1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A [137]
3 years ago
13

Engineers involved in product design and manufacturing use computer-aided design/computer-aided manufacturing (CAD/CAM) systems,

which is an example of specialized information systems called knowledge work systems (KWSs) that create information in their areas of expertise.?
Computers and Technology
1 answer:
stepan [7]3 years ago
6 0

Engineers who are involved in product design and manufacture of computer-aided should have enough knowledge in circuit and auto cad electronic design.

<u>Explanation:</u>

He or she should have mother board, voltage in or out extra. Person who develops should enough knowledge on circuit design which capacitor, resistance and voltage and processor capacity.

Each design they have first simulates and tested and result should be recorded. On simulation test success design is made.

There is third party software also available for design the circuit and gives the tested results as report.

You might be interested in
Pls help is very urgent and I will mark u as brainliest plsssss​
elena-s [515]

Answer:

this is the method of processing wood

5 0
3 years ago
Read 2 more answers
I need to know everything about lg fortune network unlocking or sim network unlock pin. Where, How, Which is best solution to do
vodka [1.7K]

Answer:

Lg fortune network unlocking is a method through which lg fortune can be used with any network or provider

Explanation:

When Any Network (e.g At&t, Cricket etc.) launched any smart phone (e.g lg fortune) they barricade their devices with a unique code, This blockade can be removed through sim network unlock pin. The only way to get it, is the phone`s imei which is also unique of each and every phone/tablet.

When you order it by sending the imei to a legitimate source like 24x7unlockcodes.com, They process it & derived a 100% working Lg Fortune unlock code. It safely unlock your Cricket Devices in skillful manners without damaging it. You can also get it from any cell phone shop.

7 0
3 years ago
Write 8 tips for cyber safety
alina1380 [7]

Answer:

8 tips for cyber safety

1. Keep Personal Information Professional and Limited

2. Keep Your Privacy Settings On

3. Practice Safe Browsing

4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

5. Be Careful What You Download

6. Choose Strong Passwords

7. Make Online Purchases From Secure Sites

8. Be Careful What You Post

8 STEPS TO STOP YOUR CHILD’S CYBERBULLY

Resist The Urge To Respond Or Retaliate

Document The Bullying

Get Help

Block The Bully

Keep Passwords Secret

Be A Teammate

Approach The Parents

Support Your Child With A Stress-Free, Supportive Home

Explanation:

5 0
3 years ago
The IntList class contains code for an integer list class. Study it; notice that the only things you can do are: create a list o
torisob [31]

Explanation:

public class Int_List

{

protected int[] list;

protected int numEle = 0;

 

public Int_List( int size )

{

list = new int[size];

public void add( int value )

{

if ( numEle == list.length )

{

System.out.println( "List is full" );

}

else

{

list[numEle] = value;

numEle++;

}

}

public String toString()

{

String returnStr = "";

for ( int x = 0; x < numEle; x++ )

{

returnStr += x + ": " + list[x] + "\n";

}

return returnStr;

}

}

public class Run_List_Test

{

public static void main( String[] args )

{

 

Int_List myList = new Int_List( 7 );

myList.add( 102 );

myList.add( 51 );

myList.add( 202 );

myList.add( 27 );

System.out.println( myList );

}

}

Note: Use appropriate keyword when you override "tostring" method

8 0
3 years ago
True or false? you should avoid using your power point slides as handouts, according to the text.
vazorg [7]
True, you should avoid using power point notes always
4 0
2 years ago
Other questions:
  • Is a protocol that allows users to log on to and access a remote computer?
    8·1 answer
  • If a class has member variables that are pointers, you must ensure that you implement ____.
    6·1 answer
  • State why hexadecimal is used to display the error code
    11·1 answer
  • 1) Using the density equation d=m/V: What is the density of a piece of metal with a mass o
    10·1 answer
  • Emma lives in Pennsylvania, what climate does she live in?
    7·1 answer
  • Please help with this
    8·1 answer
  • Use the function random.randint to write a program that rolls a 6-sided die 100 times, and prints out all of the rolls.
    8·1 answer
  • What is the code for this please?​
    13·1 answer
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
  • 9- Write a program in MARIE to add three numbers.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!