1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
9

what determines the best types of sketch or drawing to complete when you want to communicate your idea about a solution to a tec

hnical problem
Computers and Technology
1 answer:
Mekhanik [1.2K]3 years ago
8 0
It depends on the problem. If you are solving a conplex one or simple
You might be interested in
The purpose of a function that returns "void" is:_________. A) To satisfy compiler warnings B) To package a repeated task as a f
galben [10]

Answer:

B) To package a repeated task as a function even though the task does not yield a value

Explanation:

The purpose of a function that returns "void" is to package a repeated task as a function even though the task does not yield a value. Since the function does not return any value, it control returns to the caller.

5 0
3 years ago
You can use a(n) to call a function in response to an event?
uranmaximum [27]

Answer:

Simply put: A callback is a function that is to be executed after another function has finished executing — hence the name 'call back'. ... Functions that do this are called higher-order functions. Any function that is passed as an argument is called a callback function.

Explanation:

6 0
3 years ago
Does anyone know what this logo is??
scoray [572]

Answer:

I have got no idea it looks like an older style

8 0
2 years ago
Read 2 more answers
The name of a Variable effects its value<br><br> True<br><br> False
Y_Kistochka [10]

Answer:

option A ) true is right answer.

7 0
3 years ago
Persons who have been given access to an installation can be counted on to be of no threat. true or false? (antiterrorism scenar
aliya0001 [1]
<span>The statement that "Persons who have been given access to an installation can be counted on to be of no threat" is false. If they are not honest enough, they could become the dangerous staff the company could ever had because he or she has access to everything, files, information, etc. That is why, in selecting a person to be trusted with such responsibility, he or she undergoes an intensive training.</span>
4 0
3 years ago
Other questions:
  • Describe the Sign in process of an Email account.​
    6·1 answer
  • To become a news anchor, you should get a Bachelor's degree in:
    11·2 answers
  • Your car must have two red stoplights, seen from ______ feet in the daytime, that must come on when the foot brake is pressed.
    6·1 answer
  • An Internet user has a need to send private data to another user. Which of the following provides the most security when transmi
    15·2 answers
  • The part of the poppet valve that contacts the valve seat is called the?
    10·2 answers
  • What term is used to refer to the way companies collect and process data in order to create new information to make important bu
    13·1 answer
  • You are requesting information about wireless connectivity for your workplace computers. Because you expect the information to b
    15·1 answer
  • What can be the maximum possible length of an identifier 3163 79 can be of any length​
    5·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    9·1 answer
  • How to determine the critical crack size for a<br> plate
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!