1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vivado [14]
3 years ago
6

1. Which of the following are considered CAD powerhouses?

Computers and Technology
1 answer:
allsm [11]3 years ago
8 0

Answer:

1. D.Autodesk and microstation.

2. D. the creation of a computer model, paricularly for purposes of studying.

3. A.internet delivered through standard household phone lines.

4. C.3-D sculptures used to pray for fertility.

5. C.technology.

Explanation:

You might be interested in
A design tool helps you plan, evaluate, and explain your ideas to create a product. Some examples of design tools are outlines,
Arisa [49]
1. True

3. A. outline

4. B storyboard
4 0
2 years ago
Read 2 more answers
Which of the following is an example of phishing attack? csp
TEA [102]
There are no examples you imbecile it’s A
4 0
3 years ago
Which statements best describe slaves in ancient times? Select all that apply.
Romashka-Z-Leto [24]

Answer:

Slaves are the people thought as conquered People

Explanation:

In ancient times, slaves works without any remunerations. These people are captured or purchased by rich peoples. Their whole life spends in slavery. The people who are also prisoners of wars worked as slaves for their rest of the life.

5 0
2 years ago
A hidden backlog contains the projects that the IT department is not aware of because of low feasibility.
Finger [1]

Answer: True

Explanation:

Yes, the given statement is true that the due to the very low feasibility the IT (Information technology) department are not aware of the hidden backlog that basically contain projects.

The feasibility is the main factor in the IT department as it helps to study whole objective of the project and then also uncover all the strength and weakness of the project so that we can easily go through the details to make the project more efficient and reliable.

8 0
3 years ago
Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet.
alexandr402 [8]
The answer to this is B=MODE(A1:A65)
8 0
3 years ago
Other questions:
  • Mike wants to build an amplifier. Which technology can he use?
    15·1 answer
  • what properties are associated with all Microsoft Office files and include author, title, and subject
    5·1 answer
  • Naseer has inserted an image into his document but needs the image to appear on its own line.
    14·2 answers
  • What can search the Internet and select elements based on important words?
    6·2 answers
  • I need urgent help. which of these network has minimum data loss. a. LAN b. MAN c. WAN ​
    11·1 answer
  • . Explain and demonstrate the functionality of timer devices in an embedded system[
    9·1 answer
  • What command is most effective at identifying different types of files?
    6·1 answer
  • HELP FAST PLEASE
    6·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
  • WILL GIVE BRAILIEST
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!