1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
velikii [3]
2 years ago
9

Why is the engineering design process important to the customer?

Computers and Technology
1 answer:
Ket [755]2 years ago
8 0

The engineering design process important to the customer layout system permits things: A shared technique on a way to discover and remedy problems. A framework to assess ideas, tell priorities and save you myopic paintings.

<h3>What is the maximum vital step withinside the engineering layout system?</h3>

The first step withinside the engineering layout system is to outline the trouble that you are solving. This step is the maximum vital, as a defective know-how of the trouble handy ends in layout failures. Engineers paintings to discover the foundation trouble via way of means of opposite engineering the signs and symptoms they perceive.

The engineering layout system, via way of means of definition, is a sequence of steps that engineers use to discover an option to a trouble. These steps include: defining the trouble, brainstorming solutions, designing and constructing a prototype of the solution, trying out the solution, and enhancing it.

Read more bout the engineering :

brainly.com/question/17169621

#SPJ1

You might be interested in
// This pseudocode segment is intended to compute and display
Finger [1]

The pseudocode to calculate the average of the test scores until the user enters a negative input serves as a prototype of the actual program

<h3>The errors in the pseudocode</h3>

The errors in the pseudocode include:

  • Inclusion of unusable segments
  • Incorrect variables
  • Incorrect loops

<h3>The correct pseudocode</h3>

The correct pseudocode where all errors are corrected and the unusable segments are removed is as follows:

start

Declarations

     num test1

     num test2

     num test3

     num average

output "Enter score for test 1 or a negative number to quit"

input test1

while test1 >= 0

     output "Enter score for test 2"

     input test2

     output "Enter score for test 3"

     input test3

     average = (test1 + test2 + test3) / 3

     output "Average is ", average

     output "Enter score for test 1 or a negative number to quit"

     input test1

endwhile

output "End of program"

stop

Read more about pseudocodes at:

brainly.com/question/11623795

3 0
2 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
The router can deliver packets directly over interfaces 0 and 1 or it can forward packets to Routers R2, R3, or R4. Describe wha
ra1l [238]

Answer:

Following are the solution to this question:

Explanation:

In point A:

It applies the AND operation with the subnet-mask that is  

=128.96.39.00001010 \ \ AND \ \ 255.255.255.10000000 \\\\= 128.96.39.0000000 \\\\= 128.96.39.0 \\\

This corresponds to a 128.96.39.0 subnet. This is why the router sent the packet to 0.

In point B:  

It applies the AND operation with the subnet-mask that is 255.255.255.128

= 128.96.40.00001100\  AND \ 255.255.255.10000000 \\\\ = 128.96.40.0000000\\\\= 128.96.40.0

This suits the 128.96.40.0 subnet. The router then sent R2 to the packet. The packet.

In point C:  

It  applies the AND operation with the subnet-mask that is 255.255.255.128

=128.96.40.10010111 \ AND \ 255.255.255.10000000 \\\\= 128.96.40.1000000\\\\= 128.96.40.128

It  applies the AND operation with the subnet-mask  that is 255.255.255.192

= 128.96.40.10010111 \ AND \ 255.255.255.11000000 \\\\= 128.96.40.1000000 \\\\= 128.96.40.128\\

All of the matches of its sublinks above.  

Its default R4 router was therefore sent to the router by router.

In point D:

It  applies the AND operation with the subnet-mask  that is 255.255.255.192

= 192.4.153.00010001 \ AND \ 255.255.255.11000000\\\\ = 192.4.153.0000000 \\\\= 192.4.153.0 \\\\

It matches the 192.4.153.0 subnet. It router has sent packet to R3 then.

In point E:

It  applies the AND operation with the subnet-mask  that is 255.255.255.128

= 192.4.153.01011010\  AND \ 255.255.255.10000000 \\\\= 192.4.153.0000000 \\\\= 192.4.153.0

There, neither of the subnet inputs correlate with the ip address with the same subnet mask.

It  applies the AND operation with the subnet-mask  that is 255.255.255.192

=192.4.153.01011010\ AND \ 255.255.255.11000000 \\\\ = 192.4.153.0100000 \\\\= 192.4.153.64

It does not correlate to the subnet entries for same subnet mask, and therefore neither of the entries matches their corresponding ip address entries.  

Mask of the subnet.  That packet would therefore be sent to the default R4 router by the router.

4 0
3 years ago
What is an example of a way a farm could apply new technology to improve sustainability?
Bess [88]

An example of a way a farm could apply new technology to improve sustainability is via the use artificial intelligence to predict and adjust the farm's water usage.

<h3>How is artificial intelligence used in farming?</h3>

The use of AI systems is one that can help to make better the total harvest quality and accuracy which is known to be precision agriculture.

Note that An example of a way a farm could apply new technology to improve sustainability is via the use artificial intelligence to predict and adjust the farm's water usage.

Learn more about sustainability from

brainly.com/question/26195041

#SPJ2

4 0
2 years ago
Which of the following was the most widely used personal computer application until the mid 90s
Ulleksa [173]

Answer:

word processing

Explanation:

I just took the test

4 0
3 years ago
Other questions:
  • In a video, a motionless image is called
    7·2 answers
  • GIVING BRAINLIEST What does output allow a computer to do? Display information Receive information Do complex math problems Do m
    6·2 answers
  • A digital designer might do computer animation or video games true or false
    13·2 answers
  • PLEASE HELP ASAP!!
    11·1 answer
  • A developer is creating an enhancement to an application that will allow people to be related to their employer. Which data mode
    11·1 answer
  • Multiple Choice
    8·1 answer
  • Brainly Question
    14·2 answers
  • What are the main types of database end users,? Discuss the main activi-ties of each
    10·1 answer
  • Place the steps for attaching a file to a message in order from top to bottom.
    12·1 answer
  • What is the future of web development
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!