Computer-aided design software is used by ________

A) project managers to track tasks B) architects to create virtual models
C) game makers to create games D) web designers to create websites


B

Computer Science & Information Technology

You might also like to view...

Which of the following IPSec modes encrypts the data in each packet but leaves the header unencrypted?

A) Transport B) Tunnel C) Network D) All of the above

Computer Science & Information Technology

Is copying the raw video file from a card to your hard drive enough?

What will be an ideal response?

Computer Science & Information Technology

When assigning an id to an HTML element, there is a corresponding JavaScript method called ____ that must be invoked for your JavaScript code to access it by id.

A. getElementByClass() B. getElementByCode() C. getElementByName() D. getElementById()

Computer Science & Information Technology

What is the definition of phishing?

What will be an ideal response?

Computer Science & Information Technology