1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
6

When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation

s. This is an example of A. robust design. B. environmentally friendly design. C. modular design. D. CAD.
Computers and Technology
1 answer:
patriot [66]3 years ago
6 0

Answer:

C. modular design

Explanation:

Based on the information provided it can be said that in this scenario being able to choose the style that you want is an example of a modular design. A modular design refers to when something is divided into various parts called modules that can be independently chosen and/or exchanged in order to create a customized object. Which is exactly what is allowed in this scenario when ordering a new zagflatz.

You might be interested in
Which of the following are techniques that companies use to influence consumers demand for their goods and services
Lesechka [4]
A. Turning luxuries into necessaties
5 0
3 years ago
Read 2 more answers
What is the size of the program counter for an avr that has a 1 kbyte rom capacity?
horsena [70]

Answer:

9 bits

Explanation:

 We all recognize 1 K bytes as =1024 bytes.  

And the storage medium used for program instructions are the non-volatile flash memories. The MCUs are always 8 bits, and a piece of the instructions revenues two or one 16-bit words. Besides we know program memory magnitude through the device name, and as an instance, the ATmega64x line emanates with 64KB of flash, and the ATmega32x line emanates with 32 KB. And there is nobody like off-chip program memory, and all of the codes that are being implemented by the AVR essentially be on the on-chip flash. However, this restraint is not ever applied to the AT94 FPSLIC AVR/FPGA chips. Also, you must know that AVR is a family of microcontrollers established by ATEL in 1996. It is a Harvard architecture type single-chip 8-bit RISC microcontroller. And it is supposed to be the first microcontroller which applied flash memory for storing the program They are heavily used in embedded systems.  

1k byte = 1024 bytes, However, if the program instruction takes 16 bits.  

And hence it only wishes 512.  

Here and now 512 = 10^9, and henceforth you necessitate 9 bits at minimum.  

excluding you can somehow paginate that (such as through one-bit pagination, you will be necessitating only 8 bits and so on.)  

Therefore the answer here = 9 bits.

5 0
3 years ago
For people who answer other pals questions with wrong answers on purpose
11Alexandr11 [23.1K]

Answer:

I dont try, but sometimes when i get the question wrong i get reported :(

Explanation:

3 0
2 years ago
Which of the following are true about Public Key Encryption?
BabaBlast [244]
A is the correct answer
5 0
3 years ago
What did Stalin hope the Western powers would do because of the blockade?​
Elodia [21]

Answer:

Stalin's plan was to cut western Germany off from its capital

Explanation:

Stalin's plan was to cut western Germany off from its capital so that the new government, based in Berlin, could not control its territory in western Germany. He hoped that this would prove that a divided Germany would not work in practice.

6 0
3 years ago
Other questions:
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • Which network could NOT carry commercial traffic?
    5·1 answer
  • Why you should care about copyright
    13·1 answer
  • As an administrator for the Contoso Corporation, your primary office is in Sacramento and your data recovery site in Las Vegas.
    15·1 answer
  • The vast amount of data collected from Internet searches, social media posts, customer transactions, military
    8·1 answer
  • Once a graph has been created, you would need to start over to make any changes to it?
    5·1 answer
  • Which of the following terms best describes the security domain that relates to how data is classified and valued?
    14·1 answer
  • Create a class named Console, and move all the methods that retrieve and validate user input to that class. These methods can re
    7·1 answer
  • A ________ is a device used to illegally capture the data stored on the magnetic stripe of an ATM card, credit card, or debit ca
    10·1 answer
  • Write a function called st_dev. st_dev should have one
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!