Directly at the subject's lips, position the microphone at a 45-degree angle. Shotgun microphones are highly directional supercardioid microphones that are designed to pick up sound in either direction. Place the microphone out of frame but as close to the subject as possible.
Edna needs a safer car to drive. She likes to travel a lot, so she is looking for a small SUV. She is trying to decide between buying a new or used car. After doing some research, she finds out that most cars lose value each year by a process known as depreciation. You may have heard before that a new car loses a large part of its value in the first 2 or 3 years and continues to lose its value, but more gradually, over time. That is because the car does not lose the same amount of value each year, but it loses approximately the same percentage of its value each year. What kind of model would be most useful for calculating the value of a car over time?
Answer: Buy a new car
Explanation: If its a used car its breaks will be worn out and more likely the breaks will stop working in 6 months and you have to change them. May the forse be with you.
⚠️⚠️⚠️⚠️HELP - What is the software that allocates resources of a physical computer to a virtual machine?
Group of answer choices
Switch
Operating systems
Hypervisor
HostVM
Answer:
the answer is going to be hostvm
A financially stable person is able to:
A. spend money without having to save.
B. use loans to cover his or her living costs.
C. default on loan payments.
D. save money.
Answer:
Save Money
Explanation:
D
The ribbon in Excel is a
tab based user interface.
True
False
Answer:
Explanation:
This should help i think it is true just read this first "Like any other application, Excel has a basic workspace called the user interface. ... The Ribbon is the name given to the row of tabs and buttons you see at the top of Excel. The Ribbon's tabs and buttons bring your favorite commands into the open by showing multiple commands grouped in specific categories."
Answer:
True
Explanation:
personal computer is the rise of what?
Answer:
Overuse injuries of the hand.
Obesity.
Muscle and joint problems.
Eyestrain.
Behavioural problems including aggressive behaviour.
Aspire is a test you take to prepare for the
A. PSAT
B. SAT
C. ACT
D. FAFSA
Answer:
ACT
Explanation:
"ACT Aspire is a powerful tool to help students and their parents monitor progress toward a successful ACT test from third grade through tenth grade. The Aspire test assess students' readiness in five areas covered by the ACT test: English, math, reading, science and writing." - https://greentestprep.com/resources/act-prep/act-aspire-test/
Aspire is a test you take to prepare for the ACT. Thus, option C is correct.
What is ACT?"ACT Aspire is a powerful tool to help students and their parents monitor progress toward a successful ACT test from third grade through tenth grade. The Aspire test assess students' readiness in five areas covered by the ACT test: English, math, reading, science and writing.Aspire is a test people take as a preparation for both ACT a d SAT.
Aspire is a valuable tool to help students and their parents monitor progress towards a good ACT exam from 3rd to 10th grade. The Aspire test assesses student performance in five areas covered by the ACT exam: English, math, reading, science and writing. Aspire Test is offered in the spring and fall seasons, the cost of the assessment tool depends on how many subjects you would like to measure and how often you want your student to be tested.
Learn more about Aspire Test on:
https://brainly.com/question/4469429
#SPJ7
how do you think the blitz might have affected civilian morale in london
Answer:
It would have seriously negatively affected civilian morale in London. Hearing about the horrors of the war even from far away does a number on morale. This, however, was not exactly the case for London in WWII, because even as air raids were executed on the city, the citizens, confined to underground bomb shelters, still managed to pull together and keep morale high, causing London NOT to plunge into chaos, but to stand united against Germany.
The following table represents the addresses and contents (using hexadecimal notation) of some cells in a machine's main memory.Starting with this memory arrangement , follow the sequence of instructions and record the final contents of each of these memory cells: Address Contents 00 AB 01 53 02 D6 03 02 Step 1. Move the contents of the cell whose address is 03 to the cell at address 00. Step 2. Move the value 01 into the cell at address 02. Step 3. Move the value stored at address 01 into the cell at address 03.
Answer:
I DON'T KNOW THE ANSWER SO SORRY
Explanation:
BUT THANKS FOR THE POINTS
You want to change your cell phone plan and call the company to discuss options
⚠️⚠️⚠️⚠️⚠️⚠️Help! What is not an advantage of using virtual machines?
You can run multiple operating systems on one physical machine.
It doesn’t take up any storage space on the physical machine.
You can save the entire state of a VM to your files.
Provides fault and security isolation for the computer’s hardware
Answer:
It doesn’t take up any storage space on the physical machine.
Explanation:
The virtual machine does take up some storage space on the physical machine.
What do y’all think are the pros and cons to using technology?
Answer:
Explanation:
pros. convenient, easy to use, and educational cons. addictive, mentally draining, and creates a social divide.
A digital footprint is .
Your digital footprint is the trail of 'electronic breadcrumbs' you leave behind when you use the internet. It can include the websites you visit, the photos you upload and your interactions with other people on social networks.
Answer: is something you must manage
PLZZZZ HELP!!!
Select the correct answer.
What does the coding phase involve?
A.
testing and debugging code to remove all possible errors
B.
writing sequences of statements in a suitable programming language to produce the desired program
C.
designing a proper pseudocode using human-readable language
D.
compiling and interpreting programs into machine language
E.
breaking down the entire code into workable modules
Answer:
B.
writing sequences of statements in a suitable programming language to produce the desired program
Explanation:
During the coding phase, developers analyze the feasibility of each coding language and begin programming according to coding specifications. Without proper coding, the product won't function according to the customer's specifications, and new codes may need to be implemented
they will wash the car change into tag question
Answer:
They will wash the car, won't they?
Explanation:
A tag question usually comes after an independent clause. The tag question is most times attached with the intent of affirming the statement made in the independent clause. Our independent clause in the answer above is; "They will wash the car". The tag question, "Won't they?" is meant to affirm that statement.
Another example is, "They are going to school, aren't they?" In this example also, the independent clause makes a sentence that is to be confirmed by the tag question.
All of the following are problem-solving steps except:
A. taking action.
B. defining the problem.
c. doing the first solution that comes to mind.
D. creating possible solutions.
Answer:
C. Doing the first solution that comes to mind.
Explanation:
Lets break this down a bit.
A is a great problem solving step, so we can mark that off.
We can do the same for B.
However, for C, I am hesitant about this one, so I wont mark it off quite yet.
Finally, for D, it is definitely a step, so I can mark that off.
You should never do the first solution that comes to mind, since you haven't done enough brainstorming about other ideas.
Hope this helps!
NO LINKS
Do you need to pay monthly to stream on Twitch?
What are the two main parts of system unit hardware?
Answer: Computers have two main parts: hardware and software
Like piano (hardware) and music (software)
Explanation:
All changes
1.(01.01 LC)
To make sure you do not get too tired when using the computer for long periods of time, how often should you get up to stretch and move? (5 points)
O Every hour
O Every 10 minutes
O Every 30 minutes
O Every two hours
You should get up and move every 30 minutes
Hope this helps
-scav
Answer:
C
Explanation:
U
Question 5
1 pts
Which of the following Python code segments best matches this Scratch block?
set X
to 0
x > 0
then
change x by 1
se
change
by 10
x = 0
if x > 0:
X = X - 1
else:
X = X + 10
HELPPPPPP How is does technology impact the career of your choice? Write 5-6 sentences about how technology impacts the career of your choice.
Answer:
Explanation:
Summary. Technology has had a dramatic impact on the nature of work itself, individual applicants and employees, employers, and career counselors. It has changed the nature of work and the types of jobs that people do today. It has altered the knowledge and skills individuals need to be effective workers.
Describe the importance of human resource for business growth
Answer:
Having come a long way since traditional “personnel,” HR is a critical business function that helps companies succeed in hiring employees, keeping them engaged, and supporting their growth and development. HR Assists Managers and Team Leaders. ... HR Helps Employees Achieve Their Career Goals.
Which option is the default configuration of the Junk Email Options in Outlook 2016?
No Automatic Filtering
Low
High
Safe Lists Only
Answer:
No Automatic Filtering
Answer:
NO automatic filtering
Explanation:
i took the quiz
A customer opened a file attachment, and now her PC is infected with ransomware. She's unable to open any of her files. Which action would you take first?
A. Reinstall the operating system
B. Run an antivirus scan
C. Pay the ransom to recover the data
D. Disconnect the PC from the network
E. Restore files from backup
Answer:
D. Disconnect the PC from the network
Explanation:
I'd say this because it keeps the ransomware from spreading to other computers making it a bigger problem.
In this question, the answer is "Option D", which disconnects the PC from the network, which can be defined as follows:
A customer's PC has been attacked using ransomware after she opened a document file. She has been unable to access any of her files. She first had to detach the PC from the system to access the file.This type of malicious software (malware) threatens to publish or prevent information or computer access until the victim pays a ransom price to the attacker. Today, ransomware assaults are all too frequent. This attacker then demands a ransom from the victim, promising to restore access to the information in exchange for payment.The wrong option can be defined as follows:
In option a, it is wrong because when we reinstalling the OS is used to start the fresh without using the old files.In option b, it is wrong because the antivirus can't protect the ransomware maliciously. In option c, it is wrong because when a corporation can pay the ransom, their cash is dispersed across the dark web.In option e, it is wrong because creating copies of information could be recovered in the event of a primary information failure.Learn more:
Ransomware: brainly.com/question/14455233
who was the first inventor of computer
Answer:
Explanation:
English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine.
Answer:
Charles Babage is the first inventor of computer.
6.20 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input. Ex: If the input is: Institute of Electrical and Electronics Engineers the output should be: IEEE
Answer:
Explanation:
The following code is written in Python. It creates a function that takes in a phrase as an argument. Then it splits the phrase into a list of words. Next, it loops through the list and adds the first letter of each word into the acronym variable if it is a capital letter. Finally, returning the acronym variable. Output can be seen in the attached picture below.
def accronymGenerator(phrase):
phrase_split = phrase.split(' ')
acronym = ""
for x in phrase_split:
if x[0].isupper() == True:
acronym += x[0]
else:
pass
return acronym
Select the correct answer.
Who takes care of the final layout of the product that meets the standards set by UX designers?
O A web developer
ОВ.
design director
OC. UX designer
OD. UI designer
Reset
Next
Hi
Answer:
UI designer
Explanation:
Who is the one you shouldnt have killed from fnaf?
(I already know but whoever answers first and right gets brainlest)
Answer: He was thought to be one of William Aftons victims who is also thought to be the child who possessing golden freddy
Explanation:
Answer:
Cassidy I guess
Consider four Internet hosts, each with a TCP session. These four TCP sessions share a common bottleneck link - all packet loss on the end-to-end paths for these four sessions occurs at just this one link. The bottleneck link has a transmission rate of R. The round trip time, RTT, for all fours hosts to their destinations are approximately the same. No other sessions are currently using this link. The four sessions have been running for a long time. What is the approximate throughput of each of these four TCP sessions
The correct response is - The TCP protocol creates a three-way connection between hosts on a network to send packets. It is a connection-oriented protocol. It is a protocol found in the OSI network model's transport layer. Given that all lost packets are sent again, it is trustworthy.
What is a TCP protocol?One of the key protocols in the Internet protocol family is the Transmission Control Protocol. It was first used to supplement the Internet Protocol in the first network installation. TCP/IP is the name given to the full suite as a result.
The usage of TCP allows for the safe exchange of data between the server and the client. No matter how much data is transferred across the network, it ensures its integrity. It is therefore used to transfer data from higher-level protocols that demand the arrival of all sent data.
The usage of TCP allows for the safe exchange of data between the server and the client. No matter how much data is transferred across the network, it ensures its integrity.
To read more about TCP protocol, refer to - https://brainly.com/question/27975075
#SPJ6
Can someone plz answer these questions plz
Answer:
ñbyte I'm pretty sure, sorry if u get it wrong you should do more research about the question if i get it wrong!!
Need help ASAP??? Pick the best answers
Answer:
A and C are correct pick both