1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
6

Explain the concept of an engineering trade-offs and give an example

Computers and Technology
2 answers:
makvit [3.9K]3 years ago
8 0

ytfjkhm,MNbkvjhmb,kn.l">

k

Deffense [45]3 years ago
8 0

Answer:

- A trade-off is an exchange in which one benefit is given up in order to obtain another.

Example: a material may be used to build a house because it is attractive to customers even though it is not as durable.

yeeeet

You might be interested in
Algorithm and flowchart to find the perimeter and area of square​
kupik [55]

Answer:

I can give you the perimeter "algorithm" but not the flowchart.

Here you go:

p = w * 4

p = perimiter,

w = width/height

4 = the amount of sides needed.

perimeter = width * 4

to include both width and height, we would instead use:

perimeter = 2(width+height)

This also works with rectangles ^

--------------------------------------------------------------------------

To find an area, it is just width * height. This is also compatible with rectangles.

4 0
3 years ago
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
Murljashka [212]

Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack.

<h3>What is downgrade security attack?</h3>

A downgrade attack is known  to be a kind of of cyber attack that is made up of the fact that an attacker is known to often forces a network channel to make a switch to a kind of an unprotected or one that is said to be less secure data transmission standard.

Note also that the  Downgrading of a given protocol version is said to be a key element of  a type of a  man-in-the-middle attacks, and it is known to be one that is often used to take or hijack encrypted traffic.

Hence, Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack

Learn more about Downgrade attack from

brainly.com/question/24304791

#SPJ1

3 0
1 year ago
A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.
MariettaO [177]

A <u>user view</u> is often developed by identifying a form or report that an end user needs on a regular basis.

<h3>What is a database?</h3>

A database can be defined as an organized and structured collection of factual data that are stored on a computer system as a backup and are usually accessed electronically.

In database management system (DBMS), a <u>user view</u> is often developed by a software developer through an identification of a form or report that an end user needs on a regular basis.

Read more on data here: brainly.com/question/13179611

#SPJ1

4 0
1 year ago
Type the correct answer in the box. Spell all words correctly.
Alekssandra [29.7K]

Answer:

kinesthetical

Explanation:

please give brainliest please and good luck :)

8 0
1 year ago
How do I change my username/display name
exis [7]

Answer:

.

Explanation:

you do to me on the bottom bar and once you hit that you click the pencil and change it

6 0
2 years ago
Read 2 more answers
Other questions:
  • Suppose your company has decided that it needs to make certain busy servers faster. Processes in the workload spend 60% of their
    5·1 answer
  • Sarah is entering weekly sales data for week 37 of the current year; however, when she moves down to thecells where she needs to
    8·2 answers
  • The ____________ is a wildcard character that is used to search for an unknown single character.
    6·1 answer
  • Design an algorithm for finding all the factors of a positive integer. For example, in the case of the integer 12, your algorith
    8·1 answer
  • What is the output of the following C++ program?
    15·1 answer
  • Software for creating animations
    15·2 answers
  • This isn't really a question ,but a random fact about Fnaf William Aton
    7·2 answers
  • Some one help pls will mark brainless !!!!!
    13·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document?​
    15·1 answer
  • 7.2.4 Area of Triangle HELP PLEASE!! (JAVA SCRIPT) I WILL WAIT FOR THE SOLUTION.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!