1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
2 years ago
8

Derek has to create a technical design of a complex floor plan using CAD. What will be most helpful for Derek to use to create t

he design?
OA layers
OB. scale
O c. units
OD. file formats
Computers and Technology
1 answer:
Alla [95]2 years ago
6 0

Answer: A: Layers

Explanation: It is correct on PLATO

You might be interested in
9. h=
Nadya [2.5K]

Answer:

rs 35.6ko vrs 12. r7 3.3ko vrt 13.

6 0
2 years ago
What is a coverage map used for
erastova [34]

Answer/Explanation:

A coverage map shows how much land something takes up or reaches to.

4 0
3 years ago
Read 2 more answers
Which would be the most appropriate way to estimate -6.1(0.22)? Check all that apply.
Sergeu [11.5K]

Answer:

A.Use rounding to get -6(0.2), and then multiply. and D. use front end estimation to get -6(0.2), and multiply. and B.

Explanation:

just took the test

7 0
3 years ago
Read 2 more answers
What protocol is used to access directory listings within active directory or other directory services?
zalisa [80]

The LDAP protocol is used to access directory listings within active directory or other directory services.

LDAP stands for Lightweight Directory Access Protocol. The function of this protocol is to enale access to an existing direcory. LDAP is based on a client-server model.


3 0
3 years ago
Are sql injections legal?
natima [27]

Essentially, if you are seen to be someone who knows what you are doing, then even typing in a single-quote to a web form has been enough to be arrested and charged over in the past.

But lets say i'm writing a pen test tool that will be doing sqli testing and let it loose on sites that are 'out in the wild'. I'm not going to be doing dumps of any information. But is just the vulnerability scan itself illegal?



8 0
3 years ago
Other questions:
  • a computer that no longer works after having minor repair work done to it may have been damaged by ______.
    6·1 answer
  • Styles are modified by using the Office clipboard in the Home tab. true or false
    5·2 answers
  • You just brought a new hard drive for your computer. U plan to use this as a secondary hard drive to store all your uma files. O
    10·1 answer
  • The official record of a high school student's performance is called:
    6·1 answer
  • You are the IT administrator for a small corporate network. You have installed the Windows Server 2016 operating system on a ser
    12·1 answer
  • An airline has found about 7% of its passengers request vegetarian meals. On a flight with 166 passengers the airline has 16 veg
    11·1 answer
  • Some Tiny College staff employees are information technology (IT) personnel.
    8·1 answer
  • After Alexandra installed new software, she set it up to perform in a certain way. She is _____. changing the peripherals linkin
    10·1 answer
  • How do you access the <br><br>internet in your school and at home?​
    11·1 answer
  • RUNTIME ORGANIZATION AND DATA LAYOUT.​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!