1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
6

When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation

s. This is an example of A. robust design. B. environmentally friendly design. C. modular design. D. CAD.
Computers and Technology
1 answer:
patriot [66]3 years ago
6 0

Answer:

C. modular design

Explanation:

Based on the information provided it can be said that in this scenario being able to choose the style that you want is an example of a modular design. A modular design refers to when something is divided into various parts called modules that can be independently chosen and/or exchanged in order to create a customized object. Which is exactly what is allowed in this scenario when ordering a new zagflatz.

You might be interested in
9. These particular machines can be decentralized.
shusha [124]

Answer:

A, B

Explanation:

Because the desktop computer and the printers are decentralized, they're connected with another noce in a company.. So I suppose that the Risograph and photocopier isn't decentralized.

4 0
2 years ago
What is the purpose of the Excel Function Reference?
Citrus2011 [14]

Answer:

To look up functions and their purposes

Explanation:

Edg

3 0
3 years ago
Which devices typically generate computer output ?
Andrews [41]
Monitor , printer , speaker , projector , keyboard etc
6 0
3 years ago
Read 2 more answers
What is an allocation unit?
sdas [7]
It is a unit of disk space allocation for files and directories. Hope this helps :) 
5 0
3 years ago
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
3 years ago
Other questions:
  • Zara is designing a slide with a numbered label on a picture. She wants the number to appear when the she presses a button on th
    11·2 answers
  • The most widely used presentation software program is Microsoft PowerPoint. You can produce a professional and memorable present
    5·1 answer
  • An app where you spin a wheel for coins and exchange for giftcards
    6·1 answer
  • Please conduct some research and find an article on Security Threats and please provide link of the article.
    5·1 answer
  • The person who can give a short defination of subroutine will get the brainliest.
    9·1 answer
  • Dallas is an analyst at an online retailer. He is great at creating representative diagrams showing the relationships between cu
    12·1 answer
  • Write a C++ program that would take 10 integers and outputs mean, median, and range. Create at least three functions: one for so
    7·1 answer
  • Which one is the right code
    10·1 answer
  • A customer is looking for a storage archival solution for 1,000 TB of data. The customer requires that the solution be durable a
    9·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!