1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vova2212 [387]
3 years ago
15

Explain why the process of sketching in engineering might resemble a loop or a cycle.

Computers and Technology
2 answers:
Lady_Fox [76]3 years ago
8 0

Answer:

The correct answer includes that the idea is created in the engineer’s imagination and that he or she must sketch the image on a piece of paper in an attempt to capture the essence of the idea. Once the engineer or team sees the sketch, they may want to modify or change the design. Changes will require other sketches and further brainstorming. The cycle will continue until the engineer achieves the best possible design.

Valentin [98]3 years ago
6 0

Answer:The process of sketching in engineering might resemble a loop because of the design process.

Explanation: The design process is a loop or cycle to improve a design. So, sketches will be shown to other engineers and they will improve on the design until it is effective and efficient.

You might be interested in
What is the computer software? Does a hardware can work without software?
mr Goodwill [35]

Answer:

Hope this helped!

Explanation:

A computer software is anything that lets you work with computers what happens inside it, and hard ware is the actual computer and its parts, so no a computer hardware CANNOT work without a software.

7 0
3 years ago
Read 2 more answers
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
2 years ago
The two outputs of a digital controller for an automatic drip coffee maker are for the time
victus00 [196]
The answer is (d.) display and pilot light

An automatic drip coffee maker displays two output from the digital controller; the time and the light or output signal. According to the US Patents publication, an automatic drip coffee maker includes a timer circuit. It's to provide pre-selected time for the activation and deactivation of the coffee maker.
7 0
3 years ago
What is the python ?​
docker41 [41]

Answer:

Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation. 

3 0
2 years ago
Read 2 more answers
Contagem progressiva e regressiva usando estrutura condicional enquanto no visualg
lana [24]
Girls are so evil nowadays
6 0
3 years ago
Other questions:
  • Pressing the Ctrl+Home keys moves the insertion point to the
    5·1 answer
  • The prefix kilo stands for which one of the following values? A. 100 or 102 B. 1000 or 103 C. 1,000,000 or 106 D. 10,000 or 104
    15·2 answers
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    5·2 answers
  • What are some ways tables can be inserted into a document? Check all that apply.
    5·2 answers
  • This form of analysis is an extension of what-if analysis and is the study of the impact on other variables when one variable is
    8·1 answer
  • Any part of the computer that you plug into the CPU like a phone, tablet, headphones etc. are called
    5·1 answer
  • In a ______topology, every device has exactly two neighbors for communication purposes. A failure in any cable or device can tak
    15·2 answers
  • How do you know where the home row of the keyboard is?
    14·2 answers
  • Please select the word from the list that best fits the definition Asking for review material for a test
    14·2 answers
  • What will be the output of the following code?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!