1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanya [424]
3 years ago
6

____________ provides the architect opportunity to electronically plan and place elements of a building.

Computers and Technology
2 answers:
Snowcat [4.5K]3 years ago
5 0
CAD provides the architect opportunity to electronically plan and place elements of a building. The correct option among all the options that are given in the question is option "c". The full form of CAD is Computer Aided Design. It gives the designers the opportunity to create three dimensional pictures.
alexgriva [62]3 years ago
3 0

CAD provides the architect opportunity to electronically plan and place elements of a building. Correct answer: C CAD stands for Computer-Aided Design. CAD is a computer technology used by architects, engineers, drafters, artists, and others to designs a product and documents the design's process.

You might be interested in
Can someone answer this ?
Alexxx [7]

Solid: Wood/Rock

Liquid: Water/tea

Vapour: Steam/smoke

7 0
3 years ago
What is the purpose of using SmartArt Graphics and what is one way you can use SmartArt Graphics in your presentation(s)?
Sladkaya [172]
The purpose of smart art graphic is to show is basically for show for people to see and it helps your presentation by giving it a pop to it
7 0
3 years ago
What is signature in an E-mail​
Ber [7]

Answer:

sincerely, Your Name it has its own line at the very end of the email

4 0
3 years ago
The process of recognizing information? needs, using efficient search techniques to locate reliable sources of? information, and
RUDIKE [14]
What is being referred above is the digital information fluency. They are the ones responsible of producing an effective and efficient with the use of digital information.They also use it ethically which is beneficial to those who are using it. They are also used in evaluating and finding information in regards to digital information.
8 0
3 years ago
How long is a subnet mask? (Please select one of the four options)
kolezko [41]

Answer: 32 bits

Explanation:

 The subnet mask basically contain 32 bits number which performed various function in terms of mask in the IP address. There are mainly two types IP address that are:

  • Host port
  • Network port

The 32 bit is the mask that is used for the host networking address in the single IP address. If the string represent 1, it means that the subnet mask is the part of the network.  

 

5 0
3 years ago
Other questions:
  • Sam wants to move across the text in his documents to add data at predefined stops. Which key will he use to navigate through th
    13·2 answers
  • Under the class system, how many host ids were available in a class b network?
    7·1 answer
  • Keep getting the message i failed to sign in to email on my phone but i can open my email. whats going on?
    10·2 answers
  • Write a program that reads the subtotal and the gratuity rate, then computes the gratuity and total. For example, if the user en
    6·1 answer
  • _____ is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practic
    7·1 answer
  • Linux applications are developed using ________ programming language.
    7·1 answer
  • As a basic user of SAP Business One, which feature of the application do you like most? Elaborate on your answer.
    15·1 answer
  • When a value of one data type is automatically changed to another data type, a(n) ____________________ type coercion is said to
    7·1 answer
  • A company is looking for an employee to help organize customer information for the sales team. Which computer field includes thi
    15·2 answers
  • A project manager has designed a new secure data center and has decided to use multifactor locks on each door to prevent unautho
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!