1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
3 years ago
13

CAD helps professionals to _____. create a technical drawing give directions to a new location calculate the interest rate of a

new car loan organize a collection of data
Computers and Technology
2 answers:
Mademuasel [1]3 years ago
8 0

CAD stands for Computer Aided Design.  This technology for design uses software to aid in technical drawings and models.

CAD helps professionals to create a technical drawing. CAD is mainly used by architects, engineers, drafters, artists.

Inessa [10]3 years ago
3 0

CAD stands for Computer Aided Design.  This technology for design uses software to aid in technical drawings and models.

CAD helps professionals to create a technical drawing. CAD is mainly used by architects, engineers, drafters, artists.

You might be interested in
Tiling is when a browser loads a background image and then repeats the image in both the vertical and horizontal directions unti
jeyben [28]
The correct answer is true
7 0
3 years ago
Read 2 more answers
Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new val
ankoles [38]

There is block cipher kind of mode of operation. The block cipher mode of operating requires that both the message sender and receiver  is exchanged is the (CTR) Counter.

<h3>What is the Counter (CTR)?</h3>

This is known to be a common block cipher mode of operation. It often needs that both the message sender and receiver to have a kind of access a counter, that helps to computes a new value whenever a ciphertext block is been exchanged.

The disadvantage of CTR is known to be the fact that it needs a synchronous counter necessary for both the sender and receiver.

Learn more about  block cipher mode from

brainly.com/question/9979590

7 0
2 years ago
Consider the efficiency of locating the kth element in a singly-linked list. How does that compare to locating the kth element i
eimsori [14]

Answer:

Finding kth element is more efficient in a doubly-linked list when compared to a singly-linked list

Explanation:

Assuming that  both lists have firs_t and last_ pointers.

For a singly-linked list ; when locating a kth element, you have iterate through a number of k-1 elements which means that locating an element will be done only in one ( 1 ) direction

For a Doubly-linked list : To locate the Kth element can be done from two ( directions ) i.e. if the Kth element can found either by traversing the number of elements before it or after it . This makes finding the Kth element faster because the shortest route can be taken.

<em>Finding kth element is more efficient in a doubly-linked list when compared to a singly-linked list </em>

4 0
3 years ago
Entrepreneur Employing Mobile Enterprise Apps AACSB Standards: Systems and Processes Australian-based entrepreneur Nathan Tuckwe
insens350 [35]

The factor that is helpful when adding new inventory and not among the Accounting Functions is the audit function.

<h3>Why is the audit function important?</h3>

The role of internal audit is known to be one that tends to give some measures of independent assurance that is need by a firm or an organization in terms of risk management, governance, as well as internal control processes to be able to operate effectively.

Note that an internal audit is said to be carried out objectively and set up to improve and make good an organization's business practices.

Hence, The factor that is helpful when adding new inventory and not among the Accounting Functions is the audit function.

Learn more about audit function from

brainly.com/question/24170807

#SPJ1  

4 0
1 year ago
I really need To know how To get The special ending for final fight 2 for super nintendo it’s a video game
Bogdan [553]

Answer:

Check Yt

Explanation:

More often than not there are many video tutorials about every game imaginable.

5 0
3 years ago
Other questions:
  • What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
    7·1 answer
  • Write an algorithm whether the given number is positive negative or zero​
    5·1 answer
  • The ____________ is the number of rectangles an image has in a square inch.
    11·2 answers
  • Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?
    7·1 answer
  • The calculation of the likelihood of an attack coupled with the attack frequency to determine the expected number of losses with
    12·1 answer
  • Which would be the most appropriate way to estimate -6.1(0.22)? Check all that apply.
    9·2 answers
  • Describe at least two other companies that are direct or indirect competitors to your company. Explain how you will differentiat
    15·1 answer
  • Write an algorithm to solve general formula? ​
    10·1 answer
  • What is the advantages and disadvantages of hardware devices and software devices ?
    9·1 answer
  • Database queries is an example of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!