answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
2 years ago
11

Susie works for an architectural firm and the partners have always drawn the plans for projects by hand. Though Susie learned ho

w to draw by hand in college, she is also highly skilled on computer programs that allow her to create designs in 3D. She plans to demonstrate the effectiveness of such programs to the firm's partners. The computer program she will recommend to the partners is
CAD.


CAM.


CIM.


SCM.
Computers and Technology
1 answer:
lidiya [134]2 years ago
3 0

Answer:

The correct answer to the following question will be CAD.

Explanation:

CAD - It stands for Computer-aided Design. CAD is a software used for creating some 3D designs, creative drawing or some technical illustrations and is basically used by the engineers and artists.

Many projects based on electronic can be designed with the help of this software, electronic parts like circuit boards, etc.

Various types of CAD are as follows :

  • 2D (Two dimensional)
  • 3D (Three dimensional)
  • 3D wire frame
  • Solid modeling

This enables efficiency in design's quality, also increase in engineer and artist's productivity. So, many of the computer programs should recommend the Computer-aided design software to there project partners for some 3D and effective look on their project.

You might be interested in
6.4 Predicting Prices of Used Cars. The file ToyotaCorolla.csv contains data on used cars (Toyota Corolla) on sale during late s
Brums [2.3K]

Answer:

Compare the predictions in terms of the predictors that were used, the magnitude of the difference between the two predictions, and the advantages and disadvantages of the two methods.

Our predictions for the two models were very simmilar. A difference of $32.78 (less than 1% of the total price of the car) is statistically insignificant in this case. Our binned model returned a whole number while the full model returned a more “accurate” price, but ultimately it is a wash. Both models had comparable accuracy, but the full regression seemed to be better trained. If we wanted to use the binned model I would suggest creating smaller bin ranges to prevent underfitting the model. However, when considering the the overall accuracy range and the car sale market both models would be

Explanation:

8 0
2 years ago
What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo
pickupchik [31]

Answer:

"message encoding, message size and message delivery" are the correct answer for the above question.

Explanation:

The above defined are the three requirements which are defined as the protocol used in communication. These three requirements are a very essential part of communication because-

  1. Message Encoding is the first requirement, which is used to encode the message so that the hacker can not hack the communication data from the network.
  2. The second requirement is Message size which fixed the size and the number of packets used to send for the communication.
  3. The third requirements are Message delivery, for which the protocol needs to define the mechanism to overcome the loss of the data.

6 0
2 years ago
1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
bekas [8.4K]

Answer:

1. From the command prompt, type:

pgp --encrypt "my-message.txt" --recipient "Sean" --output "secret-message.txt.gpg"

2. Press Enter.

Explanation:

From the command line, the above command is entered and Enter is pressed.

The command start with pgp, then it has different options:

--encrypt: this specifies the input file to be encrypted

--recipient: this specifies the specific user to which the file is been encrypted

--output: this specifies the name to which the output (encrypted file) is saved.

8 0
2 years ago
Which of the following is true about protected access?
goldenfox [79]

Answer:(A) Protected members may be accessed by methods in the same package or in a subclass, even when the subclass is in a different package.

Explanation:

Methods,constructors and variables, that are protected in superclass they can be only accessed by any class within the package of the protected members class and methods in the same package or they can be of a subclass or the subclasses that may be present in other package .

5 0
2 years ago
What is the area of a parallelogram whose vertices are A(−1, 12) , B(13, 12) , C(2, −5) , and D(−12, −5) ? Enter your answer in
11Alexandr11 [23.1K]
<span>Looking at the first two vertices, A and B, we see that the x values have a difference of (-1 - 13) units, or 14 units. This gives us the base of the parallelogram. Next, we look at the difference between the y values between B and C to find the height. In this case, they are (12 - [-5] ) units, or 17 units. The area of a parallelogram is simply base multiplied by height, which is (14 * 17), or 238 square units.</span>
3 0
2 years ago
Read 2 more answers
Other questions:
  • Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
    10·1 answer
  • Describe a situation involving making a copy of a computer program or an entertainment file of some sort for which you think it
    7·1 answer
  • The effectiveness of a(n) _____ process is essential to ensure the success of a data warehouse. Select one: a. visual basic b. e
    15·2 answers
  • Write a generator function named count_seq that doesn't take any parameters and generates a sequence that starts like this: 2, 1
    5·1 answer
  • Of these two types of programs:a. I/O -bound b. CPU -bound which is more likely to have voluntary context switches, and which is
    6·1 answer
  • In Java please.
    12·1 answer
  • If a class has member variables that are pointers, you must ensure that you implement ____.
    6·1 answer
  • When you add a zero to the right of a decimal number, it multiplies its value by 10 (For example, "15" becomes "150"). What simi
    10·1 answer
  • Describe how a cell’s content and format attributes are related.
    13·2 answers
  • Which of the following statement is False? 1 point Context free language is the subset of context sensitive language Regular lan
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!