1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
11

The method of orthography projection is preferred in the United States

Computers and Technology
1 answer:
goldfiish [28.3K]3 years ago
6 0
Projection is the orthographic projection method most commonly used in the United States

3rd angle

You might be interested in
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
3 years ago
A person attempts to access a server during a zone transfer to get access to a zone file. What type of server is that person try
DerKrebs [107]

Answer: DNS Server

Explanation:

DNS server is the server that has the database along with the IP addresses along with names of the host as well in a computer system. So, by accessing the zone file , the person is actually trying to manipulate the host that is present in the DNS server zone. DNS server helps in the execution of the particular software and maintaining the connection using some protocols.

4 0
4 years ago
What is another term for online data storage?
Aloiza [94]
Cloud storage, meaning storage own by someone else like Google drive
3 0
3 years ago
A client is currently struggling with late-stage integration and manual deployments. They want to find another method that will
Papessa [141]

Answer:

It can deliver the services faster with higher reliability and quality

4 0
3 years ago
3.5 Code Practice
Veseljchak [2.6K]

Answer:

grade = input("Enter grade")

def add(grade):

if grade == 9:

 print("Not in High School Freshman")

elif grade == 10:

 print("In High School")

 print("somophone")

elif grade == 11:

 print("in High School")

 print("Junior")

elif grade == 12:

 print("in High School")

 print("Senior")

else:

 print("Grade Not Accepted:")

return 0;

add(11)

Output:

Enter grade 11

in High School

Junior

Process finished with exit code 0

Explanation:

Firstly remember that this is a function, and not a program. Hence, you need to call the function to test it. A python program is interpreted line by line, Hence, we can test a function as well. Here we input a grade, and through the function find the details related to it and the print it out, which is clearly explained through the definition of the function.

7 0
4 years ago
Read 2 more answers
Other questions:
  • An electronic device that can accept data as input, process it according to a program, store it, and produce information as outp
    6·1 answer
  • List the six external peripheral parts of a computer system
    8·1 answer
  • Greg is the network administrator for a large stadium that hosts many events throughout the course of the year. They equip usher
    7·1 answer
  • The requester of sensitive information should not receive access just because of his or her clearance, position, or rank. The re
    15·1 answer
  • PLEASE HELP! :)
    14·1 answer
  • Assume that you have implemented a sequence class. Describe the mySequence object (i.e., items with the correct order and the po
    9·1 answer
  • 49 points!
    14·1 answer
  • What would be the printed output of the Python code to the right?
    14·1 answer
  • Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an
    15·1 answer
  • 6) Which of the following an OPERATING SYSTEM? a) Window 7 b) excel c) PowerPoint d) Publisher​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!