1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alekssr [168]
3 years ago
13

You have a technical interview for a new position in digital media. One of the questions you are asked is this: “A client asks y

our advice as to whether their promotional video should be fixed or streaming and confesses that they aren’t entirely clear on the difference between the two. What would you advise them and why?” How would you respond to this question?
Computers and Technology
1 answer:
GalinKa [24]3 years ago
7 0

Pre-production is vital to all members of the crew. It ensures that the entire crew knows exactly what's going on. If they need to know why we're shooting in a certain way, or why we're shooting in a certain place, they can see the entire process that we've gone through in order to get to where we are.

You might be interested in
Which two extensions in scratch are correctly matched to their accessibility goals
enyata [817]

The two extensions in scratch are correctly matched to their accessibility goals Translate extension and  Text to speech extension.

<h3>What are Scratch Extensions?</h3>

Scratch extensions are known to be used in an interface with external hardware and information outside of the Scratch website via new blocks.

Note that The two extensions in scratch are correctly matched to their accessibility goals Translate extension and  Text to speech extension.

Learn more about scratch  from

brainly.com/question/25720264

#SPJ1

4 0
2 years ago
4. The Internet may best be compared to a/an A. series of colored lights. B. loud truck motor. C. enormous skyscraper. D. large
Triss [41]
D. Large network of roads.

A resembles a modem/router and C a webserver.
6 0
3 years ago
Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
lbvjy [14]

Answer:

Algorithm:

1. Declare an integer variable N.

2. Read the value N from user.

3.While(N):

 3.1 find r=N%10;

 3.2 print r in new line.

 3.3 Update N as N=N/10.

4.end program.

Implementation in C++.

// header

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int N;

cout<<"Enter an Integer:";

   cin>>N;

// find the digits of number

   while(N)

   {

       // last digit

       int r=N%10;

       // print last digit

       cout<<r<<endl;

       // update the number

       N=N/10;

}

return 0;

}

Output:

Enter an Integer:329                                        

9                                                          

2                                                          

3

7 0
3 years ago
HELP<br> When differentiating data, the WHAT of the data is:
Anna007 [38]

Answer:

a source and a target.

Explanation:

In computer science and information theory, data differencing or differential compression is producing a technical description of the difference between two sets of data – a source and a target.

7 0
2 years ago
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
Other questions:
  • Which option should you select to ignore all tracked changes in a document
    6·1 answer
  • How can you logout your account and do not want to have this anymore
    12·2 answers
  • Type dig www.example A in order to get the IP address of www.example. What’s the TTL of the A record returned in the response? W
    9·1 answer
  • Effective presentations vary the color scheme on each slide.<br><br> True<br> False
    5·2 answers
  • Video-sharing sites such as youtube and vimeo provide a place to post short videos called clips, true or false?
    10·1 answer
  • Who is the fan of Techno gamerz and Total gaming
    10·1 answer
  • What is a mod in programming?<br><br> Give more Java questions
    12·1 answer
  • Assume there is a 30-byte heap. The free list for this heap has two elements on it. One entry describes the first 10-byte free s
    15·1 answer
  • Need help ASAP.<br> I am so lost.
    5·1 answer
  • Artificial intelligence (AI) and machine learning are especially important during which security information and event managemen
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!