The advantages of computerized design include all of the following, except which? a. architects can create a computerized image of any imaginable design.
b. because of computer design software, architects are no longer needed in architecture.
c. architects can create plans of older architecture to learn from past successes and errors.
d. computerized design has increased the complexity of possible designs.

Answers

Answer 1
Answer: I think the correct answer from the choices listed above is option B. The advantages of computerized design include all of the following, except of the statement that because of computer design software, architects are no longer needed in architecture. Hope this answers the question.
Answer 2
Answer:

Answer

Because of computer design software, architects are no longer needed in architecture.

Explanation

Computerized design is the use of computer systems to aid in the creation, modification, analysis, or optimization of a design. it is a system used to increase the productivity of the designer, the quality of the design and also it improves communication through documentation. Through this software architects can create a computerized image of any imaginable design and can create plans of older architecture to learn from past successes and errors.  computerized design has also  increased the complexity of possible designs.


Related Questions

How many of devices you identified inside the control room need to magnetism to operate
True or False? The correct implementation in the case of an atomic operation is to test separately for the presence of the lockfile and to not always attempt to create it.
List the six external parts of the computer system
Need answer ASAP!!When it comes to videos that are uploaded to Youtube can they be tracked to where they are coming from besides the email?
Match the CIA triad to the methods and techniques used to ensure them: preparing for fast disaster recovery with backups and business continuity plans Biometric Verification 1. Confidentiality promptly applying system upgrades and patches 2. Integrity Two-Factor Identification 3. Availability One way encryption checksums (hashes) File permissions Match the terms with associated concepts. used to determine identities and permissions 1. Authentication and Authorization detection of intruders by monitoring network traffic/intruders 2. Prevention and Resistance 3. Detection and Response stop intruders from accessing and reading data Match the terms with associated concepts. Encryption that uses a pair of keys, one called a public key and the other a private key. Using the same key to encrypt and decrypt a message. 1. Asymetric key encrption 2. Symetric key encryption Allows people to exchange secret messages without ever having met to exchange a key 3. One-way encryption < A hash function that generates a digital fingerprint of a message is an example of this

Having some prior knowledge about your topic is helpful when conducting internet research. please select the best answer from the choices provided t f

Answers

The statement-Having some prior knowledge about your topic is helpful when conducting internet research is True.

What is internet research?

Internet research is also called online research. It is basically the practice of using the free information available on the internet through the World Wide Web (WWW).

When you have some prior knowledge about a topic, you are better able to:

  • Understand the relevance and credibility of the sources you find online.
  • Refine your search terms and phrases to find more relevant information.
  • Avoid wasting time sifting through irrelevant or incorrect information.
  • Evaluate the quality of the information you find and make informed decisions about which sources to use.

Therefore, it is always a good practice to critically evaluate the sources and information you find online, regardless of your level of prior knowledge. Hence, the given statement is true.

Learn more about internet research, here:

brainly.com/question/30092532

#SPJ6

Answer:

its true

Explanation:

Only the fields that appear in the design grid are included in the results of the query. Select one: True False User: The Internet consists of an uncountable number of nodes that enable users to communicate and share information. Select one: True False

Answers

Only the fields that appear in the design grid are included in the results of the query. TRUE.

By working in a series of positions with increasing responsibilities, the owner of Stonegate Gardens has built her interest in flowers and plants into _____.

Answers

the answer is a career

have a good day ;)

Ms. Rogers wants to see the names of all the students who scored below 25 on the test. Which of these custom options will help her do so?A. Equals
B. Is less than
C. Is greater than

Answers

B Is less than because it says below

The best description of a propriety database

Answers

a proprietary database is a database that is privately owned and password protected. i hope this helps!!!! :)

__________ "is/are the technology used to transform inputs into outputs"

Answers

Answer:System process

A systemprocess is a technology used to transform inputs into outputs, basically torender products and services. In addition, the important internal factor withinthe system is the quality of the product. This system has four componentsnamely; inputs, transformation, outputs and feedback.

The answer is system process.  The technology used to transform inputs into outputs is system process.  The System process is a kernel mode process which runs system threads (the kernel and loaded device drivers) taking care of network i/o and/or disk i/o.