1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
14

Need answers for 11&12. Due today. Thanks.

Computers and Technology
1 answer:
GalinKa [24]3 years ago
3 0
What is CAD?

Computer-aided design (CAD) is the use of computer programs or computer systems that aim to create, modify, analyze, optimize and document two or three-dimensional (that is 2D or 3D) graphical representations of physical objects as an alternative to manual drafts and product prototypes. It is widely used in electrical, mechanical, chemical engineering, among others. For example, it is used in electrical engineering to make electrical drawings regarding different projects such as Residential Projects, industrial projects, etc.

What are some of its advantages over other design systems?

CAD is widely used to increase the productivity of the designer as well as improve the quality of design, improve communications through documentation, and to create a database for manufacturing. 
It is used throughout the engineering process. From conceptual product design and layout through assembly analysis to manufacturing method definition. The method  CAD enables and ensures engineers to interactively test design variants with minimal physical prototypes to achieve: 

1. Lower product development costs
2. Greater speed
3. Increased productivity
4. Quality assurance 
5. Accelerated time-to-market

In this technological age, costs, productivity, speed, quality and time are topics very important to companies. These topics are optimized using CAD. Manual drafts and product prototypes translate into a poor productivity nowadays.

What is the difference between servicing and repair?

There are a lot of products that are designed to be fully serviceable and repairable. These products (such as a watch, smartphone, car, etc) are subjected to a wide variety of daily stresses and strains. When a part of the product needs replacing, this is a timely opportunity to ensure that any progressive wear and tear from external elements are addressed. By carefully assessing each product, checking its parts, addressing any worn parts or gaskets, ensures that the product is in perfect working order and that it always functions efficiently. This is related to service.
On the other hand,  if the product has been accidentally damaged, suffered a fault, then it is necessary to repair the product. This is related to repair
So, the difference between servicing and repair is that the first one is related to maintenance and the second one involves fixing things when the product is damaged.

Why are both important in technological products?

Creating the most popular product of the year will make consumers and investors happy. Many of the best-selling products were first in a new category. The purpose of the products is to continue to dominate their markets. So, it is important that they be easy for maintenance and hard to be damaged.
You might be interested in
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
Suppose there are 10 computers on a network that are configured to share a few printers and a single document folder. The compan
ivanzaharov [21]

Answer:

B- Workgroup model

Explanation:

A workgroup model can be defined as a process which enables system to be peer together in order to access the resources shared like files and printers at the same time.

In work group microsoft operating systems tend to share files, printers, and even Internet connection among them which is why work group is important especially in a place in which their are various computers with limited files and printer or internet connection.

4 0
3 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
Explain what qualifies a device to be called a computerized system​
Karolina [17]

Answer; A peripheral is a “device that is used to put information into or get information out of the computer.”[1]

There are three different types of peripherals:

Input, used to interact with, or send data to the computer (mouse, keyboards, etc.)

Output, which provides output to the user from the computer (monitors, printers, etc.)

Storage, which stores data processed by the computer (hard drives, flash drives, etc.)

Explanation:

7 0
3 years ago
What is the name of the app that works like a emp jammer from your iphone app
lions [1.4K]

To my knowledge there is not one if that did somehow occour, it would result in your phone also getting fried by the EMP and render the app useless before it effected anybody else's phone or other devices. hope this answered your question:)

4 0
3 years ago
Other questions:
  • You have been hired to set up a network for XYZ Enterprises. What factors will you consider to determine the type of network nee
    7·2 answers
  • All of the following are methods of communication
    8·2 answers
  • What does the machine do and how do the operators react to their work?
    13·1 answer
  • It is okay to use a dust rag when cleaning the inside of a computer.
    9·2 answers
  • All linear programming problems have all of the following properties EXCEPT
    9·2 answers
  • For Excel:
    5·1 answer
  • A testing lab wishes to test two experimental brans of outdoor pain long each wiil last befor fading . The testing lab makes six
    11·1 answer
  • If a document is stored on a file server but team members can edit the document​ anonymously, the content on the file server is:
    14·1 answer
  • Please define processor​
    14·1 answer
  • PLEASE HELP WILL MARK BRAINLIEST
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!