1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
3 years ago
14

Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?

Computers and Technology
1 answer:
Naddik [55]3 years ago
7 0

Answer:

1. Public Relations

2. Search Engine Optimization

Explanation:

Given that a public relations degree holder can work in various capacities such as Advertising, Media, Event, and Sale promotion position. Hence Claire needs a bachelor’s degree in PUBLIC RELATIONS.

Similarly, given that the knowledge of Search Engine Optimization is crucial in Digital media coordination, as it helps to drive and gain web or online traffic both in quality and quantity.

Hence, Claire also needs to know about Search Engine Optimization.

You might be interested in
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
Give the name and the syntax of the HTML Tag which is <br><br>used for creating a Hypertext Link.​
Annette [7]

Answer:

<a href="enter_site_url_here">Click here to visit site!</a>

Explanation:

href is the link that the element is going to point towards. Meaning it's going to direct the end-user to that site. "Click here to visit site!" is the text that the element is going to say, and that text will have an underline. So it's best to keep it short as you don't want <u>something like this happening on your site</u>.

I'd stick with the classic "here" as the text and have the text before-hand say "Click" and after-hand say " to visit site X" with X being the site name. Or, something along those lines.

8 0
2 years ago
Write an application that reads the lengths of the sides of a triangle from the user. compute the area of the triangle using her
zlopas [31]

Here you go,


import java.util.Scanner;

import java.util.Random;

public class OrderCalculator{


public static void main(String[] args){  


float x, y, z, semi, area;

Scanner in = new Scanner(System.in);

System.out.print("Enter the 3 sides: ");

x = in.nextFloat();

y = in.nextFloat();

z = in.nextFloat();

semi = (float) ((x + y + z) / 2.0);

area = (float) Math.sqrt(semi * (semi - x) * (semi - y) * (semi - z));

System.out.printf("The area is: %.3f\n", area);


}

}

3 0
3 years ago
In which scenario would someone most likely be
andrew11 [14]

Answer:

Option 1. Brent is preparing for his class speech

Explanation:

I chose option one because he would need presentation software to show his class about his speech

5 0
3 years ago
Can someone tell me 5 facts about Registers and RAM, please?
Maslowich

\int\limits^a_b {x} \, dx \left \{ {{y=2} \atop {x=2}} \right.  \lim_{n \to \infty} a_n \neq \neq \geqAnswer:

A register is a temporary storage area built into a CPU. ... The instruction register fetches instructions from the program counter (PC) and holds each instruction as it is executed by the processor. The memory registers are used to pass data from memory to the processor.

PLS MARK BRAINLIEST!!!

PLEASE

:

3 0
2 years ago
Other questions:
  • Într-o curte sunt G găini și O oi. Să se determine numărul de capete și numărul de picioare din curte.
    13·1 answer
  • Describe one example of how technology assits people with data and sample collection
    14·2 answers
  • What is the difference between simple and complex waveforms?
    10·1 answer
  • Explain the factors involved in selecting a routing protocol to be used on a network.
    12·1 answer
  • Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
    10·1 answer
  • You have answered 4 of 18 questions.
    12·2 answers
  • Programming challenge description: Write a program that, given two binary numbers represented as strings, prints their sum in bi
    6·1 answer
  • How to program a game​
    7·2 answers
  • What might a designer need to consider when choosing an appropriate energy source for products and power systems
    15·1 answer
  • Which of the following boxes should replace question mark
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!