1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
2 years ago
7

What method of technical drawing uses converging lines?

Computers and Technology
1 answer:
lana [24]2 years ago
5 0

Answer:

one-point perspective?

Explanation:

i think this is correct, tell me if it's not

You might be interested in
Who is the person responsible for creating the original website content?
Romashka [77]

Answer: D) Content creator

Explanation:

  • Content creator are responsible for creating the original content of the website. They contribute writing the blog posts about various topics and promote the content with the help of digital and social media.
  • Content creator are basically responsible for writing blog post on the industry based topics, graphic design and video editing.

Content editor uses data and evaluation from the users for analysis. It basically includes design and development to enhanced the material on the website.

Static and dynamic information are related to computer terminologies.

Therefore, (D) option is correct.

8 0
2 years ago
During the course of execution of a program, the processor will increment the contents of the instruction register (program coun
Oksana_A [137]
Bdbdbdhdhdhdhdjdbsbbrvrvrrvrvrvfvfvvfvfvfvfvfhdhdhdhdhdhdhhdududududududuebebbedvdvd I known why ahh it happened
8 0
2 years ago
Ano ang word processor at electronic spreadsheet​
AveGali [126]

Answer:

excel

Explanation:

3 0
2 years ago
Read 2 more answers
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user
bixtya [17]

Answer:

B

Explanation:

An authentication server server tracks who is logging on to the network as well as which services on the network are available to each user. It also does the job of providing a network service that applications can use to authenticate the credentials, that are oftentimes account names and passwords, of their users. Authentication server is also used as the basis for authorization.

4 0
2 years ago
HOW DO I DELETE A BRAINLY QUESTION?
Fantom [35]

Answer:

To delete a question you asked, click the arrow in the top right-hand corner of your question page and select Delete. If any answers have been added to your question, you'll have to request its deletion.Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
    8·1 answer
  • 5. Which of the following is a Windows feature that allows you to temporarily store text?
    13·2 answers
  • Select all that apply.
    15·2 answers
  • Given four inputs: a, b, c & d, where (a, b) represents a 2-bit unsigned binary number X; and (c, d) represents a 2-bit unsi
    6·1 answer
  • Which group of commands all appear on the Standard toolbar?
    7·1 answer
  • Question 3
    13·1 answer
  • You have this code in your program.
    7·1 answer
  • A ……………………………is used to verify the identity of a website and is issued to the owner of the website by an independent and recogni
    7·2 answers
  • If you do a Find and Replace for a term, where will Word begin looking for the term?
    6·1 answer
  • Problem: Write the Python code of a program called ComputeSquare that asks the user to enter the length of the side of the squar
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!