How is IT used in entertainment to make cartoon movies

Answers

Answer 1

Answer:

Forensic animation is a branch of forensics in which animated recreation of incidents are created to aid investigators & help solve cases. Examples include the use of computer animation, stills, and other audio visual aids.

hope you will get this answer correct


Related Questions

Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.

Answers

Answer:

True

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.

Type the correct answer in each box. Spell all words correctly.

Digital artist Frank is discussing how to enhance scanned or photographed images. Complete the following sentences while keeping in mind the topic of discussion.

You can rework or enhance scanned or photographed images using photo editing and illustration software or by using a digital____.

The device has a_____surface on which you can draw images, graphics, and animations.

Answers

Answer:

1. Tablet

2. Flat

Explanation:

please help me with this this is Computer chapter Advanced HTML of class 8th​

Answers

Answer:

ok let me try

It stands for

Hypertext Markup Language

Image result for html stands for

HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.

Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and password. You discussed about the call with the VP today and you got to know he never made that call. What type of attack is demonstrated in the given scenario

Answers

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

please hurry i need urgent

Answers

Answer:

Algorithm

1. Begin

2. num_bottles = 0

3. While num_bottles != 500

   3.1 Create bottle

   3.2 num_bottles = num_bottles + 1

4. Switch off machine

5. End

The flowchart has been added as an attachment

Explanation:

Begin algorithm

1. Begin

Initialize bottles to 0

2. num_bottles = 0

Repeat loop until 500 bottles is created

3. While num_bottles != 500

Create a new bottle

  3.1 Create bottle

Increment the number of bottles by 1

  3.2 num_bottles = num_bottles + 1

End Loop

Switch off the machine after loop ends

4. Switch off machine

End algorithm

5. End

If anyone knows how to use Access, how would I create a table like this one? (Add the fields in Table 2-29 Into the table and set field properties.)

Answers

Answer:

Explanation:

To create tables in Access using “Design View,” click the “Create” tab in the Ribbon. Then click the “Table Design” button in the “Tables” group. A new table then appears in the tabbed documents area. Type the name of a field into the “Field Name” column.

the second generation computer used. as a memory device

Answers

Answer:

The period from 1959-1965 was the second generation. Transistors that are cheaper, consumed less power, were used in this generation, were more compact, were more reliable, and were faster than first-generation vacuum tubing machines.

Explanation:

The primary memories and the magnet tapes and magnetic discs were used as secondary storage equipment in this generation.

The montage language and high programming languages such as FORTRAN, COBOL, have been used in this generation. The computers used batch processing and operating system multi-programming.

A memory is like the brain of human beings. It is used for storing information and instructions. Computer memory is the storage space on the computer that processes data and saves instructions for processing.

The memory is split into many small parts known as cells. There is a unique address for each location or cell, which varies from 0 to memory minus one.

There are three basic types of memory:

Memory Cache

Main Memory/Primary Memory

The Memory of a Second Kind

When a class implements in interface, it must ________ Group of answer choices overload all of the methods listed in the interface provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified not have a constructor be an abstract class

Answers

Answer:

provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified

Explanation:

I am assuming the programming language is Java. Actually, none of the answers are 100% correct, but this one is the only one that is partially correct. The reason is the class implementing an interface can be abstract, and in this case it may not provide ALL nondefault methods.

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

a malware is any program designed to do harm

Explanation:

a malware (malicious software) is any software intentionally designed to cause damage to a computer,server, client or computer network.

What is a protocol in digital technology plwwes help

Answers

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.

A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:

Answers

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

Bruce frequently works with a large number of files. He is noticing that the larger the files get, the longer it takes to access them. He suspects that the problem is related to the files being spread over the disk. What utility can be used to store the files contiguously on the disk

Answers

The utility that could be stored for the files is disk defragmenter.

The following information related to the disk defragmenter is:

In the case when the program saved the file on the disk so here the file should be put onto the empty space. It considered all the parts & pieces on each and every file and the same should be stored in one place.Also, the programs should be kept in one place, and the space that is not used should be on the hard disk.

Therefore we can conclude that The utility that could be stored for the files is disk defragmenter.

Learn more about the disk here: brainly.com/question/12656426

What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>

Answers

Explanation:

the output password is isalpha()

Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?

Answers

Answer:

The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT

Explanation:

The negative impacts of Internet of Things IoT devices on users are

1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices

write any five main features of fourth generation of computer?​

Answers

1) The fourth generation computers have microprocessor-based systems. It uses VLSI (Very Large Scale Integrated) circuits.
2) They are the cheapest among all the computer generation.
3) The speed, accuracy and reliability of the computers were improved in fourth generation computers.
i hope this helps you

You make a purchase at a local hardware store, but what you've bought is too big to take home in your car. For a small fee, you arrange to have the hardware store deliver your purchase for you. You pay for your purchase, plus the sales taxes, plus the fee. The taxes are 7.5% and the fee is $20. (i) Write a function t(x) for the total, after taxes, on the purchase amount x. Write another function f(x) for the total, including the delivery fee, on the purchase amount x. (ii) Calculate and interpret (f o t)(x) and (t o f )(x). Which results in a lower cost to you

Answers

Answer:

[tex]f(x) = 1.075x[/tex]

[tex]t(x) = x + 20[/tex]

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]

[tex](t\ o\ f)(x) = 1.075x + 20[/tex]

Explanation:

Given

[tex]Tax = 7.5\%[/tex]

[tex]Fee = \$20[/tex] -- delivery

Solving (a): The function for total cost, after tax.

This is calculated as:

[tex]f(x) = Tax *(1 + x)[/tex]

Where:

[tex]x \to[/tex] total purchase

So, we have:

[tex]f(x) = x * (1 + 7.5\%)[/tex]

[tex]f(x) = x * (1 + 0.075)[/tex]

[tex]f(x) = x * 1.075[/tex]

[tex]f(x) = 1.075x[/tex]

Solving (b): Include the delivery fee

[tex]t(x) = x + Fee[/tex]

[tex]t(x) = x + 20[/tex]

Solving (c): (f o t)(x) and (t o f)(x)

[tex](f\ o\ t)(x) = f(t(x))[/tex]

We have:

[tex]f(x) = 1.075x[/tex]

So:

[tex]f(t(x)) = 1.075t(x)[/tex]

This gives:

[tex]f(t(x)) = 1.075*(x + 20)[/tex]

Expand

[tex]f(t(x)) = 1.075x + 21.5[/tex]

So:

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]

[tex](t\ o\ f)(x) = t(f(x))[/tex]

We have:

[tex]t(x) = x + 20[/tex]

So:

[tex]t(f(x)) = f(x) + 20[/tex]

This gives:

[tex]t(f(x)) = 1.075x + 20[/tex]

We have:

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex] ---- This represents the function to pay tax on the item and on the delivery

[tex](t\ o\ f)(x) = 1.075x + 20[/tex] --- This represents the function to pay tax on the item only

The x coefficients in both equations are equal.

So, we compare the constants

[tex]20 < 21.5[/tex] means that (t o f)(x) has a lower cost

What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?

Answers

Answer and Explanation:

Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.

Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.

If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?

Answers

Answer: be nice no matter how mean or rude the person is.

Explanation: because if you’re not you can get in big trouble or fired.

Answer:

remain  calm during the conversation

What is a monitor?
i can ask everyone ​

Answers

Answer:

a screen which displays an image generated by a computer.

Explanation:

A monitor is a piece of computer hardware that displays the video and graphics information generated by a connected computer through the computer's video card. Monitors are similar to TVs but usually display information at a much higher resolution. Also unlike televisions, monitors typically sit atop a desk rather than being mounted on a wall.

The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

Answers

Answer:

True.

Explanation:

A resume (curriculum vitae) can be defined as a short text-based document that a job applicant use to briefly outline his or her qualifications, abillities and accomplishments, haven completed and obtained an academic certificate. Thus, it is used to briefly outline a person's qualifications, abillities, skills set, and accomplishments, after completing and obtaining an academic certificate such as a bachelor's degree, master's degree, etc.

Generally, all job applicants are required to have a resume (curriculum vitae). This brief and concise document is always requested by human resource managers during the job application process.

Furthermore, the primary way to make a resume persuasive (to convince or inform an action in the minds of the readers - potential employers) is by customizing it to fit each company and position.

Hence, the information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

This ultimately implies that, job applicants are expected to tailor their resume to fit or match the position that is advertised by a company's human resources department.

What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?

groups
tabs
sections
properties

Answers

Answer:

tabs

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

The commands which are used in Microsoft Word 2016 are displayed using series of icons that are stored on different tabs.

A ribbon is a combination of icons and tabs. In Microsoft Word 2016, the correct name for the words Home, Insert, Design, Layout, References, View, Mailings, and Review in the ribbon is tabs.

Tabs are a section of the Microsoft Word application that avails end users the opportunity to perform certain tasks such as formatting a text, changing the layout, clipboard, paragraph, styles, tables, page setup, inserting a theme, applying color, editing and inputting footnotes, header, citation and bibliography, etc.

Answer:

B, tabs

Explanation:

edge 2021

4) Programming a) WAp to find the greatest number among any three numbers.​

Answers

def comp_num (num1, num2, num3):

try:

if num1 > num2 and num1 > num3:

print ( "{0} is the biggest".format(num1) )

elif num2 > num1 and num2 > num3:

print ( "{0} is the biggest".format(num2))

elif num3 > num2 and num3 > num1:

print ( "{0} is the biggest".format(num3))

except ValueError:

return "Invalid input"

num_1 = int (input (" Please enter a number: "))

num_2 = int (input (" Please enter a second number: "))

num_3 = int (input (" Please enter a third number: "))

print (comp_num (num_1, num_2, num_3))

Answer:

this is in qbasic programming

While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe

Answers

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing

Answers

Explanation:

denial of service attacks (dos)

Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

What is Electronic jamming?

This is known to be a kind of  electronic warfare that is the use of jammers that shows interfering signals toward an enemy's system and thus it often blocks the receiver.

Therefore, Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

Learn more about jamming from

https://brainly.com/question/17488276

#SPJ9

what do you mean by automation and diligence with respect to a computer??​

Answers

Answer:

Delegince computer without any motion resists

Select the correct answer for each question.
Which of the following ports offers a fast
connection that could be used to download and
watch your favorite TV shows?
O Etherne
O modem
O FireWire
O USB
DONE

Answers

Answer:

USB

Explanation:

it is a standard cable connection for consumers electronics devices.

It is used to select specific menu options, drag and drop options and to draw something on screen.

Answers

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem

Answers

Answer:

Key escrow.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

The CPU is responsible for?

Answers

The CPU (Central Processing Unit) is the part of a computer system that is commonly referred to as the "brains" of a computer. The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program .

Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT

Answers

USB is the answer because that is the adapter to plug it in
Other Questions
Select THREE expressions that are equivalent to -16x - 68. A. -4(4x - 17) B. -2(8x + 34) C. 2( - 8x - 34) D. 4( - 4x - 17) E. 8( - 2x - 8) got it wrong the first time :( Choose the best answer that represents the property used to rewrite theexpression.log root(12, 125x ^ 3) = 1/4 * log 5x A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the: A student measures the volume of a small irregularly- shaped stone. Which apparatus must be used? a. a measuring cylinder containing water and a ruler only. b. a measuring cylinder containing water only. c. an empty measuring cylinder and a ruler only. d. a ruler only. why is repetition important in science? 1. Biochemical and differential tests can be incorporated into growth media or performed on isolated colonies after they have been cultured. Give three examples of a differential test that is incorporated into media and three examples that are applied after the colonies have been cultured. why is skilled human resource called an important infrastructure of development? Mention any 4 reasons. The fraction model below shows the steps that a student performed to find a quotient. Which statement best interprets the quotient? A: There are 5 1/5 five-sixths in 4 1/3. B: There 6 1/6 five sixths-in 4 1/3. C: There are 5 1/5 four and one-thirds in 5/6. D: There are 6 1/6 four and one-thirds in 5/6. Are you surprised to hear what Jesus said about the scribes and Pharisees? Those actions, don't we do the same thing? Whos glory do you seek and why? Matthew 23:23-26 solve for x please help (show ur work) Iiiteracy and poverty are the main causes of social evils." Do you agree with this statement? Write your logic? I need help ASAP please please please Please help me with 9 I really need it A character who grows as a result of a conflict or major events can be described as? write 1.4888... as a mixed number An equilibrium mixture of PCl5(g), PCl3(g), and Cl2(g) has partial pressures of 217.0 Torr, 13.2 Torr, and 13.2 Torr, respectively. A quantity of Cl2(g) is injected into the mixture, and the total pressure jumps to 263.0 Torr at the moment of mixing. The system then re-equilibrates. The chemical equation for this reaction is Transfusion of type AB blood would introduce both A and B ______________ which would be ______________ monosaccharides type Check all that apply.4x2 + 4x + 1 = 0O A. X=121B. X= -2c. x=-1O D. x = 2O E. x==32O F. X = 3 Historically, investments in the ________ have experienced the greatest returns.Bond marketReal estate marketStock marketMoney market 3. How fast can an impulse travel if the pathway is covered with myelin?