1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
3 years ago
6

What is 2D thinking and 3D thinking? i literally don't understand

Computers and Technology
1 answer:
andriy [413]3 years ago
8 0

Answer:

Two dimensional thinking implies concepts that are flat or only partially representative of the whole. Three dimensional thinking implies the first part of 2d thinking conjoined with intersecting dimensions rendering a deeper field of meaning.

Explanation:

You might be interested in
One megabyte is approximately __________.
solmaris [256]
The answer is A, one thousand bytes
7 0
3 years ago
Read 2 more answers
When discussing the business requirements of a WLAN design, what is the first question that should be posed
mel-nik [20]

Answer:

The first question should be "What is the purpose of WLAN ?" .

In order to design a stable and better WLAN user should understand the purpose or intended use of WLAN.

For example : A school's wireless  network will be different than the corporate wireless network.

In order to design the WLAN in a better way . User should know following

1. What is the purpose of the WLAN ?

2. How many users will be using it at a time ?

3. How many users will use it over all given a period of time ?

4. What are the common applications being used ?

5. Who will be using the WLAN?

6. Is there any legacy devices that need backward compatibility ?

So unless user doesn't understand the complete purpose and requirement of the WLAN, it is not possible to give the best design for the same. Capacity and Coverage needs to be taken care while designing WLAN.

Explanation:

as explained above.

6 0
3 years ago
___________ key encryption in wep uses the rc4 encryption algorithm.
lora16 [44]

Shared key encryption in wep uses the rc4 encryption algorithm.

7 0
3 years ago
Explain set associative mapping<br>​
gtnhenbr [62]
Set-associative mapping allows that each word that is present in the cache can have two or more words in the main memory for the same index address. Set associative cache mapping combines the best of direct and associative cache mapping techniques.
6 0
3 years ago
Identifying the problem is crucial when trying to solve a problem. There are several techniques that you can use to aide you in
erica [24]
Consensus Building is NOT a technique that you can use to help you in identifying a problem.
8 0
3 years ago
Other questions:
  • When sending an electronic cover letter, an e-mail address is sufficient contact information.
    10·2 answers
  • How are different types of cars similar and different?
    10·1 answer
  • What are the advantages of upgrading computer hardware?
    13·2 answers
  • You have noticed that one of your DNS servers has possibly been compromised. You believe that a cached DNS entry for your domain
    8·1 answer
  • Why is it important to be part of a team in times you fail and in times you succeed?​
    15·1 answer
  • You use an escape sequence to include ___________________ in a string.
    15·1 answer
  • It is where your cpu (processor) is installed
    10·2 answers
  • I will have to goste yall im busting my butt off doing homework
    10·2 answers
  • Después de un incidente de seguridad del cliente, el equipo realiza un análisis en profundidad de cada paso dado por los atacant
    6·1 answer
  • How does the use of blocking affect the external sorting algorithm, and how does it change the cost formula
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!