If bPtr is assigned b (the name of an array), then array element b[5] can alternatively be referenced with the pointer expression a) bPtr + 5 b) *b [bPtr + 5] c) b[bPtr + 5] d) *( bPtr + 5)

Answers

Answer 1

Answer: d) *(bPtr + 3)

question: If bPtr is assigned b (the name of an array), then array element b[5] can alternatively be referenced with the pointer expression a) bPtr + 5 b) *b [bPtr + 5] c) b[bPtr + 5] d) *( bPtr + 5)

Answer 2

The correct pointer expression to reference array element b[5] if bPtr is assigned b is d) *(bPtr + 5).

This is because the expression *(bPtr + 5) dereferences the memory address that is 5 positions after the memory address pointed to by bPtr, which corresponds to the sixth element in the array. Option a) adds 5 to the memory address of the array and does not dereference it, so it does not correctly reference the element. Option b) attempts to dereference the value of the sixth element in the array, which is not a memory address and will result in an error. Option c) adds 5 to the memory address of the array and correctly references the sixth element, but it does not use the pointer expression syntax requested in the question.

Therefore, the correct option is D.

To know more about Memory address, click here:

https://brainly.com/question/17596768

#SPPJ11


Related Questions

how to shutdown a computer by step by step​

Answers

Answer:

1) Press Ctrl + Alt + Del

2) Click the power button in the bottom-right corner of the screen.

3) From the desktop, press Alt + F4 to get the Shut Down Windows screen.

and that's how to shut down your computer

Please mark as brainliest if answer is right

Have a great day, be safe and healthy  

Thank u  

XD  

Answer:

click on start button

click on shut down button

wait for screen to turn blank

switch off monitor

switch off the electricity

Modify the binary search algorithm to take the upper of the two
middle array elements in case the input array has even length. In
other words, in the binary search algorithm, replace
Trace the action

Answers

The binary search algorithm can be modified to handle arrays with even lengths by considering the upper of the two middle elements as the pivot. This modification ensures that the algorithm works correctly and efficiently for arrays of any length.

In the traditional binary search algorithm, the pivot is chosen as the middle element of the array. This works well for arrays with odd lengths, but poses a challenge when the array length is even. In such cases, there is no exact middle element. To address this, we can modify the algorithm to consider the upper of the two middle elements as the pivot.

When dividing the array in half during each iteration, we can calculate the middle index as (low + high) // 2. However, for arrays with even lengths, we can modify this calculation to (low + high + 1) // 2 in order to choose the upper middle element as the pivot. By making this modification, the binary search algorithm can handle arrays of any length correctly. This ensures that the search process efficiently narrows down the search space and accurately finds the target element, regardless of the array's length.

Learn more about array here-

https://brainly.com/question/30757831

#SPJ11

Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet. True False

Answers

Answer:

True - Firewalls are software programs/hardware devices designed to keep computers safe from hackers

What make appertizer look healthier?

Answers

Answer:

Fruits, vegetables or drinks but it needs to be fruit wise in order to be healthier

the vegetables on the side

What may be done to speed the recovery process and ensure that all cfc, hcfc, or hfc refrigerant has been removed from a frost-free refrigerator?

Answers

The thing that may be done to speed the recovery process and ensure that all cfc, hcfc, or hfc refrigerant has been removed from a frost-free refrigerator is that  the person need to Turn on the defrost heater to bring up the refrigerant's temperature and then it can be able to vaporize any liquid.

How do you define the term temperature?

Temperature is known to be a form of measure that is often used to know the hotness or coldness of a thing or person and it is said to be usually in terms of any of a lot of scales, such as Fahrenheit and Celsius.

Note that Temperature tells the direction of heat energy that will spontaneously flow and as such, The thing that may be done to speed the recovery process and ensure that all cfc, hcfc, or hfc refrigerant has been removed from a frost-free refrigerator is that  the person need to Turn on the defrost heater to bring up the refrigerant's temperature and then it can be able to vaporize any liquid.

Learn more about Refrigerant's temperature  from

https://brainly.com/question/26395073

#SPJ1

For the discussed 8-bit floating point storage: A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation

Answers

The encoded 8-bit floating-point representation for the decimal fraction -9/2 is 11000001.

In 8-bit floating-point notation, the encoding typically consists of three components: sign bit, exponent, and mantissa. The sign bit represents the sign of the number, with 0 indicating positive and 1 indicating negative. The exponent determines the scale of the number, and the mantissa represents the fractional part.

To encode -9/2 (-4.5) in 8-bit floating-point notation, we follow these steps:

Determine the sign bit: Since -9/2 is negative, the sign bit is 1.Convert -9/2 to binary: The absolute value of 9/2 is 1001/2, which is 4.5 in decimal. In binary, 4 is 100, and 0.5 is 0.1. Therefore, -9/2 in binary is 100.1.Normalize the binary representation: Shift the binary representation to the right until the leftmost bit is 1, resulting in 1.001.Determine the exponent: Since the binary representation has been shifted by 2 positions, the exponent is 2.Encode the exponent: In 8-bit floating-point notation, the exponent is represented using excess-127 notation. Excess-127 notation for 2 is 129 (127 + 2).

Combine the sign bit, exponent, and mantissa: The final encoded representation is 11000001.

In conclusion, the encoded 8-bit floating-point representation for the decimal fraction -9/2 is 11000001.

You can learn more about decimal fraction at

https://brainly.com/question/440915

#SPJ11.

how the actions of patronage shaped the direction of specific kinds of technologies which ultimately exerted a lasting cultural or social impact upon society.

Answers

Patronage of specific technologies has a long and varied history. From the invention of the wheel to the development of the printing press, patronage of technology has had a lasting impact on the way people interact and live.

What is technology?

Technology is the application of scientific knowledge for practical purposes, especially in industry. It involves the use of engineering and manufacturing processes to create items that are used in everyday life.

In the Middle Ages, many new technologies were developed with the help of wealthy patrons. These patrons funded the development of new technologies, and in turn, these inventions had a significant effect on the cultural, social, and economic life of the period. For example, the development of the water wheel allowed for the mechanization of mills and other industries, improving the efficiency of production and creating numerous jobs.
In the modern era, patronage of technology has also had a lasting effect on society. One example of this is the development of the internet. The internet has had a dramatic impact on the way people communicate, work, and live their lives. Many of the technologies that make up the internet were initially funded by private and public patrons, who saw the potential for the internet to revolutionize communication and commerce.
Patronage of technology has also played a key role in the development of medical technology. For centuries, patrons have funded the development of medical treatments and devices, ranging from the discovery of new drugs to the development of prosthetics. This patronage has had a lasting effect on the health and quality of life of millions of people around the world.

To learn more about technology
https://brainly.com/question/29338740
#SPJ4

PLS HELP!!
In two to three paragraphs, come up with a way that you could incorporate the most technologically advanced gaming into your online education.
Make sure that your paper details clearly the type of game, how it will work, and how the student will progress through the action. Also include how the school or teacher will devise a grading system and the learning objectives of the game. Submit two to three paragraphs.

Answers

Incorporating cutting-edge gaming technology into web-based learning can foster an interactive and stimulating educational encounter. A clever method of attaining this goal is to incorporate immersive virtual reality (VR) games that are in sync with the topic being taught

What is the gaming about?

Tech gaming can enhance online learning by engaging learners interactively. One way to do this is by using immersive VR games that relate to the subject being taught. In a history class, students can time-travel virtually to navigate events and interact with figures.

In this VR game, students complete quests using historical knowledge and critical thinking skills. They may solve historical artifact puzzles or make impactful decisions. Tasks reinforce learning objectives: cause/effect, primary sources, historical context.

Learn more about gaming from

https://brainly.com/question/28031867

#SPJ1

Which of these sentences correctly shows how youngsters use the Internet?
A.
Youngsters listen to FM radio programs on the Internet.
B.
Youngsters exchange emails with business organizations.
C.
Youngsters plan their study time and read textbooks online.
D.
Youngsters interact with each other with the help of the Internet.

Answers

Answer:

D

Explanation:

This is the only possible answer lol please give brainliest and good luck :)

Deduplication works with compression and __________to optimize capacity efficiency.
A) erasure coding
B) inline compression
C) sequential writes
D) post process

Answers

Deduplication works with compression and a) erasure coding to optimize capacity efficiency.

In data storage systems, deduplication is a technique used to eliminate redundant data, ensuring that only unique data is stored. This process helps in reducing the storage space required and improves overall storage efficiency.

Compression is another method that works hand in hand with deduplication. It involves reducing the size of data by identifying and eliminating repetitive patterns within the data. This further enhances the storage efficiency of the system.

Erasure coding, on the other hand, is a data protection technique that divides data into multiple fragments and encodes them with additional parity data. This allows for the reconstruction of the original data in case any fragments are lost or corrupted. Erasure coding works together with deduplication and compression to ensure not only optimized storage capacity but also data integrity and fault tolerance.

In conclusion, deduplication, compression, and erasure coding work collectively to maximize capacity efficiency in data storage systems. These techniques contribute to reduced storage costs, better utilization of available resources, and enhanced data protection and resilience.

Therefore, the correct answer is A) erasure coding

Learn more about Compression here: https://brainly.com/question/29591042

#SPJ11

Consider a 0.64 M solution of dimethylamine, (CH3)2NH (Kb = 5.4×10-4).Mark the major species in the solution._______TrueFalse (CH3)2NH_______TrueFalse (CH3)2NH2+_______TrueFalse H2O_______TrueFalse H+_______TrueFalse OH-Complete the following table (in terms of "x", the amount of dimethylamine which reacts). Minus signs must be included, omit positive signs and omit molarity units (they are assumed).(CH3)2NH (CH3)2NH2+ OH-Initial Change Equilibrium 0.64 - x Determine the equilibrium concentration of (CH3)2NH2+MCalculate the pH of the solution.pH =

Answers

Major species in the solution can be understood as under:

(CH3)2NH: True
(CH3)2NH2+: False
H2O: True
H+: False
OH-: True

Table:

(CH3)2NH | (CH3)2NH2+ | OH-
Initial   | 0.64           | 0          | 0
Change   | -x             | +x         | +x
Equilibrium | 0.64-x     | x           | x

To determine the equilibrium concentration of (CH3)2NH2+, we can use the Kb expression:

Kb = [(CH3)2NH2+][OH-] / [(CH3)2NH]
5.4×10^-4 = (x)(x) / (0.64-x)

Now, you can solve for x to find the concentration of (CH3)2NH2+. Once you have the concentration of (CH3)2NH2+, you can calculate the concentration of OH- ions, which is equal to the concentration of (CH3)2NH2+.

Finally, to find the pH of the solution, use the relationship between pOH and pH:

pOH = -log10[OH-]
pH = 14 - pOH

Once you have the concentration of OH-, plug it into the pOH formula and calculate the pH of the solution.

To learn more about equilibrium concentration, click here:

https://brainly.com/question/16645766

#SPJ11

Select the correct answer.
Which relationship is possible when two tables share the same primary key?
А.
one-to-one
B.
one-to-many
C.
many-to-one
D.
many-to-many

Answers

Answer:

Many-to-one

Explanation:

Many-to-one relationships is possible when two tables share the same primary key it is because one entity contains values that refer to another entity that has unique values. It often enforced by primary key relationships, and the relationships typically are between fact and dimension tables and between levels in a hierarchy.

In Python: Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far.

Sample Run:
Enter a number: 9
Smallest: 9
Enter a number: 4
Smallest: 4
Enter a number: 10
Smallest: 4
Enter a number: 5
Smallest: 4
Enter a number: 3
Smallest: 3
Enter a number: 6
Smallest: 3

Answers

Answer:

python

Explanation:

list_of_numbers = []
count = 0
while count < 6:
   added_number = int(input("Enter a number: "))
   list_of_numbers.append(added_number)
   list_of_numbers.sort()
   print(f"Smallest: {list_of_numbers[0]}")
   count += 1

What is the issue with the continuation line in regards to visual indentation?
Multiple choices:
A) The continuation line is indented too much
B) The continuation line is not indented enough
C) The continuation line is indented correctly
D) The indentation of the continuation line depends on the programming language used

Answers

A) The continuation line is indented too much. The continuation line is used when a line of code is too long to fit in a single line and needs to be continued on the next line.

The issue with the continuation line in regards to visual indentation is that it is often indented too much, making the code difficult to read and understand. Over-indentation of the continuation line can make the code look cluttered, and can make it hard to see the overall structure of the code.
To avoid this issue, it is important to follow the correct indentation rules for the programming language being used. In some programming languages, the continuation line is indented with a fixed number of spaces or tabs, while in others, it depends on the context of the code. Proper indentation can make the code more readable and easier to understand, improving its overall quality.

To learn more about continuation
https://brainly.com/question/30256882
#SPJ11

----------------------------
Please summarize into 1.5 pages only
----------------------------
Virtualization
Type 2 Hypervisors
"Hosted" Approach
A hypervisor is software that creates and runs VM ins

Answers

Virtualization: It is a strategy of creating several instances of operating systems or applications that execute on a single computer or server. Virtualization employs software to reproduce physical hardware and create virtual versions of computers, servers, storage, and network devices. As a result, these virtual resources can operate independently or concurrently.

Type 2 Hypervisors: Type 2 hypervisors are hosted hypervisors that are installed on top of a pre-existing host operating system. Because of their operation, Type 2 hypervisors are often referred to as "hosted" hypervisors. Type 2 hypervisors offer a simple method of getting started with virtualization. However, Type 2 hypervisors have some limitations, like the fact that they are entirely reliant on the host operating system's performance.

"Hosted" Approach: The hosted approach entails installing a hypervisor on top of a host operating system. This hypervisor uses hardware emulation to create a completely functional computer environment on which several operating systems and applications can run concurrently. In general, the hosted approach is used for client-side virtualization. This method is easy to use and is especially useful for the creation of virtual desktops or the ability to run many operating systems on a single computer.

A hypervisor is software that creates and runs VM instances: A hypervisor, also known as a virtual machine manager, is software that creates and manages virtual machines (VMs). The hypervisor allows several VMs to execute on a single physical computer, which means that the computer's hardware can be utilized more efficiently. The hypervisor's role is to manage VM access to physical resources such as CPU, memory, and I/O devices, as well as to provide VM isolation.

Know more about virtualization, here:

https://brainly.com/question/31257788

#SPJ11

A(n)
is a central computer that enables authorized users to access networked resources.

A. LAN
B. server
C. Peripheral
D. Application

Answers

Answer:

it's B -SERVER

Explanation:

on odyssey ware

1. Function fileLength(), given to you, takes the name of a file as input and returns the length of the file:
>>> fileLength('gettsburg.txt')
Traceback (most recent call last):
File "", line 1, in
fileLength('gettsburg.txt')
File "C:\Users\eve\Documents\evelyn\241\Final Exam\2019 winter Final Exam.py", line 53, in fileLength
fsize = os.path.getsize(filename)
File "C:\Users\eve\AppData\Local\Programs\Python\Python37\lib\genericpath.py", line 50, in getsize
return os.stat(filename).st_size
FileNotFoundError: [WinError 2] The system cannot find the file specified: 'gettsburg.txt'
>>> fileLength('gettysburg.txt')
The size of gettysburg.txt is: 1464bytes.
>>>
As shown above, if the file cannot be found by the interpreter or if it cannot be read as a text file, an exception will be raised. Modify function fileLength() so that a friendly message is printed instead:
>>> fileLength('gettsburg.txt')
File gettsburg.txt not found
>>> fileLength('gettysburg.txt')
The size of gettysburg.txt is: 1464bytes.

Answers

The given code raises a FileNotFoundError if a file is not found, or if it cannot be read as a text file. In this question, you are asked to modify the fileLength() function so that a friendly message is printed instead of an exception is raised.

So, the code can be modified to catch any exceptions and print a friendly message. If the file exists, the size of the file is returned. A sample implementation is given below:def fileLength(filename):    try:        fsize = os.path.getsize(filename)    except FileNotFoundError:        print(f"File {filename} not found")        return    print(f"The size of {filename} is: {fsize} bytes.").

The above code will work as follows:If the specified file is not found, it will print “File not found” as follows:>>> fileLength('gettsburg.txt')File gettsburg.txt not foundIf the file is found, it will print the size of the file as follows:>>> fileLength('gettysburg.txt')The size of gettysburg.txt is: 1464 bytes.

To know more about function visit:

https://brainly.com/question/30721594

#SPJ11

what do you think are the IPO components in an online movie ticket booking system?

Pls answer correctly ASAP​

Answers

Explanation:

Online Movie Ticket Booking System is a website to provide the customers facility to book tickets for a movie online and to gather information about the movies and theaters. Customer needs to register at the site to book tickets to the movie

Advantages of Online Booking Systems

Your business is open around the clock. ...

You can maximize reservations. ...

You get paid quicker. ...

You're not tied to a phone. ...

You can effortlessly up-sell add-ons. ...

It's easy to manage your calendar. ...

You get valuable insight about your business

Write a function NumberOfPennies() that returns the total number of pennies given a number of dollars and (optionally) a number of pennies. Ex: 5 dollars and 6 pennies returns 506. c

Answers

Here's an example implementation of the function NumberOfPennies() in C that takes a number of dollars and a number of pennies as arguments and returns the total number of pennies:

c

Copy code

int NumberOfPennies(int dollars, int pennies) {

   int total_pennies = dollars * 100 + pennies;

   return total_pennies;

}

This function first calculates the total number of pennies by multiplying the number of dollars by 100 and adding the number of pennies. It then returns this value.

You can call this function with the number of dollars and pennies as arguments, like this:

c

Copy code

int total_pennies = NumberOfPennies(5, 6); // returns 506

This would set the variable total_pennies to 506, which is the total number of pennies in 5 dollars and 6 pennies.

Learn more about returns here:

https://brainly.com/question/30974189

#SPJ11

what do you mean by local technology explain​

Answers

Answer:

Slow production of materials, usually using manual processes, that incorporate experimental knowledge. Although they have normally reduced environmental impact, they have reduced performances and durability.

Explanation:

Which can display 12.5684 in the format of $12.57 as output?
Group of answer choices cout << setprecision(2) << fixed << "$" << 12.5684 << endl; cout << "$" << setprecision(2) << 12.5684 << endl; cout << "$" << setprecision(12.5684, 2) << endl; cout << "$" << setprecision << fixed(2) << 12.5684 << endl; cout << setprecision << fixed(2) << "$" << 12.5684 << endl;

Answers

The correct code snippet to display 12.5684 in the format of $12.57 as output is:

```cpp

cout << fixed << setprecision(2) << "$" << 12.5684 << endl;

```

- `fixed` sets the floating-point precision to fixed notation.

- `setprecision(2)` sets the precision to 2 decimal places.

- `"$"` is the dollar sign symbol.

- `12.5684` is the number to be displayed.

- `endl` outputs a new line.

By combining `fixed`, `setprecision`, and `cout`, we can format the output to display the desired number with two decimal places and a dollar sign.

To know more about Code Snippet visit-

brainly.com/question/31956984

#SPJ11

How would you a get a large company to donate a school bus to your renewable energy program?

Answers

Answer: give them a call i guess

Explanation:

Amiens Cathedral, Hagia Sophia, and even the Pantheon express a level of spirituality in architecture, in that when one enters the space one can experience, at least momentarily, transcendence above matters of the everyday life. (That is, one can find the space so stunning that personal issues or those of society are momentarily forgotten.) What common elements lead to this

Answers

Grandeur, intricate detailing, soaring ceilings, use of light and shadow, and incorporation of symbolic elements create a sense of transcendence and allow individuals to momentarily escape everyday concerns.

What common elements contribute to the sense of spirituality in Amiens Cathedral, Hagia Sophia, and the Pantheon?

The common elements that lead to a sense of spirituality in architecture, as expressed in Amiens Cathedral, Hagia Sophia, and the Pantheon, include grandeur and scale, intricate detailing, soaring ceilings, the use of light and shadow, and the incorporation of symbolic elements.

These architectural features evoke a sense of awe, reverence, and transcendence. The grand scale and impressive craftsmanship create a sense of majesty, while the interplay of light and shadow enhances the spiritual ambiance.

Symbolic elements such as religious motifs and sacred geometry further contribute to the spiritual experience, allowing individuals to momentarily detach from everyday concerns and connect with something greater than themselves.

Learn more about elements

brainly.com/question/31950312

#SPJ11

Read these lines from "March Evening."Puddles lie split in the road a mass, notOf water, but steel, with its cold, hard sheen.What is the connotative meaning of the word split as used in the poem?acrossmingledpoolingruptured

Answers

The connotative meaning of "Split" in the lines indicated from the question is - Across.

About March Evening

The narrator in the poem captioned above tries to capture the essence of spring as it sets in. All the ice is not completely melted, there is a mix of ice and water on the roads, hence the line

"Puddles...not of water, but steel with its cold, hard sheen"

The correct answer, therefore, is A.

See the link below for more about the Poem March Evening by Amy Lowell:

https://brainly.com/question/26143581

Answer:

Ruptured

Explanation:

took the test, not to throw the guy above me under the bus but across was wrong..

Identity theft is an issue that plagues everyone. Pick a country of your choice. What laws are available to protect the victim (if any), and help them recover their losses? What technical prevention mechanisms are available to protect an individual from becoming a victim? What weaknesses does that particular prevention mechanism have?

Answers

Here are some laws available to protect victims of identity theft in the United States, as well as some technical prevention mechanisms:

Laws

The Identity Theft and Assumption Deterrence Act of 1998 (ITTAAA) is a federal law that makes identity theft a crime. The law also provides victims with some protections, such as the right to place a fraud alert on their credit reports and the right to receive free copies of their credit reports.

The Fair Credit Reporting Act (FCRA) is a federal law that regulates the credit reporting industry. The law gives consumers the right to access their credit reports, to dispute inaccurate information, and to place a fraud alert on their credit reports.

The Gramm-Leach-Bliley Act (GLBA) is a federal law that regulates the financial services industry. The law requires financial institutions to protect the privacy of their customers' personal information.

Technical Prevention Mechanisms

Strong passwords: Using strong passwords that are difficult to guess is one of the best ways to protect yourself from identity theft. A strong password should be at least 12 characters long and should include a mix of upper and lowercase letters, numbers, and symbols.

Two-factor authentication: Two-factor authentication (2FA) adds an extra layer of security to your online accounts. When you enable 2FA, you will be required to enter a code from your phone in addition to your password when you log in to your account.

Credit monitoring: Credit monitoring services can help you detect identity theft early. These services track your credit reports for changes and alert you if they see anything suspicious.

Weaknesses of Technical Prevention Mechanisms

Strong passwords: Strong passwords can be difficult to remember, which can lead to people writing them down or storing them in insecure places.

Two-factor authentication: 2FA can be inconvenient, especially if you are logging in to your account from a different device or location.

Credit monitoring: Credit monitoring services can be expensive, and they may not catch all cases of identity theft.

It is important to remember that no single prevention mechanism is foolproof. The best way to protect yourself from identity theft is to use a combination of different techniques.

Learn more about identity theft protection here:

https://brainly.com/question/24924471

#SPJ11

the word item referred to as a: A.value B.label C.Formula​

Answers

I think it’s C If wrong I’m sorry

Which statement is the best definition of social media?
A. Social media is designed to facilitate and be promoted by social
interactions.
O B. Social media is the exchange of information from newspapers.
O C. Social media is the advertising of products to potential
consumers.
D. Social media is designed to allow people to view local news on
television.

Answers

Answer: A. Social media is designed to facilitate and be promoted by social interactions.

Explanation:

Social media refers to websites and mobile apps that enable users to interact with each other in virtual communities and networks, through text, audio, and video. The platforms provide a space for users to share and exchange information, ideas, personal messages, and other content or to participate in social networking. It’s a user-driven medium, where people can interact and share information with each other easily and in a variety of ways.

A(n) ____ is a computer that requests and uses network resources from a(n) ____.

Answers

A(n) client exists a computer that requests and utilizes network resources from a(n) server.

What is a computer network?A computer network is a collection of computers that share resources that are available on or provided by network nodes. The computers communicate with one another via digital links using standard communication protocols. These links are made up of telecommunication network technologies that are based on physically wired, optical, and wireless radio-frequency means and can be configured in a variety of network topologies. Nodes in a computer network can be personal computers, servers, networking equipment, or other specialized or general-purpose hosts. They can be identified by network addresses and have hostnames. Local-area networks (LANs) and wide-area networks (WANs) are the two basic network types.A(n) client exists a computer that requests and utilizes network resources from a(n) server.

To learn more about computer network, refer to:

https://brainly.com/question/8118353

#SPJ4

PLZ HELP IM DOING 2 other 100 work and I’m running out of time for school 1. Imagine you are a screenplay writer Discuss some possible activities or techniques you
could use to improve your character creation and development
2. Do you think it's possible for an entire film to be shot using only one camera angle?
Explain why or why not and how this might impact the film.
3. The unit says that in film you must show, not tell. Is this always true? When might it be
better to tell rather than show? Explain
4. You learned that lighting can play an important role in films and animation but is the
same true of your everyday life? How does lighting impact your daily life and how do you
use it to improve/change your surroundings?
5. After becoming more familiar with the various roles that people play when making an
animated film – such as writer artist
, director assistant director lighting, sound eto-
which do you think that you would enjoy most and why? Which do you think would be the
most difficult and why? Explain your answers

Answers

My mans this is to long to read ); I got u tho lemme pick

What did Eileen Meehan mean by "commodity audience"

Answers

Answer:

She studies how stations, in a counterintuitive move, tended to broadcast less influential programs during the daytime hours when women homemakers were primarily the audience.

Explanation:

Other Questions
What are the three approaches to measuring economic activity Why do they give the same answer? the role in which members of congress serve as brokers between private citizens and the federal government usually takes which of the following forms? use the integral test to determine whether the series is convergent or divergent. [infinity] 14/n^10 n = 1 Identify the choice that best completes the statement or answers the question.A scientist analyzes a fossil found in the limestone layer of Mountain A. By applying the technique of radiometric dating to the fossil, the scientist concludes that the limestone formed approximately 1.34 billion years ago.Which two assumptions are necessary to support the scientist's conclusion? Select the two correct answers.options:After the fossil formed, all of its radioactive isotopes decayed very quickly.Radioactive isotopes decay at a constant rate over long spans of time.The fossil formed at the same time as the limestone surrounding it.The fossil formed from the same materials as the limestone surrounding it.After the limestone formed, chemical and physical processes affected it only minimally. is there no letter news in a few Walter is practicing his high jumps for the track team. His first jump measured 5 feet, 9 inches. His second jump measured 3 feet, 11 inches. How much higher was Walter's first jump than his second jump? 1. What is the Romeo and Juliet Effect? 2. How were the results of the original 1972 study different from the later replicated study in 2014? (Use examples from the article as support.)3. How does this relate to the overall theme in Romeo & Juliet that parents involvement affects their childrens relationships? (Use examples from the play as support.) What type of chemical bond is the strongest type of bond?covalentionicmetallicpolar kaizen is a japanese word meaning ""good change"". how is it applied to the manufacturing process? There are a number of reasons why the practice of financialaccounting tends to ignore the social and environmental impactscaused by organisations. In this regard, explain:how and why the way we def Suppose the GDP is given by the following: C = 500 +0.75(Yd) 1_p = 375 G = 400 T = 200 Solve for equilibrium GDP in this economy. 4500 3000 3500 4000 The university has 41,310 students . In a random sample of 270 students, 18 speak three or more languages. Predict the number of students at the University who speaks three or more languages Explain The Stages In The Product Lifecycle. Explain each of the 5 stages. What are the components of Guerrilla Marketing Strategies? Explain each component PLEASE ASAP!!!There are significant differences between critical care provided infants and children and that provided adut patients.True or false What does reproachful mean in English? In traditional mass media, __________ is the paid media space that sponsors use to persuade audiences answer plsssssssssssssssssssssssssssssss Which expressions are equivalent to 14a + 286? Choose ALL that apply.7a(2+4)14(a + 2b)7(2a + 46)14a(1 + 286) 2.although danny didn't understand the language, he listened to the man speaking 7 points a. fragment b. run-on c. comma splice d. sentence 1. Blood is made up of specialised red blood cells and several different types of white blood cells. Is blood an example of a cell, tissue, organ and organ system?Explain and reason your answer