1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vova2212 [387]
3 years ago
15

Explain why the process of sketching in engineering might resemble a loop or a cycle.

Computers and Technology
2 answers:
Lady_Fox [76]3 years ago
8 0

Answer:

The correct answer includes that the idea is created in the engineer’s imagination and that he or she must sketch the image on a piece of paper in an attempt to capture the essence of the idea. Once the engineer or team sees the sketch, they may want to modify or change the design. Changes will require other sketches and further brainstorming. The cycle will continue until the engineer achieves the best possible design.

Valentin [98]3 years ago
6 0

Answer:The process of sketching in engineering might resemble a loop because of the design process.

Explanation: The design process is a loop or cycle to improve a design. So, sketches will be shown to other engineers and they will improve on the design until it is effective and efficient.

You might be interested in
5. Which of the following could occur making it necessary for Amy to troubleshoot her computer? Error messages keep popping up,
sleet_krkn [62]

Answer:

Adding new hardware/Software

Explanation:

Depending on how much you add to your computer it could make it have too much, so it can work slower and make it malfunction therefore i would Troubleshoot for that reason.

3 0
3 years ago
charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
finlep [7]

Charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes and repairs security issues found. The kind of scanning that best describes Charles's requirements is: Active scanning.

<h3>Who is a Security Analyst?</h3>

A Security Analyst's responsibilities include the following:

Define, plan, execute, maintain, and improve security measures, policies, and controls. Writing reports and offering insights on the effectiveness of current security policies, incident response plans, disaster recovery plans, and other security-related information

Active scanning is a scanning approach that involves scanning individual endpoints in an IT network in order to retrieve more specific information.

Learn more about Security Analysts:
brainly.com/question/16354463
#SPJ1

6 0
1 year ago
Formulas should follow the___
tatuchka [14]

Answer:

Order of operations

Explanation:

4 0
2 years ago
domain controllers store local user accounts within a sam database and domain user accounts within active directory. true or fal
Natalka [10]

Answer:

True

Explanation:

The domain controller is a server that responds within windows server domains to request for security authentication. It enforces security for windows and they are useful for storing the account information of users, that is local users within a Security Account Manager. Therefore the answer to this question is true.

Thank you!

5 0
2 years ago
How do I change the year I was born on this website? I made a mistake and now I can't fix it. Can somebody please help me?
Eddi Din [679]

Answer:

you can go to settings and try to fix it or contact the people of this website

Explanation:

8 0
3 years ago
Other questions:
  • Your brother is a video producer and is looking to buy some sort of new computing device. he needs a lot of memory and processin
    11·1 answer
  • A prediction or statement that can be tested is ____
    9·1 answer
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • During the charging of a storage battery, what is the temperature that the electrolyte solution must never exceed?
    6·1 answer
  • The ____ algorithm was the first public key encryption algorithm developed (in 1977 and published for commercial use.
    8·1 answer
  • Vector testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cr
    7·1 answer
  • Given a variable temps that refers to a list, all of whose elements refer to values of type float, representing temperature data
    10·2 answers
  • Help asap dont answer with a link​
    11·1 answer
  • In 1980, IBM's cheapest computer was more affordable than Apple's.<br><br><br> True<br><br> False
    10·1 answer
  • What is the total number of time zones that can be configured to show by default in a calendar in Outlook 2016?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!