filmmaker. A good filmmaker will take care of small elements and will consider minor details. The audience is very keen when it takes interest in the movie. They pay attention to even minor details in the movie. The filmmaker should take care of all the details and will have to decide on the main things such as screenplay, audio, editing, genre of the movie and similar. These elements are dependent on each other. If the audio of the movie is not appropriate or sound quality is not suitable then the overall impact of the movie will be slowed no matter how strong the content is. There is high dependency of all the elements and every element should be paid attention.

You might be interested in
The students of a college have to create their assignment reports using a word processing program. Some of the questions in thei
ser-zykov [4K]

Answer:

Table function

Explanation:

The table function can also be used to compare between items. The items can be arranged in columns and the features tonbe compared can be placed in columns. With this one can make comparison between the items.

5 0
3 years ago
Which of the following is NOT a rule you should follow when creating a presentation?
Nataly_w [17]
False, Write in full sentences and paragraphs on your slides - It is your presentation! Make it how you want to 
8 0
3 years ago
Which of the following detects unauthorized user activities, attacks, and network compromises, alerts of the detected attacks, a
Anit [1.1K]

The answer is IPS (Intrusion Prevention Systems)

The Intrusion Prevention Systems and Intrusion Detection Systems (IDS) are two security technologies that secure networks and are very similar in how they work. The IDS detects unauthorized user activities, attacks, and network compromises, and also alerts. The IPS, on the other hand, as mentioned, is very similar to the IDS, except that in addition to detecting and alerting, it can also takes action to prevent breaches.


3 0
3 years ago
The title element in the head section of an HTML document specifies the text
bagirrra123 [75]

Answer: c. that's displayed in the title bar of the browser

Explanation:

The title element in the html write up is used to describe the title of the work that is been carried out.

It has the format <title></title>, the title name is indicated between the opening and closing title tag.

The title does not display on the main page of the Web user's display, but it can be seen on the title bar of the Web browser.

The title element help Web user to have an idea of what a Web page is about.

7 0
3 years ago
In a cross-site request forgery, what components help send a forged HTTP request? In a cross-site request forgery, browser _____
Mariana [72]

<u>Answer:</u>

<em>In a cross-site request forgery, browser </em><u><em>Link</em></u><em> help send a forged HTTP request.</em>

<u>Explanation</u>:

<em>CSRF is a kind of attack which compels the user to click on the unwanted links </em>or make him to perform some actions on the browser which the user is not intended to do so.

<em>They mainly target on Change request such as fund transfers, modifying their mail id’s etc</em>.

So they do all things by knowing Social engineering tricks and transfer the control of the <em>user to one another application created by the hackers and obtain the information and it is not just for theft of data. </em>

4 0
3 years ago
Other questions:
  • X2/3-2x1/3-35=0
    14·1 answer
  • What control features will you use in the input screens to aid in data entry? give a specific example of how you will use at lea
    6·1 answer
  • For homework, we have to figure out what's in the picture. It's " too close to tell " but I can't figure out what it is. Any ide
    11·1 answer
  • In a word processing program, under which tab or menu option can you adjust the picture brightness?
    8·2 answers
  • Which wireless communication is typically limited to six feet of distance?
    14·1 answer
  • A lookup field allows the user to select from a list of values when updating the contents of a field. true or false.
    11·1 answer
  • Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
    12·1 answer
  • Good business ethics is a good marketing strategy. Discuss
    13·1 answer
  • The part of the computer that provides access to the internet is the
    7·1 answer
  • What is the interface of an app?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!