1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
6

Help please lol...

Computers and Technology
2 answers:
Neko [114]3 years ago
8 0

Answer:

cutaway shots are put in to help the editing process, and to provide extra information or interest

Explanation:

Lelu [443]3 years ago
8 0

Answer:

ideal shots are put in to help the editing process, and to provide extra information or interest.

You might be interested in
In 1-2 sentences, describe some keyboard shortcuts you have used during this lesson to save you time.
Aneli [31]
Command C command V command A
5 0
3 years ago
Read 2 more answers
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
kumpel [21]
The email should be lighter but they're variables such as the word processing program. Not sure if this answered your question.
6 0
4 years ago
Read 2 more answers
Abdhbhbhsbfhsbhcvdhcbsdbhsvhgvhdsgvfhsgdvfhgdsvghcghvc
Orlov [11]

Answer:

thats what i like daddy

ohhhh

Explanation:

6 0
4 years ago
Read 2 more answers
In performing a SWOT analysis, a firm realized that its managers were untrained to handle the requirements of its new division.
Rufina [12.5K]
SWOT stands for strengths, weaknesses, opportunities, and threats. Being untrained sounds like it would be classified as a weakness.
3 0
4 years ago
Write a for loop that is going to check whether the values in data_list are even or odd. Use a for loop with a conditional to do
galina1969 [7]

Answer:

Jsjshshusuaijwiwueheue

4 0
3 years ago
Other questions:
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • In order for two computers to communicate via the internet, they must first locate one another. How do computers locate one anot
    12·1 answer
  • Which of the following is the definition of Internet Protocol Security ( IPSec)? A remote access client/server protocol. It is a
    13·2 answers
  • Binary tree algorithm?
    5·1 answer
  • Explain how software is distinct from hardware.
    8·2 answers
  • Micah may be able to repeat the last few digits in a phone number even if he was not paying attention. Because this is auditory
    13·1 answer
  • What are two ways the broad-match modifier makes Jamie's work easier? (Choose two.)
    11·1 answer
  • Another word for Arithmetic Logic Unit​
    6·1 answer
  • What is the final step when creating an appointment to ensure that the content of the appointment is stored in Outlook?
    13·1 answer
  • Does watching Beastars make me a furry? ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!