1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arte-miy333 [17]
3 years ago
5

Identify way computer are used in television production​

Computers and Technology
1 answer:
Aleonysh [2.5K]3 years ago
3 0

Answer:

image editing, text om screen, weather graphics, animation, sattelites ... a lot more possibilites are endless just limited

You might be interested in
How do i install windows 7 on virtual machine?​
liberstina [14]

Choose Start→All Programs→Windows Virtual PC and then select Virtual Machines. Double click the new machine. Your new virtual machine will open onto your desktop. Once it's open, you can install any operating system you want.

3 0
3 years ago
True or false, cloud storage does not require internet access?
Dmitry_Shevchenko [17]
False, the storage is being accessed from the cloud which can only be accessed through an internet connection.
3 0
4 years ago
In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
Irina18 [472]

Answer:

In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

Explanation:

Generally, it is important to ensure that there is a successful operation in the operation of a TCP session. In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

4 0
3 years ago
Read 2 more answers
Automatic red-eye reduction settings work best on which type of flash?
zhuklara [117]

Answer:

c

Explanation:

3 0
3 years ago
What are three recommendations for reducing risk and improving the privacy of your personal information while using social media
viktelen [127]

Answer:

1. Treat the “about me” fields as optional.

2. Become a master of privacy settings.

3. Know the people you friend.

Explanation:

1. Treat the “about me” fields as optional.

Because these fields are offered, however, doesn’t mean you must fill them out. Consider offering a general version of the information requested or simply leaving the field blank. For instance, listing only your state of residence, instead of both city and state, can make it harder for others to figure out exactly where you live.

2. Become a master of privacy settings.

All social media sites give you the option to limit post viewing to specific audiences. Take the time to explore these settings, try different options, and become a master of their use.

3. Know the people you friend.

Once upon a time, social media users competed with one another to have the largest number of connections. Today, however, smart social media users know that the more people you’re connected to, the harder it is to control what happens to the information you post. Make sure you know the people you add on social media, in real life if possible. Don’t hesitate to use the “block” feature when the situation seems to call for it.

6 0
3 years ago
Other questions:
  • If you have a list of words that you wish me to make into a bulleted list, you must first highlig or ______ The words with the c
    13·1 answer
  • Net Worth is equal to assets minus liabilities. Which event will have the greatest impact (positive or negative) on one's net wo
    5·1 answer
  • Writenames of eight output device.​
    8·1 answer
  • T F The scope of a parameter is limited to the function which uses it.
    12·1 answer
  • 1. which of the following tools can be used to mesure mass. (answer = 5 +??? points)
    7·2 answers
  • The duties of a database administrator include determining which people have access to what kinds of data in the database; these
    13·2 answers
  • Select the correct word to complete the sentence
    11·2 answers
  • Can someone answer these 2 please
    9·1 answer
  • Explain benefits and disadvantages of using BNC over F-Type connectors on coaxial cables
    9·1 answer
  • Which bits of the address would be used in the tag, index and offset in a two-way set associative cache with 1-word blocks and a
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!