1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady_Fox [76]
3 years ago
5

There are differet kinds of tools in the box identify the tools that we leed in embroidery.Write your answer in the blank

Computers and Technology
1 answer:
Salsk061 [2.6K]3 years ago
6 0

Answer:

The tools are listed below.

Explanation:

There are many tools used in embroidery, the basic ones are mentioned below:

- Needles: there are needles like crewel needle, Milliner needle, tapestry needle.

- Hoops and frames

- Embroidery Scissors

- Pinking shears

You might be interested in
In which of the following scenarios would you use the Redo function?
MakcuM [25]
D. <span>You have just used the Undo function to delete a paragraph, and you want that paragraph back.</span>
6 0
3 years ago
An Inspect and Adapt (I&amp;A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable P
ASHA 777 [7]

The aspect Of the program that causes uncontrollable amounts of work in process is that Teams do not do a good job of task switching.

<h3>What is task switching?</h3>

Task switching or task interleaving is known to often take place if a task is voluntarily or involuntarily stopped so as to listen  to another task.

In the case above, The aspect Of the program that causes uncontrollable amounts of work in process is that Teams do not do a good job of task switching.

Learn more about task switching from

brainly.com/question/12977989

#SPJ1

7 0
2 years ago
Which issue of computer ethics is concerned about the technological division in the society?​
Molodets [167]

Answer:

There are many legal and ethical issues with computers that can be exploited by bad people to do bad things. Some of those issues include illegal music and video file downloading, spyware, identity theft, phishing, keystroke logging, packet sniffing and cyberbullying

7 0
3 years ago
Read 2 more answers
Suppose you are working on a team using object-oriented programming, and your supervisor observes you creating new objects. She
o-na [289]
The correct way to observe and create something
3 0
3 years ago
How do you erase data from your hard drive
fgiga [73]
The theory that your data is still recoverable by forensic analysis by well-financed governments, is based on a misunderstanding of a research paper from the mid 90s by Peter Gutmann, which looked at MFM floppy disks, not modern EPRML hard drives. Lifehacker describes the software that you will be using, Darik's Boot and Nuke, as "an open-source boot disk utility (read: works on nearly any computer) that supports a wide variety of disk wiping methods and operates from inside the computer's RAM, allowing it to scrub the disk thoroughly at a remove.
7 0
3 years ago
Other questions:
  • In Word, tables can be styled much like text can.<br> True<br> False
    6·1 answer
  • Which logging category does not appear in event viewer by default?
    11·1 answer
  • What is the relationship between a method and a function
    11·2 answers
  • How do users log into Windows 8?
    7·1 answer
  • your friend's parent's are worried about going over their budget for the month. Which expense would you suggest is NOT a need?
    11·1 answer
  • Pick one of the following scenarios and
    6·1 answer
  • Write a function that accepts a positive random number as a parameter and returns the sum of the random number's digits. Write a
    10·1 answer
  • Any idea how to make my simple python projects such as guess the number, mad libs, etc. even better?
    15·2 answers
  • In a paragraph discuss 5 steps of saving a document in a storage device.<br>​
    5·1 answer
  • You are reviewing a friend’s HTML project. You notice that the only metadata is the title. Furthermore, you ask your friend abou
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!