1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
3 years ago
15

Which of the following is based on the visibility and location of an object’s features?

Computers and Technology
1 answer:
grandymaker [24]3 years ago
7 0

Answer:

The answer is Lines.

Explanation:

A visible line, or object line is a thick continuous line, used to outline the visible edges or contours of an object. A hidden line, also known as a hidden object line is a medium weight line, made of short dashes about 1/8” long with 1/16”gaps, to show edges, surfaces and corners which cannot be seen.

You might be interested in
How many bytes make up a megabyte? One hundred One thousand One million One billion
Phoenix [80]
One million is the answer.
4 0
3 years ago
A recipe for deducing the square root involves guessing a starting value for y. Without another recipe to be told how to pick a
Gnoma [55]

Answer:

TRUE

Explanation:

TRUE - A recipe for deducing the square root involves guessing a starting value for y. Without another recipe to be told how to pick a starting number, the computer cannot generate one on its own.

5 0
3 years ago
Please help
MA_775_DIABLO [31]

Answer:

Key name

How to use it

Shift

Press Shift in combination with a letter to type an uppercase letter. Press Shift in combination with another key to type the symbol shown on the upper part of that key.

Caps Lock

Press Caps Lock once to type all letters as uppercase. Press Caps Lock again to turn this function off. Your keyboard might have a light indicating whether Caps Lock is on.

Tab

Press Tab to move the cursor several spaces forward. You can also press Tab to move to the next text box on a form.

Enter

Press Enter to move the cursor to the beginning of the next line. In a dialog box, press Enter to select the highlighted button.

Spacebar

Press the Spacebar to move the cursor one space forward.

Backspace

Press Backspace to delete the character before the cursor, or the selected text.

Typing (alphanumeric) keys. These keys include the same letter, number, punctuation, and symbol keys found on a traditional typewriter.

Control keys. These keys are used alone or in combination with other keys to perform certain actions. The most frequently used control keys are Ctrl, Alt, the Windows logo key  Picture of the Windows logo key, and Esc.

Function keys. The function keys are used to perform specific tasks. They are labeled as F1, F2, F3, and so on, up to F12. The functionality of these keys differs from program to program.

Navigation keys. These keys are used for moving around in documents or webpages and editing text. They include the arrow keys, Home, End, Page Up, Page Down, Delete, and Insert.

Numeric keypad. The numeric keypad is handy for entering numbers quickly. The keys are grouped together in a block like a conventional calculator or adding machine.

The following illustration shows how these keys are arranged on a typical keyboard. Your keyboard layout might be different.

Explanation:

3 0
2 years ago
You are part of a development team that needs to adopt an integrated development environment tool to increase programmer product
Ber [7]

Answer:

honestly I think the other one is correct

Explanation:

4 0
3 years ago
Law enforcement has contacted a corporation's legal counsel because correlated data from a breach shows the organization as the
Art [367]

Answer:

A is the correct answer.

Explanation:

Perform security awareness training about incident communication.

6 0
3 years ago
Other questions:
  • What are the advantage of transistors over vacuum tubes?
    6·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • Which option is most likely used to create many-to-many relationships in Access?
    8·1 answer
  • What is a strictly layered pattern, provide an example of its usage.
    13·1 answer
  • 4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm
    6·1 answer
  • The idea that innovations in transportation and communication technologies has changed the way we think about distance and time
    9·1 answer
  • Modify the code below to do the following:
    12·1 answer
  • @anthonydboss23<br><br> it’s goldielove6 <br><br> .....this is not a question everyone ignore this
    11·2 answers
  • Suppose that you have the following declaration:
    7·1 answer
  • Jeri wants to make sure she designs her web site for a specific group of people. What will help her plan who will visit the site
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!