1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
3 years ago
10

Why we need to interpret the drawing and plans

Computers and Technology
1 answer:
scoray [572]3 years ago
5 0

Technical drawing is essential for communicating ideas in industry and engineering.

You might be interested in
One concern some users have about storing data or accessing applications in the cloud is .
andriy [413]

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

3 0
2 years ago
It is ________ to pass an argument to a function that contains an individual array element, such as numbers[3].
Lapatulllka [165]

Answer:

The answer is "option B".

Explanation:

In the C++ programming language, it is legal to pass a parameter in the method that includes an individual array element. where an array is a collection of homogeneous (similar types of) elements. and other options are not correct that can be defined as:

  • In option, a Passing argument in a function is not illegal in c++.
  • In option c, It is recommended by the ANSI committee.
  • In option d, It is good for practice in coding.
5 0
3 years ago
Why was Windows 1.0 considered an operating environment rather than an operating system?
wolverine [178]

Windows 1.0 was only a shell program

The operating system for Windows 1.0 was MS-DOS

4 0
3 years ago
Read 2 more answers
Does anyone know the code for the beaded bracelet on codehs? pls i really need help
kvv77 [185]

Answer:

Explanation:

If it has not changed since the last time that i used codehs then the code should be the following

penup()

forward(-100)

right(90)

pendown()

def beaded_bracelet():

circle(10)

penup()

forward(20)

left(10)

pendown()

for i in range(36):

beaded_bracelet()

Which should complete the entire function as intended.

6 0
3 years ago
The field on which records are sorted is called the composite primary key.A. TrueB. False
Gemiola [76]

Answer: TRUE

Explanation: Composite is simply used to refer to the existence of more than one event or pattern. The composite primary key as related to database management query refers to the synergy or combination of more than one field or column of a specified table which is used in sorting or accurate identification of a record. When attributes are combined, that is more than one, it assists in narrowing down the returned records such that records which are close and exclusive to the options specified are returned. Usually, the more the number of columns which makes uo the case mpoaite keys, the more unique and well sorted our returned output is.

4 0
3 years ago
Other questions:
  • It takes you 0.8 of a minute to read each page of your health book. It takes you 5.5 minutes to take the test at the end. How lo
    10·2 answers
  • When you make a pointer variable im C++, is star label a must?
    9·1 answer
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • This is question 2.5 Computer Science and I don't understand what is wrong<br><br>​
    15·1 answer
  • 100 POINTS PLEASE HELP ASAP!!!!!
    5·2 answers
  • which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that ha
    9·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • If a file you are opening for appending does not exist, the operating system will detect the missing file and terminate the oper
    14·1 answer
  • In matlab how would this specific code be written and how could I ask the user to enter a vector of coefficients for the polynom
    10·1 answer
  • Information Technology (IT) is a component of an Information System (IS)<br><br> True or False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!