1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
10

What are the 3 dimensions referenced when we say 3D?

Computers and Technology
1 answer:
viktelen [127]3 years ago
4 0

the 2 dimensions are the x and y the 2d dimensions but then we add one called the z

hope this helps

You might be interested in
Calculate the time necessary to perform a multiply using the approach described in the text (31 adders stacked vertically) if an
Rudiy27

The time that will be used to perform a multiplication using the approach is 28 time units.

<h3>How to calculate time taken?</h3>

From the information given, the following can be noted:

A = 8 (bits wide)

B = 4 time units.

The multiplication will be performed based on the adder stack. Since A = 8, then, A - 1 = 8 - 1 = 7.

Now, the time taken will be:

= 7 × B

= 7 × 4tu

= 28 tu

In conclusion, the correct option is 28 time units.

Learn more about time taken on:

brainly.com/question/10428039

5 0
3 years ago
Whenever they are passed as parameters to a function, the IO classes istream and ostream must be passed using a pass-by-referenc
morpeh [17]

Answer:

b. TRUE

Explanation:

Whenever they are passed as parameters to a function, the IO classes istream and ostream must be passed using a pass-by-reference parameter passing scheme.

This is because , assuming a pass by value semantics would require us to copy the value of the istream or ostream object which would be meaningless. In fact these objects don't even have a copy constructor at all. So such objects are always passed by reference.

7 0
3 years ago
During the weekend, Alice often needs to access files stored on her office desktop from her home laptop. Last week, she installe
ICE Princess25 [194]

Answer:

Depending on the error message which Alice get but what could have gone wrong is perhaps firewall issue.

Explanation:

There are lots of probable reason why Alice could not access her files during the weekend but below are some common reasons:

Firewall issue: Maybe Alice has her firewall turned on unknowingly as it is known that firewall do block such types of connection except it is explicitly allowed from the firewall settings.  Another issue might be that, Alice ISP uses firewall.

FTP programs Setting: Perhaps there is a settings which Alice has not activated in the FTP program that she is using.

3 0
4 years ago
What is custom software
Kobotan [32]
A custom sofware is a computer program or website written <span>specifically for your company,</span>
4 0
4 years ago
Read 2 more answers
What are some good reasons for using Linux in a corporate environment? (Choose all that apply.) a. Linux software is unlikely to
ella [17]

Answers:

A, B, and C.

Explanation:

a. Linux software is unlikely to become abandoned by its developers.

Linux is Open Source, this means that the source code is free and public. Any user or developer can read and contribute by fixing bugs or adding new functionalities, and does not relies on a single group or company.

b. Linux is secure and has a lower total cost of ownership than other operating systems.

Most distributions are totally free to download, install and use for both individual and corporate use, so no licences must be paid. Also the community provides excellent support to questions and issues.

c. Linux is widely available for many platforms and supports many programming languages.

There are multiple distributions designed for practically every platform (personal computers, servers, mobile devices, etc.). Functionalities can can be extended by adding packages, for example, to support different programming languages, like C, Java, Python, and many others, making the system extremely versatile.

d. Most Linux software is closed source.

This one is NOT correct, as is opposite to the "open source" explanation given in a.

8 0
4 years ago
Other questions:
  • What does the hot end of a 3D printer do?
    11·1 answer
  • The following SQL statement contains which type of subquery? SELECT title FROM books WHERE EXISTS (SELECT isbn FROM orderitems W
    14·1 answer
  • In an average case involving an array of n elements, how many times will a sequential search function have to read the array to
    13·1 answer
  • python Assume letters A, E, I, O, and U as the vowels. Write a program that prompts the user to enter a string and displays the
    11·1 answer
  • How is hardware different from sofware?
    15·1 answer
  • A computer ____ is the amount of data (typically measured in bits or bytes) that a cpu can manipulate at one time.
    8·1 answer
  • (03.05 LC) Match the term with its description. (4 points) Column A 1. Acid : Acid 2. Alkaline : Alkaline 3. pH : pH 4. Ion : Io
    8·1 answer
  • PLEASE AWNSER 50 POINTS PLUS BRAINLEST ILL FAIL MY GRADE IF I DONT AWNSER IN A HOUR!
    15·1 answer
  • ________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other
    7·1 answer
  • HELP ME ASAP
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!