1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
3 years ago
11

Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because: Gr

oup of answer choices
A. they can skip whole segments of the software development process.

B. the open source nature of the products ensures they don't have to conduct debugging tests.

C. open source products have lower product lifecycles.

D. the large number of people who look at the code help speed up product development.

E. open source software programming is based on simpler code than commercial products.
Computers and Technology
1 answer:
tamaranim1 [39]3 years ago
6 0

Answer:

A.  they can skip whole segments of the software development process.

Explanation:

A software development process refers to the process of dividing software development work into various phases for product management, project management and to improve the design.

Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because they can skip whole segments of the software development process.

They don't have to go through different phases of software development.

You might be interested in
Which of these completes the sentence? People interpret information ___________. Choose one.
evablogger [386]

Explanation:

mannejaondpsbma0jdjdhdj

5 0
3 years ago
Read 2 more answers
Which type of partitioning is performed onRelation-X?
goldenfox [79]

Answer: B) Vertical Partitioning

Explanation:

As, vertical partitioning is performed on Relation X, it is used for dividing the relation X vertically in columns and it involves creation of tables and columns. They also use some additional tables to store left out columns. We cannot partition the column without perform any modification of value of the column. It only relies on keeping the particular attributes of relation X.

7 0
3 years ago
Why star topology is more reliable than bus or ring topologies
Valentin [98]

Answer:

<h3><em><u>simple </u></em><em><u>ans</u></em></h3>

Explanation:

<h2><em><u>it </u></em><em><u>is </u></em><em><u>because </u></em><em><u>as </u></em><em><u>it </u></em><em><u>has </u></em><em><u>server </u></em><em><u>computer </u></em><em><u>and </u></em><em><u>no </u></em><em><u>one </u></em><em><u>are </u></em><em><u>free </u></em><em><u>as </u></em><em><u>other </u></em><em><u>topology </u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em></h2>

<h2><em><u>client </u></em><em><u>computer </u></em><em><u>should </u></em><em><u>ask </u></em><em><u>server </u></em><em><u>to </u></em><em><u>share </u></em><em><u>any </u></em><em><u>information </u></em><em><u>ideas </u></em><em><u>etc.</u></em></h2>

<em><u>this </u></em><em><u>much.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em>

<h2><em><u>follow</u></em></h2>
8 0
2 years ago
Read 2 more answers
When would it be beneficial to make a copy of a document
aksik [14]

Answer:

When you need to keep the original document or send the document to multiple people.

Explanation:

If you need to keep the original document (eg. marriage documents or birth certificate or something important), you would make a copy of it (unless you are sending it to a lawyer or a government agency).

If you, for instance, have a memo for your company that all your employees need to read, you would copy the document so you would be able to print it and send it to everyone without passing the document one at a time.

3 0
3 years ago
Which ipsec component is software that handles the tasks of encrypting, authenticating, decrypting, and checking packets?
ad-work [718]
The ipsec component software that handles the tasks of encrypting, authenticating, decrypting, and checking packets is called IKE.  It is short for Internet Key Exchange.  It is <span>a network security Protocol aimed to allow two devices to actively exchange Encryption Keys and negotiate Security Associations </span>
8 0
3 years ago
Other questions:
  • A server-side extension ________________. provides its services to the web server in a way that is totally transparent to the cl
    13·1 answer
  • Which organizational pattern would probably be most effective for arranging the main points of a speech with the specific purpos
    15·1 answer
  • Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Sto
    9·1 answer
  • I want to know why almost every single "expert answer verified" thing I come across is wrong. If it's wrong, why the h is it exp
    8·2 answers
  • What conversion factor should be used to convert from meters to Gigameters?
    7·1 answer
  • Consider a Games Expo for Children. Six competitions are laid out for the expo. Tickets are sold according to the age and gender
    11·1 answer
  • Participants in open _________ community projects get experience and make connections with other professionals that can be valua
    6·1 answer
  • Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program h
    12·1 answer
  • This is your code. &gt;&gt;&gt; A = ['dog''red'] &gt;&gt;&gt; B = [' cat', 'blue']&gt;&gt;&gt;C = ['fish', 'green'] You can impl
    10·2 answers
  • What is are the most efficient ways to make a slide presentation?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!