What is the difference, if any, between a project manager and a producer on a digital media production team? A project manager oversees the entire project, while the producer just oversees the creative element. A project manager just oversees the creative element, while a producer oversees the entire project. A project manager is in charge of the people involved in the project, while the producer secures the funds. A project manager secures the funds for the project, while the producer is in charge of the people involved.

Answers

Answer 1

Answer:

A project manager just oversees the creative element, while a producer oversees the entire project.

It is B

Answer 2

Answer:

b

Explanation:

got it right on the quiz


Related Questions

what is computer hardware?list any 4 computer hardware​

Answers

The parts of computer which can be touched ,seen and felt are commonly known as computer hardware.
Any 4 computer hardware are:-
1. CPU
2. Motherboard
3. Keyboard
4. Mouse,etc

In what ways can technology help you be more productive? (Select all that apply.)
Enables you to create electronic documents that present your ideas clearly and effectively
Enables you to communicate with people anywhere in the world
Enables you to store documents on a thumb drive
Enables you to eliminate procrastination habits

Answers

Answer:

Enables you to create electronic documents that present your ideas clearly and effectively.

Enables you to communicate with people anywhere in the world.

Enables you to store documents on a thumb drive.

Explanation:

Technology is the use or application of scientific knowledge to the way we live life. In other words, we can say that technology is the branch of knowledge that deals with the use of technical means in everyday life.

One of the ways that technology can help people be more productive is that it enables one to create electronic documents that clearly and effectively present one's ideas. It also helps in the communication process, especially in between long distances. Added to that, technological use also enables us to store documents on a thumb drive and enables easy transfer of documents and files.

Thus, the correct answers are the first, second, and third options.

While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe

Answers

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

1. Answer the following questions: a. What are the different types of number system? Name them.​

Answers

Answer:

binary,decimal, hexadecimal and octal number system

ou have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use

Answers

Server and network is 2 different things, just put the server on a different network.  ;) duh

Explanation:

A user is configuring an email client application and decides to use the TCP/IP suite protocol that will store all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. This protocol will store the email messages on the email server until the user explicitly deletes them.Which of the following TCP/IP port numbers will the client application typically use while using this protocol to contact the email server?A. 21B. 80C. 110D. 143

Answers

Answer:

D. 143

Explanation:

A server that allows the entire management of an email account through more than one email client such that the clients the messages of the clients are stored on the server pending being deleted by the user, is an IMAP server

The port that the IMAP server listens to is the port number 143, therefore, the client application typically makes use of port 143 while using the TCP/IP protocol to contact the email server

The mainframe computer are the ____ and most ____ computers..​

Answers

Answer:

Mainframe computer are the larger system computers and most expensive computer.

You have been hired to perform a penetration test for an organization. You are given full knowledge of the network before the test begins. Which type of penetration test are you performing

Answers

Answer:

If you are performing a penetration test with knowledge you are known as a white-hat hacker.

What is a protocol in digital technology plwwes help

Answers

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.

Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings.

Answers

Answer:

memo

Explanation:

Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings

can someone answer this? I'll mark u the brialintest!

Answers

pre convert single digits, or sometimes parts of a sum, then sum up. like this:

1.) 2³+2²+2^1+2^0 = 8+4+0+1 = 13

2.) 512 + 0 + 128 + 0 + 0 + 16 + 0 + 4 + 2 + 0 = 1010010110

you just need to know what the powers of two are, then you know how to convert numbers.

like 100 = 4 and 1 = 1 then 101 = 4 + 1 and in the other direction just take chunks of 5 until theres nothing left, but care not to overshoot the sum

5 = 2² + 0 + 2^1 = 101 in base2

the zeros are for the order, every time I would overshoot, it's a zero.

3.) 16 + 2 + 19 = 37

4.) 8² is 64, or (100)base8

8³ or 1000 would already overshoot, so let's see what we can do with the smaller value of a digit in base8, 8² = 64

we can 8 different digits (0 to 7) in base8

7x8^2 + 2*8^1 + 5*8^0

448 + 16 + 5

= (725)base8

very low battery right now. let me now if this already helps to grasp the concept. I'll come back later.

edit1: recharging my phone now. but I need to show quickly in order to get my own stuff done.

quick side note on topic: the number always stays the same, like if there would be a number of beans lying on the table. we justcrrorder them to write in another system. in normal base 10, 312 beans would be grouped intuitively in 3*100, 1*10 and 1*1

or: 3*10^2 + 1*10^1 + 2*10^0

note that something to the power of zero is always one (e.g.: 5^0 is like 5÷5)

I need help creating a symmetric histogram. The program should ask the user to enter the number of bars to print and the character to use to draw the bars. The count of characters in the bar needs to be displayed on the right-side of each bar. You must use a nested loop to display the output.

Answers

Answer:

The program in Python is as follows:

import math

bars = int(input("Bars: "))

symbol = input("Character: ")

current = 1

while current < bars * 2:

   if current <= bars:

       num = current

       for i in range(num):

           print(symbol,end="")

       print(current)

   else:

       num = abs(bars * 2 - current);

       for i in range(num):

           print(symbol,end="")

       print(i+1)

   current+=1

   

Explanation:

This imports the math module

import math

This gets input for the number of bars

bars = int(input("Bars: "))

This gets input for the number of characters

symbol = input("Character: ")

This sets the current element to 1

current = 1

The following iteration is repeated until printing ends

while current < bars * 2:

The following checks for printing in ascending order

   if current <= bars:

       num = current

The following loop prints the characters in ascending order

       for i in range(num):

           print(symbol,end="")

This prints the number of characters

       print(current)

The following checks for printing in descending order

   else:

Calculate the number of iteration left

       num = abs(bars * 2 - current);

The following loop prints the characters in descending order

       for i in range(num):

           print(symbol,end="")

This prints the number of characters

       print(i+1)

   current+=1

 

Write a program that takes the account's present value, monthly interest rate, and the number of months that the money will be left in the account as three inputs from the user. The program should pass these values to a function thatreturns the future value of the account, after the specified number of months. The program should print the account's future value.

Answers

Answer:

Assuming this is going to de made with python:

def main():

   currentValue = float(input("Current value of account: "))

   monthlyInterestRate = float(input("Monthly interest rate: "))

   monthsToWait = int(input("Amount of months the money will be left in the account: "))

   monthlyInterestRateToPercent = monthlyInterestRate / 100

   futureValue = float(round((currentValue + currentValue * monthlyInterestRateToPercent * monthsToWait), 2))

   print("The future value of this account will be " + str(futureValue))

main()

Explanation:

Hope this helped. Also, if this is incorrect please tell me what needs to be added so I can add it for future viewers. Have a good day :)

If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?

Answers

Answer: be nice no matter how mean or rude the person is.

Explanation: because if you’re not you can get in big trouble or fired.

Answer:

remain  calm during the conversation


b. "The actual use and implementation of computer started after third generations".
Justify this statement in your own words.

Answers

Answer:

The use of computers and planning of them didnt start until after the third generation.

Explanation:

Hope it helps✌✌

Answer: The computers of third generation used IC which replaced transistors. Now' the computers were more faster ,smaller and reliable so people started to use them often for many purposes ..So the actual use and implementation of computer started after third generations

A java program is composed of data members and functions.​
true or false ?

Answers

Answer:

true

Explanation:

state whether the following statement are true or false​

Answers

The following statement is true , Please mark me brainliest

Which computer can be used where there is no regular electricity?​

Answers

Answer:

A mechanical computer

Explanation:

Created from gears and levers

Write either True or False. a) Software is touchable part of computer system. b) System software provides easy interaction between user and computer c) Every computer needs to have own operating system. d) A computer can only understand the program written in assembly language. SANJIWANI Computer Book 7​

Answers

Answer:

A: False B: False C: True D: False

Explanation:

Tables should be used when (a) the reader need not refer to specific numerical values. (b) the reader need not make precise comparisons between different values and not just relative comparisons. (c) the values being displayed have different units or very different magnitudes. (d) the reader need not differentiate the columns and rows.

Answers

Answer: (c) the values being displayed have different units or very different magnitudes

Explanation:

A table is refered to as an arrangement of data in rows and columns. Tables are used in research, communication, and data analysis.

Tables are used in the organization of data which are too complicated or detailed to describe and the use of table give a clearer description. Tables should be used when the values being displayed have different units or very different magnitudes. Tables can also be used in highlighting patterns or trends.

What is the top 3 cloud provider in the world with statics or data including the example and reason(s).

Answers

Answer:

Amaz*n

Micros*ft

G*ogle

Explanation:

The top three cloud providers in the world right now with respect to our answer above have the following popular products: Amaz*n web services(AWS), Go*ogle Cloud Platform(GCP), Micros*ft Azure services. Why? These guys, notably Amazon(being number 1 cloud provider in the world) are largerly pioneers when you think anything "the cloud". Amazon for instance is known for its great reliability and large investment into cloud infrastructure and services. Simply put, these guys have the deepest pockets and market to keep being the top cloud providers in the world. They are the world's most valuable companies in the world with Amazon and Microsoft worth over 1 trillion dollars. A noteworthy statistic, Amazon's most profitable business, AWS has grown at a steady rate of 30% in the last year, raking over 10 billion dollars in first quarter of 2020.

A simple circuit consists of a battery, an ammeter and a 2-ohm resistor. If the ammeter reads 4 amperes, determine the voltage of the battery and enter in the appropriate space.

Answers

Resistance=2ohmCurrent=I=4AVoltage=V

Using ohms law

[tex]\boxed{\sf \dfrac{V}{I}=R}[/tex]

[tex]\\ \sf\longmapsto V=IR[/tex]

[tex]\\ \sf\longmapsto V=2(4)[/tex]

[tex]\\ \sf\longmapsto V=8V[/tex]

20 points!!!!! Plz answer quickly

Answers

Answer:

other words are not clear

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

a malware is any program designed to do harm

Explanation:

a malware (malicious software) is any software intentionally designed to cause damage to a computer,server, client or computer network.

Type the correct answer in each box. Spell all words correctly.

Digital artist Frank is discussing how to enhance scanned or photographed images. Complete the following sentences while keeping in mind the topic of discussion.

You can rework or enhance scanned or photographed images using photo editing and illustration software or by using a digital____.

The device has a_____surface on which you can draw images, graphics, and animations.

Answers

Answer:

1. Tablet

2. Flat

Explanation:

the second generation computer used. as a memory device

Answers

Answer:

The period from 1959-1965 was the second generation. Transistors that are cheaper, consumed less power, were used in this generation, were more compact, were more reliable, and were faster than first-generation vacuum tubing machines.

Explanation:

The primary memories and the magnet tapes and magnetic discs were used as secondary storage equipment in this generation.

The montage language and high programming languages such as FORTRAN, COBOL, have been used in this generation. The computers used batch processing and operating system multi-programming.

A memory is like the brain of human beings. It is used for storing information and instructions. Computer memory is the storage space on the computer that processes data and saves instructions for processing.

The memory is split into many small parts known as cells. There is a unique address for each location or cell, which varies from 0 to memory minus one.

There are three basic types of memory:

Memory Cache

Main Memory/Primary Memory

The Memory of a Second Kind

write a program to print grade according to percentage which is entered by the user at run time.​

Answers

Explanation:

pseudo code

var A=90%

var B=80%

var C=70%

var F=60%

var input=input

if(input>=A){

console.log(" A")

}

if(input>=B){

console.log(" B")

}

if(input>=C){

console.log(" C")

}

if(input>=F){

console.log("F")

}

Helllppppppp plzzzzzzzz

Answers

Answer:

i help you

ife ifrt ksd

its a study meeting of girls i am also girl here we only study boy were not allowed because he disturb here we only study its safe meeting of girl

Why should a user preview the document before printing?​

Answers

The user should preview a document first to make sure the layout is correct, so as not to waste paper if a font size or layout is incorrect.

Answer:

..........

Explanation:

.................sorry i dont know

A database planner names a field “Organic ingredients_3”. Why would this name Create possible problems in programming?

Answers

Answer:

I think the answer is 2.

hope it will help you

Because it contains an embedded space
Other Questions
Delta math need help In , Americans spent a record-high billion on Halloween-related purchases (the balance website). Sample data showing the amount, in dollars, adults spent on a Halloween costume are as follows. 12 67 25 62 33 38 34 47 53 16 11 97 46 32 62 27 a. What is the estimate of the population mean amount adults spend on a Halloween costume (to decimals) in how many ways can 7 people line if A needs to be first or last and B needs to be in the middle how do i solve this any one know pls help me How did the shift toward dtente influence U.S. foreign policy during the Cold War?A. It allowed U.S. leaders to order attacks on communist stateswithout formally declaring war.B. It convinced U.S. leaders to provide more support to foreignanticommunist groups.C. It led U.S. leaders to avoid becoming involved in conflicts withcommunist groups.D. It pressured U.S. leaders to refuse any request to reduce the sizeof its nuclear arsenal. Kingdom, Queen Hatshepsut was a powerful female pharaoh who encouraged trade. The driver of a tractor-trailer lost control of his vehicle after driving onto an icy bridge in excess of the speed limit and slid off the road. A state trooper responding to the accident got out of his squad car and walked toward the vehicle on the roadway. Before he could set up warning flares or safety cones, a delivery van approached the bridge in the oncoming lane. The van slid on the ice and spun out of control, striking and injuring the trooper. The trooper brought an action against the driver of the delivery van and the driver of the tractor-trailer. Will the trooper prevail as against the driver of the tractor-trailer how do you answer this what do you mean by components of mixture? solve 3 1/5 = y - 12/25 16. Recently educators that the computer makes the teaching and learning process more enjoyable and interactive. A. concluded B. have concluded C. conclude D. will conclude17. ____ you've made your own lifestyle more environmentally conscious, you can also engage in activism to help educate others on doing the same.A. Although B. Once C. Because D. Before Amelia is getting ready to sell her house. Her agent wants to do a CMA to help her determine the listing price. Amelia says it's not necessary, as she has the appraisal of the home from when she bought it eight years go. Her agent informs her that that valuation is no longer accurate. What principle of value is driving her agent's opinion find the measure of the missing angles in the kite answer please and no links .....thank you Which statement is true? What does it mean to Appeal to ethics Why did so many early civilizations arise near river valleys?Rivers provided an easy route for trade.The seclusion of a valley provided protection from enemies.o Water created fertile soil and other agricultural advantages.Monsoons inflicted less damage away from coastal areas. What is the freedom of press? Erica drives 25 miles south, and then drives east. After a while, it is determined that she's 60 miles (diagonally) from where she started. How far east did she drive? (HINT: draw a rough sketch!) PLS SOMEONE HELP ASAP IT'S DUE TONIGHT TY AND ILYSM