1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
6

When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation

s. This is an example of A. robust design. B. environmentally friendly design. C. modular design. D. CAD.
Computers and Technology
1 answer:
patriot [66]3 years ago
6 0

Answer:

C. modular design

Explanation:

Based on the information provided it can be said that in this scenario being able to choose the style that you want is an example of a modular design. A modular design refers to when something is divided into various parts called modules that can be independently chosen and/or exchanged in order to create a customized object. Which is exactly what is allowed in this scenario when ordering a new zagflatz.

You might be interested in
You will start by doing a bit of research on viewfinders and LCD displays on digital cameras. After you feel that you have an un
Lemur [1.5K]

Answer:

SOMEBODY ANSWER IT

Explanation:

JESUS C

3 0
3 years ago
A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown
BabaBlast [244]

Answer:

Option (A) A successful WPS attack has occurred

Explanation:

  • WPS stands for Wi-Fi Protected Setup.
  • Its a network security protocol in the Wi-Fi which has a vulnerability.
  • The connection to the Wi-Fi can be established through the router in four ways. They are
  • (a) PIN method
  • (b) Push button method
  • (c) Near field communication method
  • (d) USB Method.
  • Out of all the modes to be connected to the network, the PIN method has a flaw in it.
  • In this PIN method, an attacker can brute force the PIN (guessing the PIN by some techniques) and gain unauthorized access to the network.
  • In the given case in the question, the network administrator finds that multiple unauthorized devices has gained access to the network.
  • Option (A) is correct.
  • Option (B) ARP Poisoning, (C) botnet and (D) Evil Twin attack are different and so are the wrong options.  
3 0
3 years ago
Read 2 more answers
Write a loop that continually asks the user what pets the user has until the user enters rock in which case the loop ends. It sh
mote1985 [20]

Loops are program statements that are repeated as long as the loop condition is true.

The loop in Python, where comments are used to explain each line is as follows:

#This initializes the number of pets to 0

count = 0

#This gets input for the pet name

pet = input("Pet: ")

#This is repeated until the user enters "rock"

while pet.lower() != "rock":

   #This increases the number of pets by 1

   count+=1

   #This prints the pet and the number of pets

   print("You have a",pet,"with a total of",str(count),"pet(s)")

   #This gets input for the pet name

   pet = input("Pet: ")

Read more about loops at:

brainly.com/question/19344465

6 0
2 years ago
What is the output of the following?
lys-0071 [83]

Answer: a. the number is: 14

Explanation:

i mean just try to write in 7 instead of x in the second line

then it would say the number is: ....

what is 7 times 2?

14

so the answer is a

5 0
2 years ago
If there is a circuit that is being used 36 CCS then how much of that circuit is being used in Erlang?
Mkey [24]

Answer:

A.1.

Explanation:

CCS(Centum Call Seconds) is a unit to measure the network traffic in the telecommunication circuit network.        

1 Traffic unit = 1 Erlang.      

The relation between Erlang and CCS(Centum Call Seconds) is:-

36 CCS = 1 Erlang.          

Hence the answer to this question is 1 Erlang.

5 0
3 years ago
Other questions:
  • Blogs are typically written by large companies or organizations as a way to express formal, technical, or scholarly information
    5·2 answers
  • Match the terms with their definitions.
    5·2 answers
  • Name three types of data stored on a computer’s hard disk
    11·1 answer
  • When designing your navigation, your primary objective should be to include keywords for search engines.
    6·1 answer
  • In the event you get pulled over for a traffic stop, describe the situation from the police officer's perspective and list at le
    6·2 answers
  • A store owner keeps a record of daily transactions in a text file. Each line contains three items: The invoice number, the cash
    7·1 answer
  • Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
    15·2 answers
  • Explain the paging concept and main disadvantages of pipelined
    15·1 answer
  • Please answer soon
    8·1 answer
  • What is the minimum ethernet frame size that will not be discarded by the receiver as a runt frame?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!