1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
4 years ago
9

The computer’s ability to perform long strings of calculations quickly has made possible complicated forms in __________ to beco

me realized in three-dimensions.
Computers and Technology
1 answer:
8_murik_8 [283]4 years ago
7 0

Answer: Architecture

Explanation:

Three dimension computer modelling has become popular owing to the computers ability to perform long strings of calculation quickly. This models are used in and many other allied fields.

You might be interested in
How can the Internet help our country to be a leader in technology?
BigorU [14]

Answer:

it can help in the aspect of making technologies to be fastly operated with fast internet connection there by it top among all other countries

4 0
3 years ago
Please describe in a few sentences
myrzilka [38]

Because a theorie is someones scientific quess on a matter so soon they get a understanding and change them. They are not discarded because they usually keep the same wording but not all so that it is correct then.

:)

4 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Media messages are communicated through which of the following:
LenaWriter [7]
All of the above is the answer
3 0
4 years ago
Read 2 more answers
Freeeeeeee brainliest!!!
kondaur [170]

Answer:

Oh Thanks :)

Explanation:

7 0
3 years ago
Other questions:
  • Keyshia adds shapes with text to show the steps involved in taking the temperature of a liquid in a laboratory. She
    6·1 answer
  • When should students practice netiquette in an online course? Check all that apply.
    14·2 answers
  • According to the ________ definition of organizations, an organization is seen as a means by which primary production factors ar
    14·1 answer
  • How many bits are required to write decimal number?
    9·1 answer
  • Another method that might be desired is one that updates the Goalie's jerseyNumber. This method will receive a new number of Jer
    9·1 answer
  • Edhesive 6.3 Code Practice
    15·1 answer
  • 6. What is saddle-stitch binding?
    12·2 answers
  • Can you distinguish between the following examples and determine which one is NOT creative work? a. software b. slogan c. screen
    15·1 answer
  • Why do we create user accounts to customize our preferences​
    10·1 answer
  • Data becomes _____ when it is presented in a context so that it can answer a question or support decision makin
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!