1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
12

How is a geometric constraint different from a numeric constraint?

Computers and Technology
1 answer:
krek1111 [17]3 years ago
6 0

Answer:

 The geometric constraints is the type of constraints which basically related to the different parts of the geometric figure. The geometric constraints is the non-numerical relation between the geometric figure parts. It is basically determine by the dimension of the object in the computer design.

In the numeric constraints, it is the set number that is not related to the other part of the design. It basically control the dimension of the geometrical figures and measure the size and the distance.

You might be interested in
Bad Directions You are driving to your friend’s house and are using your smartphone for directions. While approaching your desti
Helen [10]

This could have happened when:

  • Lack of Internet service or failure
  • Wrong application.
<h3>What do you mean by Internet?</h3>

The Internet is seen as a form of a network that helps people to  connects their computers all over the nation.

In this age,  Through the help of the Internet, people are able to  share information and navigate through places.

Note that the problem of bad direction could have happened when:

  • Lack of Internet service or failure
  • Wrong application.

Learn more about Internet from

brainly.com/question/2780939

#SPJ1

6 0
2 years ago
GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trade
jeka57 [31]

Answer:

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which cloud computing option would be most suitable for GuardIN?

Explanation:

3 0
3 years ago
Write the definition of a function named rcopy that reads all the strings remaining to be read in standard input and displays th
pickupchik [31]

Answer:

//Include this header file if program is executing on //visual studio.

#include "stdafx.h";

//Include the required header file.

#include <iostream>

#include <string>

//Use the standard namespace.

using namespace std;

//Define the function rcopy.

void rcopy()

{

    //Declare a string variable to store the string.

    string s;

    //Prompt the user to input the string.

    cin >> s;

    //Check if the string entered by the user reach to

    //the next line character.

    if (cin.get() == '\n')

    {

         //Display the last word in the string.

         cout << s << " ";

         //Return from the if statement.

         return;

    }

    //Make a recursive call to the function rcopy.

    rcopy();

    //Display the remaining words in the string in

    //the reverse order.

    cout << s << " ";

}

//Start the execution of the main method.

int main()

{

    //Call the function rcopy.

    rcopy();

    //Use this system command to hold the console screen      //in visual studio.

    system("pause");

    //Return an integer value to the main function.

    return 0;

}

Explanation:

See attached images for the code and output

5 0
3 years ago
Computer viruses often spread by means of what?
lozanna [386]
Email attachments hope this helps
8 0
3 years ago
Read 2 more answers
Password ____ traverse the network searching for passwords from remote authentication systems.
irga5000 [103]

The correct answer is scanners.

<h3>what is password?</h3>

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

When a password contains more than one word, it may be referred to as a passphrase. When a password contains solely digits, such as a personal identification number, it may be referred to as a passcode or passkey (PIN).

learn more about password refer:

brainly.com/question/15569196

#SPJ4

3 0
2 years ago
Other questions:
  • What type of devices are a keyboard and a mouse?
    7·1 answer
  • Which ethernet cabling standard defines an ethernet network that uses cat 3 or better utp cabling, operating at 10mbps?
    8·1 answer
  • To change the tab order in which fields are encountered on a form, click the tab order button on the ____ tab.
    15·1 answer
  • How do you change a Word document to an .html file? Save it as a Web page. Save it as a plain text document. Copy it in rich tex
    14·1 answer
  • A ________ is a term used to describe a select list that allows the user to select an option to load another web page.
    10·1 answer
  • Which button should be utilized if a user is unsure whether or not they are the right person to reply to an email?
    6·2 answers
  • Which of these identifies the intersection of row 16 and column D?
    14·1 answer
  • Secure shell (SSH) operates over which port by default
    9·1 answer
  • What was Pike's objective on his first expedition in 1805?​
    9·1 answer
  • When you hear music, read a printout, or view a video, you are using a computer's
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!