Marcel shows his client many drawings in order to provide an outline of the video commercial that he will make for them. These drawings constitute a:

A) storyboard
B) pixilation
C) resolution
D) Filmed video

Answers

Answer 1
B) porque nbungjhggjbh

Related Questions

The three greater-than signs, >>>, represent a _____.

A. prompt

B. file-path

C. file name

D. IDLE

Answers

Answer:

it's A. prompt

Explanation:

To find the location’s name of the cell, look to the . To add an action to the cell for that data, add commands in the . To move from one cell to the next, use .

Answers

Answer:

Name Box

Formula Bar

Either Tab or Enter

Explanation:

Answer:

To find the location’s name of the cell, look to the

✔ name box

.

To add an action to the cell for that data, add commands in the

✔ formula bar

.

To move from one cell to the next, use

✔ either tab or enter

.

Explanation:

write an algorithm to find the perimeter of rectangle

Answers

Answer:

look at the link i put down below

Explanation:

write an algorithm to find the perimeter of rectangle

In multithreaded programs, the kernel informs an application about certain events using a procedure known as a(n) ____. a) signal. b) upcall. c) event handler. d) pool.

Answers

In multithreaded programs, the kernel communicates specific events to applications using a procedure known as a(n) signal. So, option a is correct.

Signals are a fundamental mechanism for interprocess communication in operating systems. They allow the kernel to notify a process or a specific thread within a process about various events or conditions.

a) Signal: Signals are software interrupts sent by the kernel to a process or thread to indicate events such as a specific system condition, hardware exception, or user-defined event.

The receiving process or thread can register signal handlers, which are event-specific functions that handle the signal when it occurs.

b) Upcall: Upcalls are a mechanism where the kernel transfers control from the kernel mode to the user mode to notify the application about an event. While upcalls are commonly used in some operating systems for specific purposes, they are not the primary mechanism for event notification in multithreaded programs.

c) Event handler: Event handlers are functions or routines that are executed in response to specific events. In the context of multithreaded programs, event handlers can be associated with signals to handle specific events when they occur.

d) Pool: A pool refers to a collection of resources or threads that can be allocated or managed in a multithreaded environment. However, it is not directly related to the procedure used by the kernel to inform applications about events in multithreaded programs.

Therefore, the correct answer is a) signal.

Learn more about multithreaded programs:

https://brainly.com/question/15062443

#SPJ11

In the Guess My Number program, the user continues guessing numbers until the secret number is matched. The program needs to be modified to include an extra criterion that requires all guesses to be within the lower and upper bounds. If the user guesses below or above the range of the secret number, the while terminates. How would the while statement be modified to include the new criterion?
a. while(userGuess != secretNumber || userGuess >= lowerLimit || userGuess <= upperLimit)
b. while(userGuess != secretNumber || userGuess >= lowerLimit && userGuess <= upperLimit)
c. while(userGuess != secretNumber && userGuess >= lowerLimit && userGuess <= upperLimit)
d. while(userGuess == secretNumber || userGuess >= lowerLimit && userGuess <= upperLimit)
e. while(userGuess == secretNumber && userGuess >= lowerLimit || userGuess <= upperLimit)

Answers

The while statement should be modified to while(userGuess != secretNumber && userGuess >= lowerLimit && userGuess <= upperLimit).

What should happen if the user guesses a number outside the range of the secret number? If the user guesses a number outside the range of the secret number, they will be prompted with an error message. The message should explain that their guess is outside the range and should provide instructions on how to guess a number within the range. For example, the message could say, "Your guess is outside the range of 1-10.Please enter a number between 1-10 to make a valid guess." Additionally, the user can be given the option to quit the game or retry their guess. If the user chooses to retry their guess, they should be given the opportunity to enter a new number within the range. It is important to provide clear instructions for the user so that they know what to do when their guess is outside the range.

To learn more about while statement refer to:

https://brainly.com/question/19344465

#SPJ4

the wi-fi protected setup pin can be easily cracked through a brute force attack. True or False?

Answers

The given statement "the WI-FI protected setup pin can be easily cracked through a brute force attack" is TRUE because it's trial-and-error method used by attackers to gain access to a system by systematically trying every possible combination of the PIN

The Wi-Fi Protected Setup (WPS) PIN is an 8-digit code that is used to connect devices to a wireless network.

However, it is vulnerable to brute force attacks where an attacker repeatedly tries different combinations of the PIN until they find the correct one. This is because the WPS protocol does not have any lockout or throttling mechanisms to prevent such attacks

. As a result, it is recommended to disable WPS on your router and use other, more secure methods to connect devices to your Wi-Fi network.

Additionally, it is important to use strong and unique passwords for your Wi-Fi network to prevent unauthorized access.

Learn more about WPS at https://brainly.com/question/30888094

#SPJ11

Finish the statement below to correctly describe the Defense Enrollment Eligibility Reporting System (DEERS). DEERS is a centralized Department of Defense database that _______________________________.

Answers

Answer:  A- the antlers and horns are structural adaptations. The fighting is a behavioral adaptation.

Antlers and horns are physical adaptations that some mammals have acquired over time. However, fighting is not a physical feature but a behavioral adaptation used to beat other males during mating season.

Explanation:

in a doubly-linked list with dummy nodes, which pointer is null? what is the benefit of using dummy nodes in lists

Answers

In a doubly-linked list with dummy nodes, the pointer pointing to the head node or the beginning of the list is usually null. The benefit of using dummy nodes in lists is that it allows easier insertion and deletion of nodes.

What is a doubly linked list? A doubly linked list is a type of linked list in which each node has two pointers: one that points to the previous node in the list, and one that points to the next node in the list. The first node in the list is called the head, and the last node in the list is called the tail. Unlike a singly linked list, which only has a pointer to the next node, a doubly linked list allows for traversal of the list in both directions.

What are dummy nodes? Dummy nodes are placeholder nodes that are used to make insertion and deletion easier in a linked list. They are nodes that do not contain any data but are used to simplify the code by making sure that the list always has at least one node. In a doubly linked list, there is usually a dummy node at the beginning of the list, called the head node, and a dummy node at the end of the list, called the tail node. These nodes are used to mark the beginning and end of the list and to ensure that the list is never empty.

To know more about dummy nodes

https://brainly.com/question/33477937

#SPJ11

composite data type is a variable that can store and handle multiple values of the same data type as one unit. true or false

Answers

The statement is False.

A variable with a composite data type can hold and manage multiple values of various data types as a single object. It is a type of data that unifies several components or attributes into a single entity. Arrays, structures, records, tuples, and classes are a few instances of composite data types. These data types enable the combination of separate data items with different data types that are connected or related to a single variable. This offers a practical and orderly way to handle and store intricate data structures. As a result, a composite data type enables the storage and management of multiple values of various data types rather than a single value of a single data type.

Learn more about Data type here: https://brainly.com/question/13460486.

#SPJ11

if you had a chance to see what your life would be like in 20 years

Answers

I meaaaannnn in my opinion to me there just no future for me anymore ٩( ᐛ )و

But I mean if I was to be alive somehow, I would say, coronavirus is gone perhaps, but now there some bigger issue going on?

That’s my opinion ︎

Which book citation is correctly formatted according to mla standards? collins, suzanne. the hunger games. new york: scholastic, 2008. print. collins, suzanne. the hunger games. scholastic: new york, 2008. print. collins, suzanne. the hunger games. new york: scholastic, 2008. collins, suzanne. the hunger games. new york: scholastic. print, 2008.

Answers

The  book citation that is correctly formatted according to MLA standards is  Collins, Suzanne. The Hunger Games. New York: Scholastic, 2008. Print.

What is book citation?

A book citation is known to be a form of entry that one often puts in one's research paper or any kind of essay that shows the people that a person must have paraphrased or quoted.

Note that Books citations are said to often credit to the owner or key sources and thus, in MLA format, The  book citation that is correctly formatted according to its standards is  Collins, Suzanne. The Hunger Games. New York: Scholastic, 2008. Print.

Learn more about book citation from

https://brainly.com/question/8130130

Answer:

A. Collins, Suzanne. The Hunger Games. New York: Scholastic, 2008. Print.

Explanation:

Correct on Edge

A type of topology in which all the systems a connected a main cable ​

Answers

Answer:

Bus topology uses one main cable to which all nodes are directly connected. The main cable acts as a backbone for the network. One of the computers in the network typically acts as the computer server. The first advantage of bus topology is that it is easy to connect a computer or peripheral device.

pls help me
it's a chatbot assignment and i have been stick on it for 5 hours Png is bellow

pls help meit's a chatbot assignment and i have been stick on it for 5 hours Png is bellow

Answers

To prevent any chatbot failure, avoid using single programming, and Create chatbot messages that adhere to the same protocol as live ch-at conversations.

What is a chatbot?

A chatbot, also known as a chatterbot, is a software application that uses text or text-to-speech to conduct online conversations instead of providing direct contact with a live human agent.

A chatbot is a computer program or software that simulates human conversation or "noise" via text or voice interactions.

Therefore, Users are likely to become bored if they fail to inject any personality into the bot or program it to handle unpredictable commands.

To learn more about chatbots, visit here:

https://brainly.com/question/18804668

#SPJ1

A(n) ____ is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

Answers

Access control is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

Access control refers to the procedures and methodologies used to regulate who can access a certain system or network, as well as what they can do with the data they retrieve. These mechanisms are used to guarantee the security of an organization's resources by limiting access to only authorized personnel.

Access control mechanisms come in a variety of forms, including discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC). Access control refers to the procedures and methodologies used to regulate who can access a certain system or network, as well as what they can do with the data they retrieve.

To know more about computer visit :

https://brainly.com/question/32297638

#SPJ11

Grade 8 technology term 3

Answers

Explanation:

I am from Nepal County it is beautiful country

sequential is a type of ________blank structure in which one program statement follows another.

Answers

It is incorrect to say that one program statement follows another program statement in a sequential structure. A REPEAT or LOOP STRUCTURE describes a process that can be repeated as long as certain conditions are met.

What kind of structure is sequential?

A sequential structure shows the order of a process, sequence of steps, or events.

Is Do While an example of a sequential structure?

Yes DO WHILE is used as a sequential structure. Reports at the end of the program design step usually consist of pseudocode, flow charts, and logical structures. Coding is just one of the six programming steps.

What distinguishes case structure and sequence structure?

Unlike sequence structs, case structs can pass data and exit the while loop at any time. For example, if an error occurs while executing the first test, the Case structure can pass FALSE to the conditional terminal to exit the loop. 

To learn more about sequential steps visit:

https://brainly.com/question/15588193

#SPJ4

Where should citations be included in your research paper? Select all that apply.

In the header

At the end of every paragraph

As footnotes

In a separate Works Cited page

(EASY!!! BUT I NEED HELP PLEAASE!!!)

Answers

Answer:

in a separate works cited page

solve the following equations and check your result 1) 3x=2x+18​

Answers

Answer:

x = 18

Explanation:

3x = 2x+18

3x-2x = 18

x=18

Answer:

Explanation:

3X-2X=2X-2X+18

X=18

model of social relations, individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive social support.

Answers

According to the social convoy theory of social relationships, people live their lives as part of a personal network of people to whom they provide support and from whom they receive it.

What is the meaning of social convoy?

The people that travel with us on the road of life are referred to as the social convoy. At every stage of development, this social grouping is a crucial component of successful adjustment and wellbeing.

As one matures and develops, they rely on these interactions and connections because all are social beings. Social convoy is a network of friends that travel through life with us and support us through both good and difficult times.

Learn more about social convoy from here:

https://brainly.com/question/7318152

#SPJ1

The complete question has been attached in text form:

In the social ______ model of social relations, individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive social support.

When Tomohiro Nishikado invented Space Invaders® in 1978, the microcomputers available in Japan could not handle its initial complexity which led Nishikado to import a CPU from the United States that was integrated into a microprocessor. This is a classic example of what?

A. innovating to overcome a technical challenge


B. the need to import items for any technology to really work


C. how the U.S. is better with technology than Japan


D. quitting when technical challenges arise

Answers

b the need to import items for any technology to really work

Answer:

The answer is A. Innovating to overcome a technical challenge!

hope this helps! <3

Users with the right to read files in the folder have which of the following? Select all that apply.

a) Read/write rights
b) Owner rights
c) Reader rights

Answers

Users with the right to read files in the folder have "reader rights" which is "c".

Explanation: In computer systems, there are different types of user rights such as read, write, modify, delete, and execute. Read rights refer to the ability to view the content of a file or a folder. This means that users who have been granted read rights can open and view the content of the file but can't edit or delete it.

Only users who have been granted read/write or owner rights have the ability to modify, delete or add new content to the file or folder.

Therefore, option a) "read/write rights" and b) "owner rights" do not apply to the users who have been granted the right to read files in the folder.

Hence, the correct answer is c) "reader rights".

To know more about reader rights visit:

https://brainly.com/question/29830419

#SPJ11

What is the device used for the calculations of payment and balancing the accounts record s​

Answers

A calculator or bank? Maybe an atm
I have the answer for you

Experiments using computer models are known as ________

Answers

Answer:

simulations

Explanation:

Experiments using computer models are known as simulations

Which statement is true about Location tracking in QuickBooks Online?
a. Locations affect only the source of a transaction
b. Location labels (for example, "Division" or "Territory") can be changed to suit the individual business
c. Location tracking is available in all subscription levels of QuickBooks Online
d. Sub-locations do not count toward QuickBooks Online usage limits
e. QuickBooks Online Advanced allows for unlimited hierarchical levels of locations

Answers

The statements about Location tracking in Quick Books Online are true are The Location can be selected on each row of a journal entry and The Location can be filtered on the Pay bills screen.

There are a few examples of how location sharing applications and features benefit our daily lives: Assist you in tracking down and recovering lost or stolen smart gadgets. When you phone 911, you are giving emergency responders your location. Allow you to avoid traffic.

The assertions concerning QuickBooks Online's location tracking are correct. On each row of a journal entry, the Location may be selected, and the Location can be filtered on the Pay bills screen. As a result, options 2nd and 5th are accurate.

Learn more about location here:

brainly.com/question/11718756

#SPJ1

The top row of an excel table is called a ______ row.

Answers

Answer:

Header or heading row

Explanation:

This row contain the Column heading for each records

If you were to design a real robot that would be responsible for cleaning up trash, what 4 (or more) commands would you give it and what would each one do? (4 complete sentences)

Answers

Answer:

classify, sweep, recycle, wash

Explanation:

classify: to differentiate between garbage, recyclables and washable objects

sweep: to clean the dust and dirt

recycle: to collect recyclable objects and separate them from garbage

wash: to collect dirty objects and clean them instead of throwing them away

________ are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives.

Answers

Hybrid Drives

Explanation

This is the name for the two drives mixed together. I have one in my pc and it works pretty well.

The storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives are called as Hybrid drives.

What is drive?

Drive provides a storage space and speed for processing the data in the drive on the personal computers or laptops at low cost.

There are two types of drives- Solid state hard drives and Hard disks.

So, the combination of both the drives is named as Hybrid drives containing features of large space as well as higher processing speed.

Thus, Hybrid drives are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives.

Learn more about drive.

https://brainly.com/question/10677358

#SPJ2

With the knowledge of computer studies or ICT mention two methods of keeping material​

Answers

Answer:

ICT teaching tools include simulation, modelling, CD-ROMs, teacher web publishing, word processing, spreadsheets, data logging, databases, e-mail, smart boards, interactive whiteboards and Internet browsing.

Explanation:

1-5 Safety measures in the use of kitchen tools and equipment.​

Answers

Answer:

Safety measures are as follows;

Explanation:

Hold the delicate instruments cautiously to use them.Require appropriate use of the equipment in the kitchen.Users should remove these defective instruments or discard of them.During and before use, check that perhaps the resources that will be used are indeed safe.In a cold and dry spot, all equipment must be kept.

what phrase refers to all transmission media not guided by wire, fiber, or other constraints that includes radio frequency, infrared, and microwave methods?

Answers

The phrase that refers to all transmission media not guided by wire, fiber, or other constraints, including radio frequency, infrared, and microwave methods, is "wireless communication."

The phrase that refers to all transmission media not guided by wire, fiber, or other constraints is "wireless communication". Wireless communication is the transfer of information between two or more points without the use of physical connections such as wires, cables, or fiber optics. It encompasses a wide range of technologies, including radio frequency, infrared, microwave, and satellite communication. Wireless communication is widely used in various applications, such as mobile phones, Wi-Fi networks, Bluetooth devices, and GPS systems.

Learn more about transmission about

https://brainly.com/question/15884673

#SPJ11

Other Questions
The expected probability of rolling an even number in 1 roll of a fair cube with faces numbered 1 through 6 is 1/2. When the cube was rolled 20 times, an even number came up 15 times, or 3/4 of the time. When the same cube was rolled 100 times, an even number came up 51 times, or almost 1/2 the time. Why are the actual results closer to the expected probability of 1/2 when rolling the cube 100 times?a. A larger sample size was used.b. The 100 tosses were controlled better.c. The expected probability changed when the cube was rolled 100 times.d. The thrower considered only the even rolls, and disregarded the odd rolls. in most developing societies today (as in europe in earlier centuries), obesity is a sign of Determine the volume of the solid generated by revolving thetriangular region bounded by the lines Y = 3x, Y = 0 and X = 1arround the line X = -2 Can someone help me with these 4 questions please :) . Ill mark you as a brainliest and give points :) . Projects are usually either service or revenue related? A) True B) False ChemCom is a large producer of household products. It purchases a glyceride used in one of its deodorant soaps from outside the company. ChemCom uses the glyceride at a fairly steady rate of 40 pounds per month, and the company uses a 23% annual interest rate to compute holding costs. The chemical can be purchased from supplier A, who offers the following all-units discount schedule: Q8: Assume that the cost of order processing is $150. Calculate the optimal batch size. Q9: There is another supplier B, who offers the following discount schedule: \$1.25 per pound for all orders less than or equal to 700 pounds, and \$1.05 per pound for all incremental amounts over 700 pounds. Calculate the optimal batch size if Chem com purchal from supplier B. Assume that the cost of order processing remains the same (i.e., \$150). Q10: Which supplier should be used by ChemCom? (a) Supplier A (b) Supplier B 5. Choose the best answerSome plants bloom in the spring, while others bloom in the fall. What plant response causes this? Ill give brainliest to whoever answers my Reading Questions hi i got some questions for my friends onlyWho do you look up to the most, and what qualities do you love about that person?What would be your perfect day? ...What's your biggest fear?How do you like to be comforted when you're sad or upset?What's your all-time favorite memory? is the complex vector space of polynomials consist of complex-valued functions of a complex variable? Robel is unsure of how many nights he will stay in Los Angeles.a) Write an equation that will allow Robel to calculate what his total cost will be if he is charged $52 as a one-time fee and the cost per night is $94.b) What will be Robels total cost if he decides to stay 3 nights. Show all your work to justify your answer. How many dominos are needed to complete the triangle? Part Three-Journalizing and Posting Departmental Purchases and Cash Payments L\&R Paint has two departments: Paint and Accessories. The business completed the following transactions during May of the current year. L\&R has arranged terms of 2/10,n/30 for all purchases on account. Source documents are abbreviated as follows: check, C; debit memorandum, DM; purchase invoice, P. May 3. Purchased paint on account from Davis Chemical, \$2,900.00. P421. 5. Purchased accessories on account from Franken Mfg., $960.00. P422. 6. Paid cash for rent, $2,000.00. C685. 7. Returned damaged paint to Davis Chemical, $320.00, from P421. DM46. 11. Paid cash on account to Davis Chemical covering P421, less DM46, less 2% discount. C686. 12. Paid cash on account to Franken Mfg. covering P422, less 2% discount. C687. 19. Paid cash for advertising a paint sale, $1,650.00. C688. 25. Purchased accessories on account from Franken Mfg., $1,300.00. P423. Instructions: Explain what CRISPR is according to the text, the comprehensive high school system was designed to group of answer choices prepare females for marriage and males for university. exclude vocational training. prepare students for college. eliminate general education courses. identify which of the following molecules can exhibit hydrogen bonding as a pure liquid. select all that apply. group of answer choices h3c-o-oh h2n-nh2 c6h5-c(=o)-h cf4 h-br 15. What is the relationship between angle a , angle b and angle c?H Answer ASAP please I only got 10 more minEarth & space btw Karon bought snacks worth P200.00. Ana paid 55pand the rest of it. How much did Karen pay?0.00B. P 11.00CP 90.0025% of what number is 12?0.021B. 2.083C. 310. Marco, a basketball player, usually scores 80% of his fieldfield shots during the game, how many did he score?4 0.02B. 2C. 8 figure 10-35 shows three 0.0100 kg particles that have been v l glued to a rod of length l i 6.00 cm axis o and negligible mass. the assembly can rotate around a perpendicular axis through point 0 at the left