1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
6

My friend broke her leg and i wont be able to do this. can one of you do me a solid and finish this while i help her?

Computers and Technology
2 answers:
alina1380 [7]3 years ago
8 0

Answer:

some pros of being a freelance artists are:

you have no boss, you are technically your own boss

you can choose how many hours to work and when to work

you can also choose from where to work (which is actually great in the current time)

the potential of earning more money exists

some cons of being a freelance artists are:

even though the potential of earning more exists, earnings are not stable

freelance workers get paid on a project basis, so that means that your working hours might be very long

freelancers receive no benefits, e.g paid vacation, health insurance, etc.

the risk of not being paid exists, but it is much lower if you use certain well known freelance websites

There are a lot of jobs available for freelance artists, although there are also a lot of freelance artists out there, e.g. animator and GFX artist, digital designer, etc.

your welcome :), I hope ur friend gets better!

const2013 [10]3 years ago
4 0

Answer:

Explanation:Chica, ¿de qué diablos estás hablando? Por favor, sé más específico.

You might be interested in
Write a program that reads a list of words. Then, the program outputs those words and their frequencies. Ex: If the input is: he
Gnom [1K]

Answer:

The program in Python is as follows:

wordInput = input()

myList = wordInput.split(" ")

for i in myList:

   print(i,myList.count(i))

Explanation:

This gets input for the word

wordInput = input()

This splits the word into a list using space as the delimiter

myList = wordInput.split(" ")

This iterates through the list

for i in myList:

Print each word and its count

   print(i,myList.count(i))

8 0
3 years ago
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where ____ percent travels th
lianna [129]
I believe the correct answer is 75%. <span>The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where 75% percent travels through wi-fi or 3 gb travels through wi-fi. Hope this answers the question. Have a nice day.</span>
4 0
3 years ago
Read 2 more answers
During an interview, your non-verbal communication (body language, gestures, tone of voice, speed of talking,
kompoz [17]

Answer:

True

Explanation:

People will judge you based upon your non-verbal communication. If your non-verbal communication is bad then you might not get the job.

8 0
4 years ago
3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, proces
andriy [413]

Answer:

a,b,c,d,f,g are true only e is false

6 0
3 years ago
Other questions:
  • Suppose that, in addition to edge capacities, a flow network has vertex capacities. That is each vertex vv has a limit l(v)l(v)
    7·1 answer
  • Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during
    12·2 answers
  • Which rule should be followed to stay safe online
    5·1 answer
  • Imagine a system with 64MB of physical memory. Suppose the OS and its data structures occupy 16MB and there are two processes, o
    12·1 answer
  • If $350 is the profit of an initial investment of $1000.00, what is the percentage profit?​
    11·2 answers
  • Which one of these lifestyle factors has led to the buildup of litter in our
    13·2 answers
  • Consider a direct-mapped cache with 256 blocks where block size is 16 bytes. The following memory addresses are referenced: 0x00
    7·1 answer
  • A letter of application should be written on:
    13·1 answer
  • Backing up your data on a regular basis is a part of the
    14·2 answers
  • Who is known as the first computer programmer?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!