1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
3 years ago
11

Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because: Gr

oup of answer choices
A. they can skip whole segments of the software development process.

B. the open source nature of the products ensures they don't have to conduct debugging tests.

C. open source products have lower product lifecycles.

D. the large number of people who look at the code help speed up product development.

E. open source software programming is based on simpler code than commercial products.
Computers and Technology
1 answer:
tamaranim1 [39]3 years ago
6 0

Answer:

A.  they can skip whole segments of the software development process.

Explanation:

A software development process refers to the process of dividing software development work into various phases for product management, project management and to improve the design.

Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because they can skip whole segments of the software development process.

They don't have to go through different phases of software development.

You might be interested in
Select the correct answer.
storchak [24]

Answer:

B. Planning

Explanation:

I believe the developer establishes the project goals in the planning phase.

6 0
4 years ago
Which feature of vitualization helps increase the IT productivity of a business?
laila [671]
A the answer is yes
7 0
3 years ago
Consider a relation about people in the United States, including their name, Social Security number, street address, city, state
andreyandreev [35.5K]

Answer:

For constructing relational schema, consider the relation as:

Data Attributes for USPeople: name, Social Security number (SSN), street address, city, state,

ZIP code, area code, phone number

1. Functional Dependency (FD):

A functional dependency (FD) is a relationship between the primary key and non-key attributes of  the relation. For finding FD, we need to know about the primary key (PK) which should be unique.

Social Security number (SSN) is the only attribute that holds unique value for relation. R, attribute for any relation Y is functionally dependent on attribute X (usually the PK), if for every  valid instance of X, that value of X uniquely determines the value of Y.

Social Security number (PK) ->;name, street address, city, state, ZIP code, area code, phone  number

2. keys for the relation

Primary key = Social Security Number (PK)

Foreign key = Area code

In the normalization process, we can separate address table (street address, city, state, ZIP  code, area code)

Can an area code straddle two states?

Yes, it can straddle between two states; it might be in cities/regions that “lie” across two states.  For example, Kansas City is in Missouri and Kansas. A lot of people share the same area code.

Can a ZIP code straddle two area codes?

Yes, it can straddle between two states; it might be in cities/regions that “lie” across two states.

Can same Social Security number is allotted to two people?

NO, everyone has a unique SSN number.

Can peoples living together have the same address or phone number?

Yes, people living in the same house share addresses or phone numbers.

4 0
3 years ago
Where would you go to change the macro settings in a Word document? Click the File tab and open Protection. Click the File tab a
yawa3891 [41]

Answer:

Click the File tab, select Options, and open the Trust Center.

Explanation:

7 0
3 years ago
Previously, our password was 8 characters and included only lower-case letters. Now, because of changing requirements, we genera
BARSIC [14]

Answer:

7 characters.

Explanation:

Here we have 26(small letters)+26(capital letters)+10(number from 0-9)=62

As we are having more number of possibilities for each character of the password, We will need a smaller length to reach the same or better level of security.

If we take 6 characters long password we will have 626 = 56,800,235,584‬ possibilities, which is less secure than the previous 8 characters long password.

But if we take 7 characters long password we will have 627 = 3,521,614,606,208 possibilities, which is almost 17 times larger than the previous password and has a smaller length when compared to the previous password.

3 0
3 years ago
Other questions:
  • Janelle is organizing an outline for an investigative report about the benefits of taking a 30-minute walk each day. which of th
    11·2 answers
  • When you first turn on a computer and you don’t hear a spinning drive or fan or see indicator lights, is the problem hardware or
    13·1 answer
  • Robert brought 10 shares apex company for $18 each and later sold all of them at $17 each. This transaction resulted in what typ
    8·2 answers
  • Pierre received an urgent email appearing to come from his boss asking him to respond quickly to the email with the company cred
    10·1 answer
  • Does Android have text-to-voice?
    11·1 answer
  • What are the computer/electronic needs<br> that drive our economy today?
    13·1 answer
  • When measuring processor speed,a megahertz is much faster than a gigahertz.true or fals
    12·1 answer
  • Chris is working with other employees on a worksheet. The other employees have made comments, but they are not visible.
    11·1 answer
  • windows 93 it is a website THE QUESTION IS WHAT IS THE FIRST THING THAT POPS UP WHEN YOU OPEN THE WEBSITE?
    8·1 answer
  • alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activit
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!