answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
2 years ago
14

Read the description of Mike’s work, and identify his profession. Mike’s job is to record sounds in a studio. He studies a video

and physically recreates ambient sounds such as the opening and closing of a drawer, the creaking of a chair when a person sits down, and the sound of a keyboard when a person types on it. Mike is a
.
Computers and Technology
2 answers:
adoni [48]2 years ago
8 0

Answer:

The correct answer would be, Audio Engineer.

Explanation:

An Audio Engineer is also called as Sound Engineer or Recording Engineer. The work of an Audio Engineer is to produce ambient sounds. The Audio Engineer recreates sounds of things that cannot be produced by mouth of a person, like for example they may create sound of trees in the stormy night, the sound of wind, the sound of windows, the creaking of chair when a person sits on it, sound of keyboard when a person types on it, opening and closing of doors, etc. All such type of sounds are made by audio engineers. They use a mix of audio effects to produce the most accurate sounds of the type. So Mike is An Audio Engineer.

kipiarov [429]2 years ago
7 0
Mike is a Sound Engineer
You might be interested in
Explain in two or three sentences why health science careers are among the fastest growing careers in
il63 [147K]

Answer:

The growing concern of health science professionals and their limited number has caused students to opt for the courses in the U.S.

Explanation:

Health science professions account for more than half of the top twenty major growing occupations worldwide. According to the survey in 2018, it was estimated that by 2020 the United States would need around six million additional healthcare employees. And in the present scenario of the Coronavirus pandemic, it has been increased incredibly.  And therefore more educational institutes are providing programs to assist students to prepare for health science careers.

3 0
2 years ago
A laptop gets replaced if there's a hardware issue. Which stage of the hardware lifecycle does this scenario belong to?
Ilya [14]

Answer: Maintenance. This is the stage where software is updated and hardware issues are fixed if and when they occur. Retirement. In this final stage, hardware becomes unusable or no longer needed and it needs to be properly removed from the fleet

Explanation:

3 0
2 years ago
In __________ mode, the data within an ip packet is encrypted, but the header information is not.
Anvisha [2.4K]

Answer:

Transport mode

Explanation:

The host-to-host transport mode of internet protocol security (IPsec) is mostly used between two host devices or between a user and a server. When you go online and Google something, what you have done is send a packet request to a server. The IPsec’s transport mode offers secure protection to parts of this IP packet. The packet consists of the original IP header and an IP payload (TCP header and data). In transport mode, only the IP payload is encrypted. The original IP header is not.

6 0
2 years ago
If Maya wants to access a view that would control multiple slides within a presentation, which view should she utilize? Master v
Basile [38]

Answer:

I think it’s slide shorter view

Explanation:

6 0
2 years ago
You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one th
Anvisha [2.4K]

Potential uploaded viruses, personal information being lost, blackmail, identity theft.

7 0
2 years ago
Other questions:
  • Suppose the algorithms used to implement the operations at layer k is changed. how does this impact services at layers k-1 and k
    10·1 answer
  • The navigation bar on the left side of ____ view contains commands to perform actions common to most office programs.
    15·1 answer
  • Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
    9·1 answer
  • Instructions:
    14·1 answer
  • The OSI security architecture provides a systematic framework for defining security attacks, mechanisms, and services. True or F
    12·1 answer
  • Which of the registration patterns is best suited for complex architecture? A. Client side discovery pattern B. Third party regi
    13·1 answer
  • Will mark brainliest if correct. First come, first serve.
    15·1 answer
  • What types of messages flow across an SDN controller’s northbound and southbound APIs? Who is the recipient of these messages se
    15·1 answer
  • Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu
    13·1 answer
  • Write a program that uses the Purchase class in 5.13. Set the prices to the following: Oranges: 10 for $2.99 Eggs: 12 for $1.69
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!