__________ software aids architects, engineers, and many others who need to create a digital model of an object.

Answers

Answer 1

CAD software aids architects, engineers, and many others who need to create a digital model of an object.

What is CAD software used for?

CAD design is  known to be a kind of a software that is often used by architects, construction managers, as well as engineers and it is one that has said to have taken over manual drafting.

Note that it is said to be a tool that helps its users to be able to make designs in 2D as well as in 3D form.

Therefore, CAD software aids architects, engineers, and many others who need to create a digital model of an object.

Learn more about CAD software from

https://brainly.com/question/14350050

#SPJ1


Related Questions

Which description of the plain text file format is most accurate? uses binary code to store data can only be opened with special software supports text formatting like bold or italics used by programmers for source code

Answers

The phrase "uses binary code to store data" is the best way to describe the plain text file format.

A binary code uses a two-symbol system to represent text, computer processor instructions, or any other data. The binary number system's "0" and "1" are frequently used as the two symbols in this system. Each character, instruction, etc. is given a set of binary digits, also referred to as bits, by the binary code.

An eight-bit binary string, for instance, has 256 possible values and can thus represent a wide range of different things. Binary codes are used in computing and telecommunications for a number of different ways to encode data, like character strings, into bit strings. These techniques could make use of fixed-width or flexible strings.

Learn more about binary code https://brainly.com/question/28222245

#SPJ4

in this clip, the filmmakers connect each shot using a technique called – . these editing choices are intended to maintain cinematic – and hide the edit.

Answers

The filmmakers connect each shot using a technique called Cutting on action.

These editing choices are intended to maintain cinematic hides the shift from one shot to the next and hide the edit.

What is meant by cutting on action?

Cutting on Action is known to be a term that is said to be used by editor and it is one that implies the  cuts in the middle of a given action to another shot that tends to matches the first shot's  said action.

Note that it is seen as a common editing method that tends to hides the shift from one shot angle  to another shot angle and this is often done  by stopping the first shot in the middle of another continuing action and then beginning the next shot at some distance along in the similar action.

Therefore,  The filmmakers connect each shot using a technique called Cutting on action. These editing choices are intended to maintain cinematic hides the shift from one shot to the next and hide the edit.

Learn more about filmmakers from

https://brainly.com/question/28110104
#SPJ1

A(n) ____________________ is a group of computers controlled by a computer running windows server.

Answers

A window domain is a group of computers controlled by a computer running windows server.

What is a domain for Windows?

A domain is known to be a set of linked  Windows computers that tends to share user account information as well as a security policy.

Note that the domain controller helps to handle the user account information that is set for all domain members. The domain controller tend to boast network administration.

Therefore, A window domain is a group of computers controlled by a computer running windows server.

Learn more about window domain from

https://brainly.com/question/1383829

#SPJ1

What will happen if you attempt to create a scanner for a nonexistent file? what will happen if you attempt to create a printwriter for an existing file?

Answers

If you attempt to create a Scanner for a nonexistent file, an exception will occur. If you attempt to create a PrintWriter for an existing file, the contents of the existing file will be gone.

The question above is part of Java programming language. Java is a programming language that may be used on a variety of computers, including gaming consoles. The current language was initially created by James Gosling when he first joined Sun Microsystems, which at the time was a branch of Oracle and was founded in 1995.

This language adopts a lot of syntax found in C and C++ but with a simpler object model syntax and minimal support for lower-level routines.

Learn more about Java Programming https://brainly.com/question/2266606

#SPJ4

Which document is issued by the state real estate commissioner to help protect purchasers of subdivision plots?

Answers

Public report is a document that the state real estate commissioner issues to assist in protecting buyers of subdivision plots.

The state real estate commissioner issues a public report following application and approval to satisfy the disclosure requirements of the Subdivided Land Laws to stop fraud and misrepresentation when selling subdivided land to buyers.

The Public Report will typically include information about the applicant's name, the subdivision's location and size, utility, school, tax, management, maintenance, and operational costs, as well as any unusual easements, rights of way, setback requirements for vacant land offerings, and restrictions or conditions.

Learn more about public report https://brainly.com/question/28455254

#SPJ4

define a function calcpyramidvolume with double data type parameters baselength, basewidth, and pyramidheight, that returns as a double the volume of a pyramid with a rectangular base. relevant geometry equations: volume

Answers

The defined function is given below:

The C++ Code

#include <iostream>

using namespace std;

/*

Define a function PyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. Relevant geometry equations:

 Volume = base area x height x 1/3

 Base area = base length x base width.

 (Watch out for integer division).

*/

/* Your solution goes here  */

double PyramidVolume(double baseLength, double baseWidth, double pyramidHeight){

double baseArea = baseLength * baseWidth;

double vol = ((baseArea * pyramidHeight) * 1/3);

return vol;

}

int main() {

 cout << "Volume for 1.0, 1.0, 1.0 is: " << PyramidVolume(1.0, 1.0, 1.0) << endl;

  return 0;

}

Read more about C++ programming here:

https://brainly.com/question/15411348

#SPJ1

what happens if i delete system 32 on my pc

Answers

Answer:

Your computer will start collapsing slowly. Many fundamental features such as using Start Menu to open programs and opening Windows programs won’t work.

Explanation:

Answer:

you crash id

Explanation:

Programs remember numbers and other data in the computer's memory and access that data through program elements called?

Answers

Programs remember numbers and other data in the computer's memory and access that data through program elements variables.

What are variables?

A variable is a value that is subject to change based on external factors or data given to the application. A program typically consists of data that it uses while running and instructions that tell the machine what to execute.

Variables are storage units of computer memory. They are of different symbols.

Thus, variables are used by programs to store and access data, including numbers and other types of information.

To learn more about variables, refer to the link:

https://brainly.com/question/20983463

#SPJ1

The performance variables productivity, absenteeism, and turnover are generally considered a part of the ________ behaviors in the exit-voice-loyalty-neglect framework.

Answers

The performance variables productivity, absenteeism, and turnover are generally considered a part of the exit and neglect behaviors in the exit-voice-loyalty-neglect framework.

What is absenteeism?

Absenteeism may be defined as a type of habitual pattern which involves the complete absence of an individual from a duty or obligation without any probable or good reason.

Exit and neglect behavior is a type of behavior that significantly illustrates the performance of numerous attributes on the basis of the exit-voice-loyalty-neglect framework. It includes exiting the organization, migrating to a distinct department, and provoking the dissatisfied state of affairs.

Therefore, the exit and neglect behaviors in the exit-voice-loyalty-neglect framework includes the performance variables productivity, absenteeism, and turnover.

To learn more about Absenteeism, refer to the link:

https://brainly.com/question/27202509

#SPJ1

You can mix ntfs permissions and share permissions on the same system. True or false

Answers

Answer:

true

Explanation:

Write a program that preprocesses the collection. this preprocessing stage should specifically include a function that tokenizes the text. in doing so, tokenize on whitespace and remove punctuation.

Answers

The code that performs the above results given below:


import java.util.*;

Class Preprocessing

{

   public static void main(String args[])

   {

       StringTokenizer inputText=new StringTokenizer("You! can! enter! input! here!"," ");

       while(inputText.hasMoreTokens())

       {

           System.out.println("Next Token:"+inputText.nextToken("!"));

       }

   }

}

What is a code?

In computer programming, computer code is a set of instructions or a set of rules expressed in a specific programming language (i.e., the source code).

It is also the name given to source code after it has been compiled and is ready to execute on a computer (i.e., the object code).

Coding is the process of directing a computer's behavior using a programming language.

Every line of code in Python instructs the computer to do something, and a document full of lines of code is referred to as a script. Each script is intended to do a certain task.

Learn more about codes:
https://brainly.com/question/25658352
#SPJ1

patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. which of the following apps should she use for cloud storage?

Answers

Based on the above, the apps that  Patricia need to use for cloud storage is called a Drop box.

What is a Dropbox?

The Dropbox is known to be a Software that is said to be a file making work known to be made by the American company.

It has its headquartered to be in U.S. and it is known to be a software that offers a lot of services such as:

A cloud storage, File synchronizationPersonal cloud, A client software.

Note that a cloud storage is known to be a kind of cloud computing model that helps to save data on the Internet via the use of a cloud computing provider who helps to handle and runs the data storage as a form of service.

Therefore, Based on the above, the apps that  Patricia need to she use for cloud storage is called a Drop box.

Learn more about Drop box from

https://brainly.com/question/27327971
#SPJ1

you are the ceo of an isp firm and you want to replace the existing routers of your clients with the new updated versions which are out in the market. what kind of a business document will you submit to request vendors to submit a good proposal for your product query?

Answers

The kind of a business document that  you will submit to request vendors to submit a good proposal for your product query is option b:  An RFP.

What is query in SQL?

A query is known to be a term that is said to be a form of request that is made  for data or information which is said to be obtained from a database table or the composition of tables.

The products query is known to be a tool that gives room for a person to be able to search for catalog items.  A Request for Proposal (RFP) is said to be a form of a business document and an Organization do  publish RFPs to ask for proposals from potential vendors for a specific project solution.

Therefore, The kind of a business document that  you will submit to request vendors to submit a good proposal for your product query is option b:  An RFP.

Learn more about product query from

https://brainly.com/question/15705471

#SPJ1

You are the CEO of an ISP firm and you want to replace the existing routers of your clients with the new updated versions which are out in the market. What kind of a business document will you submit to request vendors to submit a good proposal for your product query?

An MSA

An RFP

An MOU

An SOW

Data ________ helps to ensure data integrity by maintaining information in only one place.

Answers

Data  centralization helps to ensure data integrity by maintaining information in only one place.

When data is dispersed and not centralized, it is hard for team members to respond to simple questions. Simultaneously, incompatible and fragmented data will hinder innovation and reduce your organization's competitiveness. It also threatens data integrity.

Point-to-point connections assist businesses in optimizing workflows and automating the use of various online applications concurrently. However, while this method of handling data (from websites, social media platforms, marketing campaigns, and other sources) is efficient, it does not provide the most significance from your data.

To learn more about data centralization: brainly.com/question/17373547

#SPJ4

When would you want to take a photo with a large aperture? Select all that apply.

Taking a photo of a field of tulips
Taking a photo of a single bumblebee on a flower
Taking a photo where you want the background to be blurry
Taking a landscape photo were you want everything in focus

Answers

Answer:all  exept taking a photo wher you want the background to be blurry.

Explanation:

A large aperture means that the lens is letting in more light. And when more light is let in, that produces a shallow depth of field. You can use large apertures anytime you want to add dimension to your photos.

hope this helps=]

freddy wants to take up a few platform-specific courses for his new job. which courses can he take? to be able to perform for programming languages specific to a certain platform, freddy can take courses such as and .

Answers

In order to be able to perform for programming languages specific to a certain platform, Freddy can take courses such as HTML5 and CSS3.

What is CSS 3 ?

CSS 3 is an abbreviation for Cascading Style Sheets revision 3 and it can be defined as a style sheet programming language that is designed and developed for describing and enhancing the presentation of a webpage (document) that is written in a markup language such as:

XMLHTML

What is HTML 5?

HTML 5 is an abbreviation for hypertext markup language revision 5 and it can be defined as a standard programming language which is used for designing, structuring, developing and presenting websites or webpages.

In order to be able to perform several tasks by using programming languages specific to a certain platform, Freddy can take courses such as HTML5 and CSS3.

Read more on HTML 5 here: https://brainly.com/question/28145966

#SPJ1

Complete Question:

Select the correct answer from each drop-down menu. Freddy wants to take up a few platform-specific courses for his new job. Which courses can he take?

To be able to perform for programming languages specific to a certain platform, Freddy can take courses such as and .

first dropdown

a. HTML5

b. Visual C#

c. JavaScript

second dropdown

a. Jquery

b. CSS3

c. .NET

Most voice over ip (voip) traffic over the public internet is not encrypted so anyone can listen in on conversations:
a. true
b. false

Answers

Answer:

True

Explanation:

How are mobile cameras and digital cameras related to each other?
O They are essentially the same thing the names are used interchangeably.
O They are not related except that they are both cameras.
O Digital cameras are a type of mobile camera.
O Mobile cameras are a type of digital camera.

Answers

Answer:

Mobile cameras are a type of digital camera.

Explanation:

please make my answer as brainelist

____ work to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the company network.

Answers

Intrusion prevention systems work to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the company network.

An intrusion prevention system abbreviated as IPS is a tool that plays a major role in the network security of an organization. This system continuously scans for any activity or viruses that may harm the company network and provides measures to prevent such types of activity.

It is more useful compared to the intrusion detection system as it performs the function of both detecting and blocking the threat to the network while the intrusion detection system can only disclose the threat.

Mostly, the intrusion prevention system works by detecting the threat and reports to the administrator to prevent any harmful activity or automatically blocks the source of threatful activity, or transforms the firewall to stop such further attacks hereafter.

To learn more about intrusion prevention systems, click here:

https://brainly.com/question/18883163

#SPJ4

You have just captured data using the socket.recv method into a variable named client_data. what can you use to convert client_data to a string?

Answers

We can see the image below for the code use to transform client_data to a string. The method above is majorly focused on the network buffers. The above code is part of socket programming python.

Two nodes on a network can connect and communicate with one another using socket programming. While the first socket listens on a specific port at an IP address, the other socket reaches out to the first socket to establish a connection. The server generates the listener socket as the client makes contact with it. They essentially lay the groundwork for online browsing. Simply explained, there is a server and a client. The first stages in socket programming are importing the socket library and building a simple socket.

Learn more about socket oriented programming https://brainly.com/question/12972718

#SPJ4

Do you foresee that the traditional computer will be replaced by mobile and smart technologies as a primary device form factor in the near future?

Answers

Yes, i do see that the traditional computer will be replaced by mobile and smart technologies as a primary device form factor in the near future.

How will computers evolve in the future?

The future of computing is known to be one that is said to be shaped by the use of transistors that was said to have been made from materials that are not silicon based.

Note that  It is one that is known to being increased to the highest extent by methods  that have nothing to do with the said transistor speed, such as the use of deep-learning software and others.

Therefore, My response is Yes, i do see that the traditional computer will be replaced by mobile and smart technologies as a primary device form factor in the near future.

Learn more about technologies from

https://brainly.com/question/13044551
#SPJ1

A copyright is registered, while a trademark is____

Answers

Answer: Approved

Explanation: Copyright is generated automatically upon the creation of original work, whereas a trademark is established through common use of a mark in the course of business.

you work as the it administrator for a small corporate network. to accommodate specific network communication needs for an upcoming project, you need to upgrade the network connection's speed for the windows workstation located in the executive office.

Answers

We need to upgrade the network connection's speed for the windows workstation located in the executive office for that we will Install the network interface card and configure the Ethernet cable connection between the computer and the LAN network.

The connecting and communication of computer equipment is the function of the computer networking system. An adapter known as a network interface card allows the computer to connect to a network (NIC). The NIC's operations are managed by the operating system.

The speed and port state of the NIC are configured, and it is linked to the LAN using a straight through cable.

To check for LAN network connectivity on the PC, use the ipconfig/all and netstat commands. Another option is to use the ping command.

Launch Start. To open the console, perform a search for "Command Prompt," then select the top result. To check the connection speeds of all the Ethernet and Wi-Fi adapters, use the command after typing it: where netEnabled=true in wmic nic get name and speed.

Learn more about workstation:

https://brainly.com/question/17121112

#SPJ4

what are some websites you commonly use​

Answers

Answer:

boredpanda.com

Explanation:

it has fun collections of tweets, stories, photos etc.

Which component of the operating system selects the next process to be executed when the cpu becomes idle?

Answers

The next process to be executed when the CPU becomes idle is CPU scheduling. The foundation of multi-programmed operating systems is CPU scheduling.

The operating system can increase computer productivity by moving the CPU between processes. Multiprogramming is a rather straightforward concept. The operating system must choose one of the processes in the ready queue to be performed whenever the CPU becomes idle. The short-term scheduler handles the selection procedure.

One of the processes in memory that are ready to run is chosen by the scheduler, and that process is given the CPU. The issue of choosing which task in the ready queue should receive the CPU is dealt with by CPU scheduling.

Learn more about CPU scheduling https://brainly.com/question/13107278

#SPJ4

During which phase of the development of the internet was the domain name system (dns) introduced?

Answers

Institutional phase of the development of the internet was the domain name system (DNS) introduced.  Thus, option B is correct.

What is a domain name system?

Web addresses are converted to email accounts via the Domain Name System (DNS), what computers utilize to view online articles.

In the institutional phase of the development, the major changes are happening in this the DNS or the domain name system is being introduced which helps in connecting the internet address to the IP of the customer or the person who is being accounted for. Therefore, option B is the correct option.

Learn more about the domain name system, here:

https://brainly.com/question/28145453

#SPJ1

The question is incomplete, the complete question will be:

A) Commercialization phase

B) Institutional phase

C) Innovation phase

D) Consolidation phase

Where ethernet connects lans with each other, internet protocol (ip) connects data between machines that are all on the same network. True or false

Answers

Where ethernet connects lans with each other, internet protocol (ip) connects data between machines that are all on the same network is a true statement.

How are LANs connected to each other?

The use of the  peer-to-peer LAN directly is one that tends to link two devices such as workstations or personal computers  as one or  together through the use of an Ethernet cable.

Note that the client-server LAN is made up  of multiple endpoints as well as servers that are linked to a LAN switch.

Therefore, Where ethernet connects lans with each other, internet protocol (ip) connects data between machines that are all on the same network is a true statement.

Learn more about ethernet from

https://brainly.com/question/1637942

#SPJ1

joshua is running a sprint. of the four key items to help make a sprint successful, which key item and tool are used to show progress?

Answers

Of the four key items to help make a Sprint successful, the key item and tool which are used to show progress is: daily Scrum; standup.

What is physical fitness?

Physical fitness can be defined as a measure of both the physical and mental soundness (wellness) or ability of an individual to engage in physical exercises (sprints), sports, work and other day-to-day activities.

Generally, there are four (4) key items that help make a Sprint successful and these include the following:

The sprint planning meeting.The daily scrum.The sprint review meeting.The sprint retrospective.

In conclusion, the daily Scrum and standup are the key item and tool which are used to show progress in a Sprint.

Read more on daily Scrum here: https://brainly.com/question/17199092

#SPJ1

Complete Question:

Joshua is running a Sprint. Of the four key items to help make a Sprint successful, which key item and tool are used to show progress?

Select an answer:

measurement; burndown chart

Daily Scrum; standup

while working in a call center, you receive a call from latisha, who says she can no longer access the online reporting application for her weekly reports through her web browser. you ask your manager, and she tells you that the server team changed the application's url during an upgrade over the weekend. she asks you to make sure all the other technicians are aware of this change. what is the best way to share this information?

Answers

The best way to share this information is to: C. update the knowledge base article that contains the software application's URL in the call tracking application.

What is a website?

A website can be defined as a collective name which connote a series of webpages that are interconnected with the same domain name or Uniform Resource Locator (URL), so as to provide certain information to end users.

What is a Uniform Resource Locator?

In Computer technology, a Uniform Resource Locator (URL) can be defined as an Internet address of a website that identifies the method by which an Internet resource (website) should be accessed by end users.

In this scenario, the best way to share this information is to update the knowledge base article that contains the software application's Uniform Resource Locator (URL) within the call tracking application.

Read more on a Uniform Resource Locator here: https://brainly.com/question/14716338

#SPJ1

Complete Question:

While working in a call center, you receive a call from Latisha, who says she can no longer access the online reporting application for her weekly reports through her web browser. you ask your manager, and she tells you that the server team changed the application's URL during an upgrade over the weekend. she asks you to make sure all the other technicians are aware of this change. what is the best way to share this information?

a. Print a flyer with the new URL and post it on the wall in the call center.

b. Send out a mass email with the new URL to all the technicians.

c. Update the knowledge base article that contains the application's URL in the call tracking application.

d. Yell the new URL to all technicians sitting in the call center.

question 3. you'll sometimes want to find the last element of an array. suppose an array has 142 elements. what is the index of its last element? (4 points)

Answers

You'll sometimes want to find the last element of an array. suppose an array has 142 elements. The index of the last element is array[141]. Because array index start at zero.

In different programming languages, the syntax is different to get the last element of an array.

For example, in C++, to get the last element of the array, we use the following program to get the last element of the array:

#include <iostream>

#include <array>

using namespace std;

int main()// main function

{

  array<int,142> myArray {1, 2, 3, 4,..., 142};/*suppose array has 142 elements*/

   int lastElementofArray = myArray.back();/*get the last element of the array*/

  cout<<"last element is: "<<lastElementofArray<<endl;/* print the last element of the array*/

  return 0;

}//end of main function.

While in python to get the last element of array, the following program performs this function.

myArray = [1,2,3,4,5,.....,142] /*assume we have 142 element in it*/

last_element = myArray[-1]/*it will get the last element of the array*/

print(last_element)//print the last element in the array.

You can learn more about arrays in python at

https://brainly.com/question/21723680

#SPJ4  

Other Questions
___________ is an institution for the incarceration of people convicted of crimes, usually felonies. PART B ONLYGiven: Evaluate the integralx^12ln(x) dxSolved: 1/13ln(x)x^13 - 1/169x^13 + C(b) The application of integration by parts corresponds to applying the product rule to what product: [ ??? ] a 56-year-old woman presents with sudden onset of palpitations, trembling, sweating, anxiety, headache, and confusion that started 1 hour ago after a 5-mile early morning run. she has had similar episodes in the past, but never any symptoms this severe. sometimes she wakes up in the morning with headaches and trembling, but they usually go away after she has gotten ready and has breakfast. on physical exam, she is found to have heart rate 114, blood pressure 125/86, respiration rate 18, weight 160 lb, and temperature 98. At the position of the stop-light 4 s after the light had turned green. what is the slowest constant speed which the green car can maintain and still catch up to the blue car? answer in units o You buy a carton of milk and two sandwiches for $10.One sandwich costs twice as much as a carton of milk.Your friend buys two cartons of milk and three sandwiches. How much does your friend spend? What happens to the equilibrium price and quantity when demand increases and at the same time supply decreases, but the demand shift is smaller than the supply shift?. the consensus model fails to take into account the goals and the functions of the correctional agencies in the criminal justice system. John had a brain tumor removed. now he has no vision in his left eye. the tumor was most likely located in john's _____ lobe. Which of the following best describes the source of materials used to make purines and pyrimidines? A map of Qubec has a scale of 1:1 500 000. On map, the distance between Trois-Rivires and Qubec City is 2 in. What is the distance between these cities to the nearest mile? Question 8 of 25Click to read the passage from "The Perils of Indifference," by Elie Wiesel.Then answer the question.Why does Wiesel so carefully describe the term "indifference in thispassage? The following represent statistics of weekly salaries at Acme Corporation.Mean = $585 Median = $581 Mode = $575First Quartile = $552Third Quartile = $605a) What is the most common salary? $575Standard deviation = $28.86th Percentile = $612b) What salary did half the employee's salaries surpass? $581c) About what percent of employee's salaries is below $612?d) What percent of the employee's salaries are above $552?e) What salary is 2 standard deviations below the mean?f) About what percent of employee's salaries is above $592?g) What salary is 1.5 standard deviations above the mean?(Round answer two decimal places, if necessary.)P64 = $592 sketch a velocity -time graph for a body thrown vertically upward to a maximum height Solve negative four and one third two and one fifth. negative nine and eight fifteenths negative eight and one fifteenth negative one and 32 over 33 one and 32 over 33 Marie is very cautious in watering the plants in her garden. She waters the aglaonema plants every 4 days and the calathea plants every 7 days. If Marie starts watering her plants at the same time on the last day of December, will she water them again at the same time on the next month? It is known that 4WHOEVER ANSWERS CORRECTLY WILL BE MARKED BRAINLIEST Make sense and persevere point y is in the interior of How many states did the populists win during the election of 1892? Explian five importance of saving in a bank. Can anybody help me with this