1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
3 years ago
14

Why would a designer choose to use an isometric sketch rather than a perspective sketch to share their idea with a design team m

ember?
Computers and Technology
1 answer:
alexdok [17]3 years ago
8 0

Designers use both isometric and perspective sketches to maintain an object’s visual proportions. Isometric sketches are 3D objects drawn with lines that have no vanishing points while perspective sketches are 3D objects drawn with one or more vanishing points.

Designers choose to use an isometric sketch because it is more accurate than perspective drawings and makes the design look more professional. Isometric sketches are much easier to handle because the length of each measure is same as the plan. This is especially for designers drawing pictures by hand. It is time saving and you do not need to calculate the angle of every edge.

You might be interested in
What is the best wi-fi name you have ever seen?
elena-s [515]

Answer:

bill wi the science fi

Explanation:

8 0
3 years ago
is there a way to send files from my PC to my iPhone? My PC’s wifi receptors are broken so it cannot connect to wifi. Is there a
Alex_Xolod [135]

Answer:

I believe you need a internet connection for that or try a Hotspot that can work too.

5 0
3 years ago
Proponents of Internet freedom see its _____________ as providing protection for unpopular expression; proponents of greater Int
NeTakaya

Answer: The answer is anonymity

Explanation: i had the same question on my test.

8 0
3 years ago
What sorts of routine, seemingly unimportant information would help you learn about or break into another company’s network?
tatuchka [14]

Answer and Explanation:

  • Reboot your Computer from which you need to break into.
  • With your remote Ethernet card embedded and the unprotected passageway will mate up in a flash. You likewise need to change the Service Set Identifier (SSID) on your Ethernet card to coordinate SSID on the system's passage. You can decide to physically constrain your DHCP settings to reestablish, however on the off chance that that gives you any trouble.we need to re-boot it.
  • The Third Man ran a sniffer program that caught the majority of the LAN traffic within this organization. It was transmitted through the remote passageway straight into the Third Man's PC. Passwords. Agreements. Email.
4 0
4 years ago
Describe the function<br>ms word, Acess, Elexel, Power point<br>Publisher and Outlook​
marta [7]

Answer:

Write documents consisting mainly of text, Create databases, Create tables for organizing and calculating data, Create presentations to display in front of groups to display data and other info, Create advanced documents such as magazines, flyers, coupons, and other things, Organize your day and easily manage contacts and emails.

6 0
3 years ago
Other questions:
  • ‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
    14·2 answers
  • In order to plan George’s birthday, his father gave him a list of people who attended his birthday for the last five years. What
    8·2 answers
  • Why does people that gets abused not report?
    5·1 answer
  • Kai is a software engineer who started his own IT consulting firm. His friend, Catalina, is the owner of a store that sells offi
    13·2 answers
  • 25 POINTS + BRAINLIEST PLS HELPWhere should you put the argument for a command?
    13·1 answer
  • Retraining is required at intervals of ___ or less.
    10·1 answer
  • True/False: Audio menus can be useful when one's hands and eyes are busy, or to assist vision-impaired users. With audio menus,
    14·1 answer
  • A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
    14·1 answer
  • Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the
    8·1 answer
  • The printer prints 16 pages every minute. How many pages are printed in 6 minutes?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!