answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
2 years ago
9

Computer design software requires __________________ to be used properly and successfully by architects.

Computers and Technology
2 answers:
vaieri [72.5K]2 years ago
6 0
The option B is correct.Computer design software requires an eye for design and a knowledge of computer programming<span> to be used properly and successfully by architects. If an architect does not know how to do the computer programming, he wont be able to apply his ideas on the computer software. Also, since he is an arhcitect, he must be having depth knowledge of the designs. Therefore, both design knowledge and computer knowledge is required for successful operation.</span>
murzikaleks [220]2 years ago
5 0
<span>The answer is letter B. An arrangement of directions and related documentation that instructs a PC or how to play out an undertaking or it can mean all the product on a PC, including the applications and the working framework. I hope the answer helps. </span>
You might be interested in
What is the distance rn between the point of application of n⃗ and the axis of rotation? what is the distance rw between the poi
Mandarinka [93]

Complete Question.

A. Suppose that you are holding a pencil balanced on its point. If you release the pencil and it begins to fall, what will be the angular acceleration when it has an angle of 10.0 degrees from the vertical?

B. What is the distance rn between the point of application of n⃗ and the axis of rotation?

C. What is the distance rw between the point of application of w⃗ and the axis? enter your answers in meters separated by a comma?

Answer:

A. â = - 17rad/s²

B. rn = 0, meters

C. rw = 0.074, meters

Explanation:

Where;

l = length of the pencil

θ = angle between the vertical line and the pencil

â = angular acceleration.

The torque due to weight about the pivotal point is negative since it's clockwise;

t = - mg(l/2)sinØ ..... equation 1

torque with respect to angular acceleration;

t = Iâ ..... equation 2

The moment of Inertia of the pencil about one end;

I = (ml²)/3

Substituting I into equation 2;

t = [(ml²)/3]×â

Equating the equation, we have;

[(ml²)/3]×â = - mg(l/2)sinØ

â = (-3gsinØ)/2l

â = (-3*9.8*sin10°)/(2*0.15)

Angular acceleration, â = -17rad/s²

B. The normal force is acting at the normal force only, so the distance r n between the point of application of n ⃗ and the axis of rotation is zero because the axis of pencil is passing the same point of application w.

C. rn = (lcosØ)/2

rn = (0.15 * cos10°)/2

rn = (0.15 * 0.9848)/2

rn = (0.1477)/2

rn = 0.074m.

Since the gravity acts at exactly half of the length of pencil, distance r w between the point of application of w⃗ and the axis equals 0.074m.

8 0
2 years ago
An Internet user has a need to send private data to another user. Which of the following provides the most security when transmi
vazorg [7]

Answer:

C. Sending the data using public-key encryption

Explanation:

Encryption is the only choice that provides security.

4 0
2 years ago
Read 2 more answers
Together with some anthropologists, you’re studying a sparsely populated region of a rainforest, where 50 farmers live along a 5
Varvara68 [4.7K]

Answer:

Explanation:

Farmers are always both directly and indirectly connected to each other

Their network is mostly strong

Networks become weak only on the edges (ends) of the river but doesn't completely dimnish

With the available network length, the center of river bank forms the strongest network of all and becomes a key player in defining the balance property of overall network

The network is very well structurally balanced and we can see that through the below image

20 miles 10 20 30 40 50

See attachment file for diagram

Considering the total length of river as 50miles and and the center of the whole length will be at 25th mile. From that point, if we consider a farmer will be be having friends for a length of 20miles both along upstream and downstream.

By this he'll be in friend with people who are around 80% of the total population. As me move from this point the integrity increases and this results in a highly balanced structural network.

6 0
2 years ago
When you connect to an unsecured wireless network, what might dishonest or unscrupulous computer users try to do?
loris [4]

Answer:

Hackers can snoop on data sent over your network.

Hackers can use your network to access your computer's files and system information.

Explanation: Unsecured Wireless connections are wireless connections which are have no passwords they are open to the general public,such networks can be very risky to use as it gives easy access to dishonest persons who can manipulate that opportunity to SNOOP ON DATA SENT OVER YOUR NETWORKS. They can use this hacking to fraudulently steal from your bank account and obtain your private information.

8 0
2 years ago
Which command suppresses the visibility of a particular Row or column in a worksheet?
leonid [27]

Answer:

Ctrl+Space is the keyboard shortcut to select an entire column.

Explanation:

When you press the Shift+Space shortcut the first time it will select the entire row within the Table.  Press Shift+Space a second time and it will select the entire row in the worksheet.

The same works for columns.  Ctrl+Space will select the column of data in the Table.  Pressing the keyboard shortcut a second time will include the column header of the Table in the selection.  Pressing Ctrl+Space a third time will select the entire column in the worksheet.

You can select multiple rows or columns by holding Shift and pressing the Arrow Keys multiple times.

4 0
2 years ago
Other questions:
  • What are common names for some primary discrete components used on circuit boards?
    13·1 answer
  • Zoey has brought her computer in for servicing. When she dropped off her computer, she mentioned that her computer will sometime
    15·2 answers
  • Which of the following is NOT a method in which a macro can be run?
    10·1 answer
  • A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addr
    6·1 answer
  • rite a method so that the main() code below can be replaced by simpler code that calls method calcMilesTraveled(). Original main
    7·1 answer
  • Assume that the population of Mexico is 128 million and that the population increases 1.01 percent annually. Assume that the pop
    7·1 answer
  • An extranet is like an intranet except that it allows company employees access to corporate Web sites from the ______
    13·1 answer
  • What ""old fashioned"" features of checking accounts is p2p replacing
    9·1 answer
  • A script sets up user accounts and installs software for a machine. Which stage of the hardware lifecycle does this scenario bel
    5·1 answer
  • Why is it important for element IDs to have meaningful names?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!