1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ra1l [238]
2 years ago
15

Digital Media Equipment: Best Practices Quiz

Computers and Technology
1 answer:
natulia [17]2 years ago
4 0
  1. <u>False:</u> Location of a video or photoshoot is not important when it comes to preplanning the shoot.
  2. <u>True:</u> Booms are large adjustable poles to mount microphones.
  3. <u>False:</u> It doesn't matter what you clean your camera lens with- you should just grab whatever cloth you have.
  4. <u>True:</u> Safety should be the most important thing when conducting a photo or video shoot.
  5. <u>True:</u> It's important to properly clean and store your equipment after a photo or video shoot.

<h3>What is a photoshoot?</h3>

A photoshoot can be defined as a photography session that involves the use of <u>digital media</u> equipment to take series of pictures (photographs) of models, things or places, etc., especially by a professional photographers.

<h3>The digital media equipment in a photo or video shoot.</h3>

Some examples of the <u>digital media</u> equipment that are used in a photo or video shoot include the following:

  • Boom
  • Camera
  • Microphone
  • Lenses
  • Battery
  • Tripod

Read more on photoshoot here: brainly.com/question/26643795

You might be interested in
To protect a computer, it is a good idea to install and frequently run
Triss [41]

Answer:

anti virus software

Explanation

did the quiz :)

5 0
3 years ago
Read 2 more answers
Consider the attack scenario given below:
Sonbull [250]

Answer:

Cookie Poisoning Attack

Explanation:

  • In this scenario, the attacker steals the cookie in the step 3 for malicious reasons.
  • Here, the attacker modifies the cookies on the web browser.
  • So, the attacker is poisoning the cookies and using it for online orders in this scenario.
  • As the attacker is poisoning the cookies on the browser this is called Cookie Poisoning Attack.
  • In Cookie Poisoning Attacks, the control of browser and the computer and the whole network can be compromised to the attacker.
  • To prevent the Cookie Poisoning Attack, the cookies have to be encrypted for the security reasons.
4 0
3 years ago
Best app in free to learn python
Allushta [10]

Answer:

Sololearn app

Explanation:

it's very easy to learn python there

4 0
2 years ago
In addition to the four primary computer operations, today's computers almost always perform ____ functions.
NeX [460]

The correct answer is:    " information "  .

_________________________

<u>Note</u>:  In addition to the [4 (four) "primary computer operations" —  which are:  

 "input, processing, output, and storage" ] — today's computers almost always perform <u>  information  </u> functions.

_________________________

5 0
2 years ago
You defined a shoe data type and created an instance.
Assoli18 [71]

Answer:

myShoe.type = 'sneaker'

Explanation:

type is a field of the class shoe. The myShoe object which is an instance of the class shoe has the field type also.

To assign a value to type filed of the object myShoe, reference the object then the field as such;

   myShoe.type = "sneaker"

7 0
1 year ago
Other questions:
  • What makes Group Policy such a powerful tool is its ability to enable security administrators to:_________.
    8·1 answer
  • Using either a UNIX or a Linux system, write a C program that forks a child process that ultimately becomes a zombie process. Th
    8·1 answer
  • What happens when you call someone whose phone is off?
    6·2 answers
  • ARP request is send to
    12·1 answer
  • Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds o
    8·1 answer
  • How to write email abut new home your friend ​
    14·1 answer
  • In which of the following phases of filmmaking would a production team be focused on the
    10·2 answers
  • What is the Cycle of Dependency?
    14·1 answer
  • Discuss the advantages and disadvantages of supporting links to files that cross mount points (that is, the file link refers to
    6·1 answer
  • 15. Question
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!