1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Minchanka [31]
3 years ago
14

Match each label to the correct location on the image match the process to its characteristics

Computers and Technology
1 answer:
Lera25 [3.4K]3 years ago
4 0

Answer:

The 2 on the right belong in the drawing section. The left 2 being on the sketch section

Explanation:

A technical drawing is all about precision and using a computer to refine sketches.

You might be interested in
An “AI” (artificial intelligence) could be used in:
zhannawk [14.2K]
I would say D. But l may be incorrect. Al bots are not made for games, but are made for information.

Sorry l can't be much of help, but l do hope that I did help you out in a way.
8 0
3 years ago
What is this affect in photography?? pls help!!
dlinn [17]
Its called tilt shift effect
3 0
4 years ago
What is an electronic medical record
Airida [17]
EGC . medical research science
3 0
3 years ago
How do you take a ridge count from a fingerprint?
Wittaler [7]

Answer:

Find a delta in the print and draw a circle around it and then find the core and circle it. After that draw a line connecting the core and the delta. Then count from the core to the delta  that is a ridge count.

Explanation:

8 0
4 years ago
An attacker compromises a Linux host, installing a web shell as a backdoor. If the attacker gained access to the host through a
OverLord2011 [107]

Reverse shell is known to be the type of attack that is said to have occurred in the above case.

<h3>What is reverse shell?</h3>

A reverse shell is said to be “connect-back shell,” and it is one that often takes advantage of the computer weakness of the target to start a shell session and it often access the victim's system.

Hence, Reverse shell is known to be the type of attack that is said to have occurred in the above case.

See options below

A.) Man-in-the-Browser (MitB)

B.) Reverse shell

C.) Rootkit

D.) Session hijacking

Learn more about Reverse shell from

brainly.com/question/16607263

#SPJ1

5 0
2 years ago
Other questions:
  • When approved for a loan, an individual essentially applied for aid in the area of...
    15·1 answer
  • PLEASE HELP
    12·2 answers
  • Enter the number 2568 into the box below
    14·1 answer
  • You decide to configure ntp on the router to get time ntp server with an ip address of 172.17.8.254 which commanda should you us
    14·1 answer
  • After merging two arrays is complete you need to
    11·1 answer
  • I need someone to help. This is the links I found and I'm going through the same thing. I live in small town where they think I'
    14·1 answer
  • ___ is an example of a function prototype.
    12·1 answer
  • In working on the conceptual design of the new database, Ken determines that the "office" field in one of the tables must includ
    8·1 answer
  • Write a summary of five things that you learned about CSS. Do not copy and paste the information. Summarize each point in your o
    5·1 answer
  • Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in _____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!