1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
5

In Revit, BIM provides a variety of model information. Which piece of information is not offered by BIM? Select Answer A) Payrol

l B)Quantities C) Pricing D) Scheduling
Computers and Technology
1 answer:
gizmo_the_mogwai [7]3 years ago
4 0

Answer:

yeet my points into my wallet i need brainliest for points plzz

i actually think scheduling im 11 so i dont know dude

You might be interested in
A(n) ________ software installation enables you to decide which features you want to install on the hard drive. Select one: A. f
Softa [21]

Answer:

D.Custom

Explanation:

When you select  Custom installation, all Compulsory subcomponents and products are installed, but the Optional and Recommended  sub-components and components can be installed selectively on a product-by-product basis for the licenses selected at install time.  It also provides the feature to store it in your desirable disk in the hard drive.

7 0
3 years ago
For local travel addresses and street names should be
saul85 [17]
Capitalized  and properly spelled 

8 0
3 years ago
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
2 years ago
Select the correct answer.
swat32
Answer : C project planning
5 0
3 years ago
Write steps to Delete data from ‘Datagridview’
julsineya [31]

Explanation:

private void btnDelete_Click(object sender, EventArgs e)

{

if (this.dataGridView1.SelectedRows.Count > 0)

{

dataGridView1.Rows.RemoveAt(this.dataGridView1.SelectedRows[0].Index);

}

}

8 0
3 years ago
Other questions:
  • ____, developed by xuejia lai and james massey, is a block cipher that operates on 64-bit blocks of plaintext.
    10·1 answer
  • Okay so, not really a question but whatever it’s been bothering me.
    9·2 answers
  • You are asked to optimize a cache design for the given references. Th ere are three direct-mapped cache designs possible, all wi
    7·1 answer
  • The rule of thumb that predicts that the number of transistors on a cpu will double every two years is called ________ law.
    7·1 answer
  • Please help me!! 10 Points are waiting!!
    8·1 answer
  • How does a layered pattern make use of abstraction and encapsulation?
    10·1 answer
  • Prepare a risk assessment report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security
    14·1 answer
  • Write the definition of a method named countPos that receives a reference to a Scanner object associated with a stream of input
    13·1 answer
  • What do we call data that's broken down into bits and sent through a network?
    15·1 answer
  • What is the output of the following program? If there is any problem, how can
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!