1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cricket20 [7]
2 years ago
10

Location of a video or photoshoot is not important when it comes to preplanning the shoot.

Computers and Technology
1 answer:
dedylja [7]2 years ago
7 0

Answer: 1)B-False

              2)A-True

              3)b-False

              4)A-True

              5)A-True

Explanation:

Digital media in- USA test prep

You might be interested in
Am i in elementary yes no
IgorLugansk [536]

Answer:

no

Explanation:

7 0
3 years ago
Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "To
Ludmilka [50]

Answer:

#include <iostream>

using namespace std;

void PrintPopcornTime (int bagOunces){

   if (bagOunces < 2){

       cout << "Too small"<<endl;

   }

   else if (bagOunces > 10){

       cout << "Too large"<<endl;

   }

   else{

       cout << bagOunces*6 <<" seconds"<<endl;

   }

}

int main(){

   PrintPopcornTime(7);

   

   return 0;

}

Explanation:

Create a function called PrintPopcornTime that takes one parameter, bagOunces

Check the bagOunces using if-else structure. If it is smaller than 2, print "Too small". If it is greater than 10, print "Too large". Otherwise, calculate and print 6*bagOunces followed by " seconds".

Call the function in the main function with parameter 7. Since 7 is not smaller than 2 or not greater than 10, "42 seconds" will be printed.

4 0
3 years ago
Borrowing other images and videos are allowed as long as ________?​
My name is Ann [436]

Answer:

as long as there appropriate

6 0
2 years ago
Where could an identity theft access your personal information?
noname [10]
Hey there!

Here is your answer:

<u><em>The proper answer to your question is "through websites".</em></u>

Reason:

<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>

Therefore the answer is using unsafe websites.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
8 0
3 years ago
Read 2 more answers
Do warnings ever expire?
DIA [1.3K]
What’s a warning? how do i get one haha
7 0
3 years ago
Read 2 more answers
Other questions:
  • Theresa is a certified teacher. She just had a baby and would like to stay home, but still wants to teach. Which career would be
    11·2 answers
  • Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek res
    15·2 answers
  • The standard qwerty keyboard has 47 keys that can place characters on the screen. each of these keys can also display a second c
    13·2 answers
  • The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
    5·1 answer
  • Why is it difficult to detect a Trojan horse?
    13·2 answers
  • How are special characters added to a Word document? Check all that apply.
    6·2 answers
  • What reforms were made by the British government in India after the war of independence? write any three
    5·1 answer
  • How do you make a ringtone on earsketch
    9·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
  • A market-product strategy that requires no change in the basic product but instead seeks new buyers is known as ______
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!