1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
3 years ago
15

HURRY!!!!!!!!!!!!!

Computers and Technology
1 answer:
Anna35 [415]3 years ago
7 0

Answer:

You make use of a scale (See Explanation)

Explanation:

Given

Length = 12 feet

Required

How would you represent this on drawing.

Knowing that a length of 12 feet can't be drawn on drawing, the best way to do this is to make use of a scale measurement.

The scale to use depends on you and the size of paper at your disposal.

Assume you adopt a scale of 1 inch: 1 feet

This means that a length of 12 feet will be represented by 12 inches in drawings

You might be interested in
Most of the Desktop games contain a backdoor used to test and update the game.
sveta [45]

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

the answer is True

i hope it will help you

8 0
3 years ago
Case 1-1Tom has just started working as an intern for a local radio station. He is responsible for managing the request line and
pantera1 [17]

Answer:

The answer is Live Preview.

Explanation:

<em>Live Preview is a Powerpoint tool that helps the user to find out how a singular choice will change the appearance of the presentation, without committing any change. This application allows the user to edit any slide and see the changes without any risk of damaging the rest of the presentation.</em>

<em>It lets the user see how an actual change will look on the slide  object before the user decides to accept or decline the change.</em>

<em>It is a powerful resource, because we know how handful it is to prepare a powerpoint presentation.</em>

3 0
3 years ago
FOR ALL PLATO USERS:
aleksley [76]

You have to ask you teacher to show you which ones you got wrong and the answers to them.

6 0
4 years ago
Read 2 more answers
What happens when your project is rendered?
jok3333 [9.3K]

Answer:

B

Explanation:

when your rendering video project your computer is processing all the data that goes into creating images you experience video rendering every time you look at your computer the images on your screen has all been rendered to produce the website photo or video you are looking at

4 0
3 years ago
What is networking??????????????????????
kodGreya [7K]

Answer:

the activity or cycle of collaborating with others to trade data and create proficient or social contacts.

Explanation:

<3

8 0
3 years ago
Other questions:
  • ________ is used to store programs and instructions that are automatically loaded when the computer is turned on.
    14·1 answer
  • A bitmap picture can be represented by hexadecimal numbers. Each two-digit hexadecimal number represents a row. To convert a num
    14·1 answer
  • A section-lined area is always completely bounded or outlined by an?
    11·1 answer
  • Which of the following definition below describes a wall opening?
    6·2 answers
  • Harold included an excerpt from an Internet magazine in an article he wrote for the school newspaper. However, he did not ask pe
    13·2 answers
  • List at least 5 features that can be used to format a report in word 2013
    6·1 answer
  • Does white space have visual weight? Yes or No
    7·2 answers
  • Select the correct answer.
    6·1 answer
  • THIS IS TIMED PLS HURRY UP
    7·1 answer
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!