1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bazaltina [42]
4 years ago
5

How does having constraints placed on a design change the engineering process

Computers and Technology
2 answers:
Delvig [45]4 years ago
8 0
Having constraints on a design will change the engineering process and the process will take a long time to finish. The process eats up time, quality and budget especially when it involves prototypes and the like. Some common constraints involve the design itself and the engineer. 
Angelina_Jolie [31]4 years ago
8 0
Idlk jjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj
You might be interested in
What is open source software? ​
lana [24]

Answer:

Open source software is free, modifiable, and is able to be redistributed. It is beneficial to those wanting  to customize the software to suit their purposes as it can be easily shared and redistributed.

6 0
3 years ago
"""
Vinvika [58]

head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.

print("0 through 10 multiplied by 2 and by 10" + "\n")

# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
x = 0
while(x<11):
print(head1 + str(x))
print(head2 + str(x*2))
print(head3 + str(x*10))
x += 1
# Next number.

4 0
2 years ago
Several disaster relief nonprofits want to create a centralized application and repository of information so that they can effic
vichka [17]

Answer: Community cloud

Explanation:

A community cloud is a collaborative effort whereby infrastructure is shared among different organizations from a particular community that has common concerns such as compliance, security etc.

Since several disaster relief nonprofits want to create a centralized application

in order to efficiently share and distribute resources related to various disasters that they may respond to together, then the community cloud will be useful in this regard.

6 0
4 years ago
ASAP HELP NO GUESS A new pet store wants to design a logo to be displayed on business cards, posters in the shop’s windows, and
murzikaleks [220]

[2] JPG graphic  i hope this helps

6 0
3 years ago
Read 2 more answers
What is a collision in a hash table?
Maru [420]

Answer: Collision is defined as the event that takes place when the clash appear due to the information persisting the same hash value get in contact. This mechanism occurring in the hash table is called collision and is dependent on the type of application.

Collision becomes difficult to be avoided in a large set of the hash table as the data set is difficult to be found while in small hash table it is still detectable but cannot be avoided completely.

7 0
3 years ago
Other questions:
  • Write a function: function solution(N); that, given a positive integer N, prints the consecutive numbers from 1 to N, each on a
    14·1 answer
  • When you think that the internet is helpful and you find whatever you want to know, So you fool yourself, almost nobody is profe
    10·1 answer
  • ________ feature full-time monitoring tools placed at the most vulnerable points, or "hot spots", of corporate networks to prote
    10·1 answer
  • Is cloud computing a hardware service used to keep computers working? True or False
    11·1 answer
  • Select the correct answer.
    13·1 answer
  • For what kind of work would you use a block plane?
    10·1 answer
  • Which staff member takes a set of plans and supervises their construction?
    6·1 answer
  • Elena wrote the following code in Scratch to have the sprite move and then turn around. However, the code does not work as expec
    5·1 answer
  • What is one way object-oriented programming differs from procedural programming?
    15·1 answer
  • a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!