WHEN IS THE DESIGN PROCESS FINISHED IN ENGINEERING?​

Answers

Answer 1

Answer:

I think answers is it never ends


Related Questions

how many 2/8 pound patties can she make from 7/8 of a pound of hamburger

Answers

Answer:

3/8

Explanation:

Because 2 can't go into 7, the next best thing is 6, so 2x3 is 6 with 1/8 left over~~~~~hope this helps :) pls brainlist

Axel is conducting some online research, and he wants to narrow down his search to a specific date
range, and he only wants to find images. What should he use?
O quotations
O a Boolean search
O truncation of terms
O filters

Answers

Answer:

filters

Explanation:

you use filters to specify what you want to find

Sort the layout options for two types of masters in PowerPoint.

Answers

Answer:

The program photo is showing the correct answers and the correct place for the two that you missed.

Explanation:

Answer: ANSWER IS SHOWN CORRECTLY

Explanation:

I REALLY HOPE IT HELPS YOU!!!!!!!!!!!!!

THANK YOU & BE SAFE TOO!!!!!!!!!!!!!!!

akira has a mobility impairment that makes it difficult to type on a keyboard. what technology can she use to create written documents without using a keyboard?

Answers

Answer:

speech recognition software

The screen reader technology she can use to create written documents without using a keyboard if Akira has a mobility impairment that makes it difficult to type on a keyboard.

What is Screen reader technology?

An assistive technology known as a screen reader reads text, such as the document you see on your screen.

The audio output of screen reader technology is used to describe the information on the screen. A screen reader may narrate the operations of the computer or device as well as read aloud webpages and documents.

When reading text on a screen, a screen reader employs a Text-To-Speech engine to convert it to speech.

Thus, the screen reader technology she can use to create written documents without using a keyboard if Akira has a mobility impairment that makes it difficult to type on a keyboard.

Learn more about the Screen reader technology here:

https://brainly.com/question/7600315

#SPJ2

Which of the following described a global network connecting billions of computers and other
devices?
A) WiFi
B
ISP
C
World Wide Web
D
Internet

Answers

pretty sure its wifi
A that pretty much it! Lol

How has A.I. evolved and helped humanity in recent times?

Answers

Answer:

AI has helped many people in these days.

Explanation:

With AI adoption on the rise, the technology is addressing a number of global challenges.

Artificial intelligence is being used to help crack down on illegal activities.

It is helping to tackle over fishing in our ocean.

And it is even being used to address the issue of gender imbalance.

how to connect apple pencil 2 to ipad 8th generation?

Answers

Answer:

That pencil doesn't adjust to that ipad because those two aren't compatible

Explanation:

Choose one scene or object to photograph. Take and submit at least three photographs of this scene at three different times of day. Be sure to note the times of day that you choose. Write a brief response about how the light changed in the photograph.
Take and submit photographs of someone using frontlighting, backlighting, and sidelighting. You can use the sun or other lighting.
Practice taking photographs on a cloudy or rainy day. Turn in three of your favorites from that practice.
Take some portrait photographs using a reflector. (Remember that white paper, poster board, sheets, or a wall can all act a reflector.) Practice moving the subject in different positions relative to the reflector. Turn in three of your favorite photographs.
Practice taking photographs in different lighting conditions (indoors and outdoors, different times of day, different weather, and so on) to help you better understand the impact of light on your photographs. Turn in three of your favorite photographs from your practice sessions.

Answers

Answer:

i dont get what you mean

Explanation:

My sister told me an extremely funny joke. what is the direct object for this sentence ?

Answers

Answer:

Explanation:

16. If a user can make modifications to database objects, what permission has that
user been assigned?
A. Update
B. Alter
C. Create
D. Select

Answers

B

Explanation:

The Alter command is used when we want to modify a database or object contain in database.

(01.02
High-level programming languages are used to write a wide variety of programs, like
operating systems, scientific modeling, and general applications.

True
False

Answers

Answer:

ture

Explanation:

hope it help u

The navigation items for a Lightning app are available on mobile: A. In a special mobile configuration in the navigation menu and in Favorites B. In the profile menu, when in the app C. In the navigation menu and the first four items of the navigation bar, when users are in the app D. In the App Launcher Check the Quiz to Earn 100 Points

Answers

Navigation items are used for moving from one part of the part to a destination using actions and also for passing information. The right option is  C. In the navigation menu and the first four items of the navigation bar, when users are in the app

There are different methods/ways to implement the Navigation component in a mobile application, we have the following type of Navigation Implementation

Bottom NavigationDrawer Navigation(Slides from Left to right)Top Navigation

Learn more about Navigation here:

https://brainly.com/question/8908486

A professional is someone who uses education and acquired skills to earn money in a career.
Question 10 options:
True
False

Answers

After using my big brain it’s true

Very few games have any sort of narrative, not even a simple one that involves setting the mood through color, sound, environment, and game mechanics.

A.
True
B.
False

Answers

Answer:

B. False

Explanation:

Numerous amount of games have narrative, there is an entire genres built around narratives. Any RPG game has a narrative and even bog standard FPS games have some sort of backstory and effects setting a mood.

What is the default folder for text file

Answers

documents or download

It depends where you install it to

Answer:

numbers are stored as characters

Explanation:

currently saved in if another folder

which computer language uses short words known as mnemonics for writing programs?

Answers

The answer is Assembly

it is defined as the interloping of yarn with the use of a hook to make a design . A smocking B knitting C crocheting D embroidery​

Answers

Answer:

letter C

Explanation:

because the crocheting is defined as the interloping yarn and use to make and made a design to excellent.

If a flowchart has a diamond with the words “yes” and “no” to the sides of it, then it is representing a program that is a sequence.
Group of answer choices

True

False

Answers

Answer:

true

Explanation:

hope it help

computer science

describe 3 differences between the checksum and check digit:

Answers

Answer:

A check digit, also known as a checksum character, is the number located on the far right side of a bar code. The purpose of a check digit is to verify that the information on the barcode has been entered correctly.

A check digit, even comprehended as a checksum character, stands for the number found on the far right side of a bar code. The intention of a check digit exists to confirm that the information on the barcode contains been documented accurately.

What are the differences between the checksum and check digit?

A checksum in public can be any size, although generally, they exist some suitable number of bits for computation, such as 32. The more extensive the checksum, the wider the range of errors it can capture. For instance, the checksum utilized for credit card numbers will notice changed digits that exist after each other, but not reversed digits that exist split by a single digit.

All cryptographic hashes (like MD5, SHA, etc.) can be utilized as checksums, but not all checksums exist cryptographic. CRC-type checksums aren’t cryptographic, but they’re extremely quick to calculate, and so they exist generally utilized for things like hard drive checksums where you don’t require the cryptographic functionality, but you accomplish want to notice an extensive range of probable errors.

To learn more about checksum and check digit

https://brainly.com/question/14789699

#SPJ2

in addition to good design sense, what else do web designers need to be proficient in?

Answers

Web designers need to be proficient in Front-end coding languages in addition to good design sense.

Web designers build or redesign websites. They understand what it takes to make a website functional and easy to use, but also understand what is needed to make it aesthetically appealing to the user.

Web designers need to be proficient in Front-end coding languages in addition to good design sense.

Find out more on web design at: https://brainly.com/question/8391970

10. What Microsoft program is frequently used to develop pictorial representations
of a database's logical relationships?
A. Visio
B. Access
C. Excel
D. Word

Answers

Answer:

A. Visio

It's a "powerful tool for diagramming needs". In other words, pictures.

EASY 15 POINTS IF YOU CAN HELP
What is the value of the variable named result after this code is executed?

numA = 3

numB = 2

result = numA ** numB

A. 5
B. 9
C. an error has occurred
D. 6

Answers

Answer:9

Explanation:

The value of the variable named result after this code is executed "numA = 3 numB = 2 result = numA ** numB  is 9.

What does value mean?

The value of an output is known to be the sum or the monetary worth of that thing.

Note that looking at the  variable of the code that is executed "numA = 3 numB = 2 result = numA ** numB, we can say that the output is 9.as one can ger it when 3 multiplied itself twice.

Learn more about value from

https://brainly.com/question/843074

#SPJ2

Describe the function of memory and
processing unit of Computer system​

Answers

Answer:

Computer memory is a temporary storage area. It holds the data and instructions that the Central Processing Unit (CPU) needs. ... This allows the CPU direct access to the computer program. Memory is needed in all computers.

Explanation:

hope it help

Unit 6: Lesson 2 - Coding Activity 1 AP Computer science

Answers

The complete program is to define a boolean method that returns true if all elements of an array are negative, or return false, if otherwise

The method in java, where comments are used to explain each line is as follows:

//This defines the method

public static boolean chkNegative (double[] myArr) {

   //This initializes a boolean variable

   boolean isNeg = true;

   //This iterates through the array

   for (int i = 0; i < myArr.length; i++) {

     //If the array element is 0 or positive

     if (myArr[i] >= 0) {

         //Then the boolean variable is set to false

       isNeg = false;

       //And the loop is exited

       break;

     }

   }

   //This returns true or false

   return isNeg;

 }

Read more about boolean methods at:

https://brainly.com/question/18318709

you receive a text from your boss, who’s on vacation. it says she can’t connect to the network and urgently needs you to send a file using an enclosed link. what type of social engineering attack is being used here?

Answers

The type of social engineering attack that is being used here is phishing. It exploits human errors.

Phishing is a type of social engineering attack that requires human errors to obtain credentials and/or spread malicious malware.

This type of attack (phishing) represents the most common type of social engineering attack.

Phishing generally involves email attachment files or links that are infected with malicious malware.

Learn more about phishing here:

https://brainly.com/question/23021587

what is meant by formatting the presentation?​

Answers

It's deciding how things look. If you are on powerpoint you would choose the text style and colors and organize your information how you would like. If you were giving a speech you would decide what order your information is in.

What are the two main types of software​

Answers

system software and application software

Answer:

System software and application software

Explanation:

What is this on G00gel Documents , how do I fix it?

Answers

Answer:

Sorry but it donest show the picture

Explanation:

Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot. What might cause Jordan’s smartphone to overheat?
A. Bluetooth receiver is causing the smartphone to overheat.
B. The smartphone is located too close to the car’s heat vent.
C. The GPS receiver is causing the smartphone to overheat.
D. The screen has been active too long.

Answers

Answer:

I think A Bluetooth receiver is causing the smartphone to over heat

Which UPPER function is written so that all text in cell B4 will be capitalized? O=UPPER(B4) O=UPPER[B4] O UPPER B4 O=UPPER

Answers

The Excel UPPER function converts a text string to all uppercase letters. Numbers, punctuation, and spaces are not affected.

So , Which upper function is written so that all text in cell b4 will be capitalized

Answer is : PROPER function
Other Questions
Describe the location of the polnt having the following coordinates. abscissa and ordinate have the same signQuadrant II or Quadrant IV Quadrant II or Quadrant III Quadrant or Quadrant IVQuadrant I or Quadrant III write an email to your brother about my country my pride pls help. I dont really understand these problems. fraction area and perimeter how do i solve use the GCF and the distributive property to express a sum as a product 52 +20+36 Learning Outcomes: You will be able to say what you (and others) have and describe a variety of feelings and conditions with the verb tener.You will also be able to ask and say where somebody is going and to say Lets go!Key words and concepts: The verb tener in the present tense; Common expressions with tener; The verb ir in the present tenseChoose the more logical verb of the two and write its correct form in the present tense. Use a capital letter if the verb is the first word of the sentence.1. (Yo: tener / ir) ______ seis clases. Estoy muy ocupado!2. Paco y yo (tener / ir)______ hambre. Vamos a la cafetera.3. Adnde______(t: tener / ir)? Al gimnasio? Vamos!4. Juan Manuel (tener / ir)_______ diecinueve aos.5. Elena y Martn (tener / ir)_______a la clnica. Estn un poco enfermos.6. Mi compaero de cuarto (tener / ir) ______a la biblioteca. Tiene que estudiar (study).Need This asap, giving brainliest answer to correct person. What is the moral of the story? Find the slope of the line that contains the following ordered pairs (4,2) (7,6.5) Where did muckrakers carry out most of their work?. PLEASE HELP WILL MARK BRAINLIEST ABC and XYZ are similar triangles with right angles at B and Y. AC=13 cm,BC=5 cm. Find AB and XZ. (No links pls...) what is the difference between brachytherapy and teletherapy? Graph the following equation.x+2y>-6 A landscaping company charges customers for lawn care based on the area of their yards. Mr. Jones was charged $52 for his yard, which is 40 feet by 65 feet.If a neighbors yard is 50 feet by 80 feet, what would the neighbor be charged based on how much Mr. Jones was charged?A $60B $80C $100D $120 two principles of government that are directly impacted in an open primary state four problems facing Nairobi What is the slope of the line that passes through the points (-5, -5 ?(5,5)? Use the drawing tools to form the correct answer on the graph.What is the inverse of the function shown?Click on a tool to begin drawing.DeloteUndoResetDrawing ToolsSelectizPoint10Line Segment8642x6-10-8-6-4-2268102 Why did some colonists bring enslaved people to Texas? Which of the following statements are true? check all of the boxes that apply. Can someone please help me