1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
11

CAD workstations

Computers and Technology
1 answer:
olya-2409 [2.1K]3 years ago
3 0

Answer:

Explanation:

The answer should be A. Because CAD is an Architecture/Design program.

You might be interested in
Bob works in a small office with a network of computers. Bob, along with all the other employees, is responsible for securing hi
miskamm [114]

Answer:

False

Explanation:

When an employee becomes the one responsible for the security of His own computer then the scenario does not define Network security. Network security is a usage of hardware and related software to provide protection to the underlying network architecture from unauthorized access and other anomalies related to networks.

5 0
3 years ago
Graphic characters used to identify items on an unordered list first line indent is called _______
Elodia [21]

Answer: they are calles BULLETS

Explanation:

4 0
3 years ago
List five applications of personal computers. do these applications depend on 32 bit or 64 bit processor?
Semenov [28]
For the list of application, either check in the book or come up with yourself.
All application not depend on the 32 bit or 64 bit processor. 
8 0
3 years ago
Which type of electronic community allows real time discussion among members
GrogVix [38]

Answer:

Instant messaging is the type of electronic community that allows real-time discussion among members.

7 0
3 years ago
How do you launch windows on a computer?
alexandr1967 [171]
You shood just be able to tern it on 
5 0
3 years ago
Other questions:
  • A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that da
    14·1 answer
  • Which passage form the passage best contributes to elisa impatient tone
    8·1 answer
  • Which statement describes a printer driver? a) It is the configuration code that is sent to a printer to identify the operating
    5·1 answer
  • In a Windows environment, __________ is a powerful tool that enables security administrators to share user and group definitions
    10·1 answer
  • Each row in a database is a set of unique information called a(n) (A.)table,(B.)record,(C.)object,(D.)field
    12·2 answers
  • Ujqwgydft frrhyy4e uvbw vhrwbhv vbyrewblv?
    14·1 answer
  • A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se
    15·1 answer
  • What does running the “sudo” command do?
    6·1 answer
  • How to connect apple pencil 2 to ipad 8th generation?
    11·1 answer
  • In ip address 202.54.15.178, 15.178 is ______ address.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!