In the digital media process, what is one of the differences between the plan/design stage and the create/develop stage?

A) Scripts, storyboards, and flowcharts are created in the plan/design stage, and utilized in the create/develop stage.

B) Scripts, storyboards, and flowcharts are involved with the plan/design stage, but not with the create/develop stage.

C) Scripts, storyboards, and flowcharts are involved with the create/develop stage, but not with the plan/design stage.

D) Scripts, storyboards, and flowcharts are created in the create/develop stage, and utilized in the plan/design stage.

Answers

Answer 1

Answer:

Scripts, storyboards, and flowcharts are created in the plan/design stage, and utilized in the create/develop stage. A

Answer 2

Answer:

A.) Scripts, storyboards, and flowcharts are created in the plan/design stage, but utilized in the create/develop stage.

In The Digital Media Process, What Is One Of The Differences Between The Plan/design Stage And The Create/develop

Related Questions

Can anyone help me solve this?

Answers

Answer:

what should be basically be done in this question?

that’s not a question

C. Assessment Application
MATCHING TYPE
Directions: Match column A with column B. Write the letter of your
answer on the space provided.
А
B В
1. Disk Cleanup
A. Repairs and cleans the Windows Registry
2. ASC
3. Scandisk
B. Repairs registry errors, remove "junk" files,
and ensure your PC is fully protected
C. Creates and deletes disk partitions
D. Accesses various information's about your
computer
E. Tunes up and maintains your PC automatically
F. Optimizes use of space on a disk.
4. ASC Pro
5. Format
6. CPU-Z
7. Defrag
G. Tunes up and maintains your PC, with anti-
spyware, privacy protection, and system
cleaning functions
H. Prepares a hard drive prior to use.
I. Checks for physical errors on the disk surface
J. Removes unused files.
8. ARO 2013
9. Fdisk
10. RegDoctor
--00 End of the Module 00--​

Answers

Answer:

[tex]\begin{array}{lll}&A&B\\1&Disk \ cleanup& Removes \ unused \ files\\2&ASC&Tunes \ up \ and \ mantains \ your \ PC \ automatically\\3&Scan \ disk &Checks \ and \ removes \ errors \ on \ the \ disk \ surface\\4&ASC \ Pro& Tunes \ up \ and \ maintains \ your \ PC, \ with \ anti-spyware, \ privacy \ prot \\\\\end{array}[/tex][tex]\begin{array}{lll}\\5&Format&Prepares \ the \ hard\ drive\ prior \ to \ use\\6&CPU-Z&Accesses \ various \ informations \ about \ your \ computer\\7&De-frag&Optimizes \ use \ of \ space \ on \ disk\\8&ARO \ 2013& Repirs \ registry \ errors, \ removes \ "junk" \ files\\9&Fdisk&Creates \ and \ deletes \ disk \ partitions\\10&RegDoctor&Repair \ and \ cleans \ the \ windows \ registry \end{array}\right][/tex]

Explanation:

Read the integer numbers in the text file "1000 Random Number from 0 to 100.txt" into a list

PLEASE HELP THANK U!!

Answers

Answer:

random_number_file = open("1000 Random Number from 0 to 100.txt", 'r')

random_number_list = random_number_file.readlines()

print('random_number_list)

Explanation:

The name of the file containing the random integer text is ; "1000 Random Number from 0 to 100.txt"

The random_number_file variable stores the opened file ("1000 Random Number from 0 to 100.txt") using the open keyword and reads it ('r')

This file stored in the random_number_file variable is the read into a list by using the readlines() method on the random_number_file

how much video does a 10gb video hold i will give brainliest for first correct answer

Answers

Answer:

2,000 songs

Explanation:

An investment bank has a distributed batch processing application which is hosted in an Auto Scaling group of Spot EC2 instances with an SQS queue. You configured your components to use client-side buffering so that the calls made from the client will be buffered first and then sent as a batch request to SQS. What is a period of time during which the SQS queue prevents other consuming components from receiving and processing a message

Answers

Answer: Visibility timeout

Explanation:

The period of time during which the SQS queue prevents other consuming components from receiving and processing a message is known as the visibility timeout.

It is the length of time when a message will be hidden after such message has been grabbed by a consumer. It is essential as it prevents others from processing such message again.

3 Negative ways of using the Internet​

Answers

Answer:

1. It rots the mind of children

2. It's to too addicting

3. can show bad things.

Explanation:

1. Cyber bullying.
2. Gambling (playing games where you win money)
3. Identity theft, hacking.

Kirstie needs a computer for word processing, emailing, downloading high definition TV
series from an online store and basic photo editing.
Which computer would you recommend for Kirstie? Give reasons for your answer.

Answers

NmmkkjdijdjrjrjdjirjrkdidiL028

what is the effect of flattening layers in image editing?
you can reduce file size by flattening layers. this operation mergers all ___ layers into the background and discards hidden layers.
all ___ areas that remain are filled with white.

first blank
a. black
b. colored
c. transparent

second blank
a. dark
b. visible
c. bright

Answers

The answer to this blanks are black and visible

Answer:

Hello There!!

Explanation:

I believe the answers are:

-First blank=>c. transparent

-Second blank=>b. visible.

hope this helps,have a great day!!

~Pinky~

In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users. This is an example of violation of ___________________.

Answers

Answer:

The answer is "Authentication"

Explanation:

The attacker had the opportunity to log into the legitimate users' stolen credentials in Boeing systems and other firms in this question. That's an example of a verification violation.

This is a recognition of the identification of a user. Various students typically require various kinds of certificates in order to create the identity of the user. The credentials are frequently a passcode that only people and the computer know and seem to be confidential.

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters.
For example, the string "THIS_IS_THE_BEST_WISH" can be encoded as "%#_#_%E_BEST_W#H" by replacing all instances of "TH" with "%" and replacing all instances of "IS" with "#".
Which of the following statements about byte pair encoding is true?
A. Byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string.
B. Byte pair encoding is an example of a lossy transformation because some pairs of characters are replaced by a single character.
C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.
D. Byte pair encoding is an example of a lossless transformation because it can be used to transmit messages securely.

Answers

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

5.2
Explain ONE reason why the special equipment is used when
testing eyesight for a driver's licence.
(2)​

Answers

Answer:

In order to reduce the risk of accidents on the roads.

Explanation:

The special equipment is used when  testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.

What is the output of:

print (8 % 4)

Answers

Answer:

0

Explanation:

The statement, print(8 % 4) will produce the output 0 ;

The print statement is an inbuilt function which is used to output a typed string or display result of a Mathematical calculation and so on.

The expression in the print statement gives 0;

8%4 means, the remainder when 8!is divided by 4 ; 8 /4 gives 2 without a remainder. Meaning that :

8%4 = 0

Hence, print(8 % 4) = 0

what type of data type is 1+78-5​

Answers

Answer:

Integer

Explanation:

Given

[tex]1 + 78 - 5[/tex]

Required

The datatype

1, 78 and -5 are all numbers and they are without decimal points,

When a number is without decimal, such number is referred to as integer.

Hence, the datatype is integer

1 punto
María tiene una empresa de mercancia
seca, dicha empresa brinda su servicio de
ventas de estas mercancías al por mayor y
menor para su clientela. ¿De qué tipo de
Comercio hablamos en este ejemplo?: *

Answers

Answer:

Retailing.

Explanation:

La venta al por menor o retailing es el suministro de bienes físicos a los consumidores para uso personal, sea en pequeña o grandes cantidades, siempre que esté destinado a consumidores finales. Es un sector que consta de diferentes ramas (como la industria alimentaria, la industria de la moda, la industria del mobiliario para el hogar, etc.). El comercio minorista es el último eslabón de la cadena de suministro que va desde el fabricante hasta el consumidor.

Which statement is true? Select 3 options.
1. Deques can be created empty.
2. Deques are lists.
3. Lists are deques.
4. Deques can contain lists.
5. A deque is a type of collection.

Answers

Answer:

2nd statement is True dear!!!

Answer:

Deques can contain lists.

A deque is a type of collection.

Deques can be created empty.

Explanation:

Answers can be found in Edge instructions

"You can make a deque whose members are lists."

"You can create an empty deque or create a deque with a list or a string."

"You have used lists and deques, which are two types of collections used by Python. "

How long you plan to keep your investments in your portfolio refers to:
A. Time horizon
B. Asset allocation
C. Personal financial health
D. Risk tolerance

Answers

Answer:

A, because it has to do with the amount of time you have it in your portfolio.

1. Ngangingazi Ukuthi Ukulalela Abazali Nothisha Bami Kuletha Impumelelo
Enhle Kangaka.
[50]​

Answers

Answer:

yebo kumele ubalalele ngoba ayikho into yakho eyophumelela ungabalalelanga abazali

spam and i report
Maurice wants to create a variable to store the name of the second-best taco place. Maurice writes the line of code as 2ndtaco = "Tio Dan's" but gets an error message. What is the problem with Maurice’s code?

A.
There can’t be an apostrophe ' in a variable name.

B.
The equals sign should be a dash.

C.
The type of variable wasn’t specified.

D.
A variable name can’t begin with a number.

Answers

Answer:

option d is the correct answer

Answer:

For your other question I think it's true

Explanation:

Suppose a large group of people in a room were all born in the same year. Consider the following three algorithms, which are each intended to identify the people in the room who have the earliest birthday based on just the month and day. For example, a person born on February 10 is considered to have an earlier birthday than a person born on March 5. Which of the three algorithms will identify the correct people?
I. All the people in the room stand up. All standing people form pairs where possible, leaving at most one person not part of a pair. For each pair, the person with the earlier birthday remains standing, while the other person in the pair sits down. If there is a tie, both people sit down. Any individual not part of a pair remains standing. Continue doing this until only one person remains standing. That person has the earliest birthday.
II. All the people in the room stand up. All standing people form pairs with another standing person that they have not previously been paired with where possible, leaving at most one person not part of a pair. For each pair, the person with the earlier birthday remains standing, while the other person in the pair sits down. If there is a tie, both people in the pair remain standing. Any individual not part of a pair remains standing. Continue doing this until only one person remains standing or all persons standing have the same birthday. Anyone still standing has the earliest birthday.
III. Beginning with the number 1, ask if anyone was born on that day of any month. Continue with the numbers 2, 3, and so on until a positive response is received. If only one person responds, that person has the earliest birthday. If more than one person responds, determine which person was born in the earliest month, and that person or those persons have the earliest birthday.

Answers

Answer:

II is correct.

Explanation:

Algorithm is a computer program which solves complex problems within minutes. The algorithms has different variants which are used according to user demand. In the given scenario the choice no II is correct. All standing people can form a pair with another standing person and the person standing in the last will have the earliest birthday.

What information is automatically generated from the company identifier and product name?

A.
project name
B.
class prefix
C.
bundle identifier
D.
organization name

Answers

I think it’s project name, but I’m not 100% positive

Nina visited an area that receives a large amount of precipitation during all twelve months and is typically warm year round. The area also has a large variety of organism diversity. What biome did Nina most likely visit?

Answers

Answer: Rainforest

Explanation:

A rainforest is an area that typically has tall, green trees and also has a high amount of rainfall. Rainforest can be found in the wet tropical uplands and lowlands. The largest rainforests can be seen in the Amazon River Basin.

Since the area visited by Nina has a large amount of precipitation during all twelve months, typically warm year round and has a large variety of organism diversity, then the biome thatcNina most likely visited is the rainforest.

You are going to create multiple functions that will take in the appropriate measurements as parameters and calculate the area of the specific shape.

The following shapes must be included:
Square, Triangle, Circle, and Trapezoid

Feel free to add on more shapes if you want!!

Answers

Answer:

circle

Explanation:

Answer:

circle

Explanation:


Which tab is used to create a
new e-mail?

O File
O View
O Folder
O Home

Please help!!!!!!!!!!!!!

Answers

Answer:

Mail tab

Explanation:

Please mark as brainliest answer as it will also give you 3 points

File , brainliest answer. Hope this helps


After you have figured out your storyline, what should be the next thing to
focus on?
1.character devlopment
2. What you want to name your video​

Answers

Answer: 2

A storyline figured out means you should already know the plot, setting, conflict, theme and characters (character development)
Figure out the story line, plan things out

Select three advantages to using digital video.

A) Digital video appears to have more depth.

B) Digital video can capture a greater range of brightness.

C) Digital video is much less expensive than film.

D) Digital video be easily edited and shared.

E) Digital video can be viewed in real time where it was taken.

Answers

C. E and D, I believe. I apologize if I’m incorrect!

Answer:

Digital video be easily edited and shared., Digital video is much less expensive than film., Digital video can be viewed in real time where it was taken.

Explanation:

Hi there!
I am writing a research paper on Satellite internet. I have about 4 out of 6 pages of information written down. What are some topics to talk about regarding satellites? It does not have to be specifically about satellites. Just some things to add to the paper. I am not sure what subject it fall under, so i'm going to post it twice.
Thank you in advance.

Answers

Answer:hi there

Explanation:

Satellite Internet access is Internet access provided through communication satellites. Modern consumer grade satellite Internet service is typically provided to individual users through geostationary satellites that can offer relatively high data speeds

como se genera la electricidad con energias no renovables
porfa alguien me ayuda llevo muchas horas buscando la respuesta
doy corona y todos lo puntos que pueda

Answers

Answer:

efeiueur eiuube erferve

Explanation:

Answer:

La energia no renovable proviene de fuentes que se agotaran o no se repondran durante miles o incluso millones de años.

Los combustibles fósiles se queman para generar energía y electricidad. Por ejemplo, carbón.

Fill in the blanks
A dash is a human-readable description in the source code of a computer program
Python has dash standard data types
A dash contains items separated by commas and enclosed within square brackets
A dash consists of key-value pairs
dash cannot be changed and use parentheses

Answers

Answer:

1. Comment

2. Five (5).

3. Line.

4. Tuple; that

Explanation:

1. A comment is a human-readable description in the source code of a computer program. Thus, it's an annotation or description in the source code of a software program that is readable by humans.

2. Python has five (5) standard data types, these includes; number, string, list, dictionary and tuple.

3. A line contains items separated by commas and enclosed within square brackets i.e [ ]. Thus, it's simply an ordered collection of one or multiple data items.

4. A tuple consists of key-value pairs

that cannot be changed and use parentheses. For example, Newtuple = ("strawberry", "apple", "mango", "banana", "orange").

Q.No.2. A study of the effect of smoking on sleep patterns is conducted. The measure observed is the time, in minutes, that it takes to fall asleep. These data are obtained: [3] Smokers:69.3 56.0 22.1 47.6 53.2 48.1 52.7 34.4 60.2 43.8 23.2 13.8 Non Smokers: 28.6 25.1 26.4 34.9 28.8 28.4 38.5 30.2 30.6 31.8 41.6 21.1 36.0 37.9 13.9

Answers

Answer:

(a) [tex]\bar x_1 = 43.7[/tex]     [tex]\bar x_2 = 30.25[/tex]

(b) [tex]\sigma_1 = 16.93[/tex]    [tex]\sigma_2 = 7.14[/tex]

(c) Smoking increases the time to fall asleep

Explanation:

Solving (a): The sample mean of each group

Mean is calculated as:

[tex]\bar x = \frac{\sum x}{n}[/tex]

So, we have:

Smokers

[tex]n_1= 12[/tex] and

[tex]\bar x_1 = \frac{69.3 +56.0+ 22.1 +47.6+ 53.2+ 48.1+ 52.7 +34.4+ 60.2 +43.8 +23.2 +13.8}{12}[/tex]

[tex]\bar x_1 = \frac{524.4}{12}[/tex]

[tex]\bar x_1 = 43.7[/tex]

Non Smokers

[tex]n_2 = 15[/tex] and

[tex]\bar x = \frac{28.6 +25.1 +26.4 +34.9 +28.8 +28.4 +38.5 +30.2 +30.6 +31.8 +41.6 +21.1 +36.0 +37.9 +13.9}{15}[/tex]

[tex]\bar x_2 = \frac{453.8}{15}[/tex]

[tex]\bar x_2 = 30.25[/tex]

Solving (b): The standard deviation of each group

This is calculated as:

[tex]\sigma = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

For smokers

[tex]n_1= 12[/tex]

So:

[tex]\sigma_1 = \sqrt{\frac{(69.3 -43.7)^2+(56.0-43.7)^2+..........+(13.8-43.7)^2}{12-1}}[/tex]

[tex]\sigma_1 = \sqrt{\frac{3152.04}{11}}[/tex]

[tex]\sigma_1 = \sqrt{286.5491}[/tex]

[tex]\sigma_1 = 16.93[/tex]

For non-smokers

[tex]n_2 = 15[/tex]

So:

[tex]\sigma_2 = \sqrt{\frac{(28.6 -30.25)^2+(25.1 -30.25)^2+..........+(13.9 -30.25)^2}{15-1}}[/tex]

[tex]\sigma_2 = \sqrt{\frac{713.2575}{14}}[/tex]

[tex]\sigma_2 = \sqrt{50.9469}[/tex]

[tex]\sigma_2 = 7.14[/tex]

Solving (c): Impact of smoking on time to sleep

In (b), we have:

[tex]\sigma_1 = 16.93[/tex] --- smokers

[tex]\sigma_2 = 7.14[/tex] --- non-smokers

Smokers have larger standard deviation (i.e. large variability) than non-smokers. This means that smokers require more time to fall asleep.

You should not photograph where unless you have permission?
O A public park
O Your backyard
O A parade
O Into someone's window
PLZ HELP ME

Answers

Answer:

Into someone's window

Explanation:

We should not photograph into some one's window, unless we have permission

Answer:

Hello There!!

Explanation:

I believe the answer is O Into someone's window.

hope this helps,have a great day!!

~Pinky~

Other Questions
yhgj bhvh bb b nh bb n sdfghjk Petra jogs 3 miles in 30 minutes. At this rate, how long would it take her to jog 7 miles? Amy is 8 years older than Ben. Im 5 years time, she will be twice Bens age. How old is she right now? As a result of a volcanic eruption, Enkai and the cattle were thrown into the sky. Enkai wanted to save his cattle. He grew a tree that bridged the sky and the earth. The cattle walked down the tree to Neiterkob. Neiterkob and the Maasai tribe took over caring for the cattle.Why does the summary need to be revised? statement of pythagoras theorm no need proof only statement plz need fast I NEED HELP ASAP PLEASE Select the correct answer. What is -16 + 49 written as a complex number in the form ? A. 7 + 4i B.7 - 4i C.-4+7i D.4+7i Simplify the expression. (8.6)0118.60 What did the King hope to accomplish by Stamp Act? Which of the following does NOT describe the front-end business practices of firms that respect the strategic roles of purchasing?a. Product development is regarded as a front-end business practice.b. Creativity does not require discipline.c. Marketing in general is regarded as a front-end business practice.d. High level of uncertainty is about the fact that people have to make important decisions and although they do not have all the relevant information they need.e. Front-end business practices are discovery-driven in that they explore and create from what they do not know about. 1 of 5The ratio of boys to girls in a class is 4:3. There are 35 students in the class. How manystudents are girls? Can someone answer these for me (real answers only please) thank you!!!!!! The volume of a particular die is 12100 mm3. Use the fact that 10 mm equals 1 cm to convert this volume to cm3. Pythagorean theorem. How did Hitlers rule in Nazi Germany exemplify totalitarian rule?Be sure to explain the characteristics of totalitarian rule, and to what extent this type of government was seen in Nazi Germany. Use evidence from at least five documents in your essay. Support your response with relevant facts, examples, and details. For Circle A, if the measure of BDC=20 and the measure of BDC=4x-12, then what is the value of X?? Yo ______________ almuerzo con mis amigos.Fill in the blank.A: compartenB: comparteC: compartimosD: comparto Can someones please help Adding a catalyst to a system at equilibrium lowers the activation energy required by a system, which system, which shifts the equilibrium position toward the products.True or false? QUESTION 3 (a) Ammonium sulphate, (NH),50, is a soluble salt and it is used in agriculture as fertiliser. 5 g of ammonium sulphate is dissolved in 1 litre of water to produce ammonium sulphate solution. (Relative atomie mass: H = 1, N = 14,0 = 16, ) Calculate (1) the number of inoles of dissolved ammonium sulphate(ii) the number of molecules present in the ammonium sulphate solution.(iii) the number of positive ions present in the ammonium sulphate solution (iv) the number of negative ions present in the ammonium sulphate solution (v) the total number of ions present in the ammonium sulphate solution