1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
3 years ago
11

which of the following is another term for a variable, such as cost or schedule, that limits the freedom of design, development,

or manufacture of a product?
Computers and Technology
1 answer:
Ivanshal [37]3 years ago
7 0

Answer:

constraint

Explanation:

You might be interested in
A program that is used to view websites is called a​
Nookie1986 [14]

Answer:

A web browser

examples of this would be

Bing

6 0
3 years ago
Read 2 more answers
When the system denies access to someone who is authorized it is called a - false negative?
babunello [35]
The computer declined the process for the password
5 0
4 years ago
What is Virtual Storage Configuration and Management, as well as Virtual Machine Management?
AveGali [126]

Answer:

Virtual storage configuration and management refers to the process of configuring and managing the storage resources of a virtualized environment. This typically involves creating and configuring virtual disks, assigning storage space to virtual machines, and managing the allocation of storage resources among different virtual machines.

Virtual machine management, on the other hand, refers to the process of managing the virtual machines in a virtualized environment. This typically involves creating and configuring virtual machines, installing and configuring operating systems and applications on the virtual machines, and managing the allocation of computing resources such as CPU, memory, and network bandwidth among different virtual machines.

An example of virtual storage configuration and management would be creating a virtual disk with a specified size and assigning it to a virtual machine to use as its primary storage. An example of virtual machine management would be creating a new virtual machine with a specified operating system and allocated resources, and then installing and configuring applications on it.

Both virtual storage configuration and management and virtual machine management are important tasks in a virtualized environment, as they help to ensure that the virtual machines have access to the necessary storage and computing resources to function properly. These tasks are typically performed by system administrators or other IT professionals who have expertise in virtualization and IT infrastructure management.

7 0
2 years ago
The information given to you by your teachers is always accurate and should never be questioned. Please select the best answer f
gavmur [86]

Answer:

im trying to find the answer my self :(

Explanation:

.

3 0
3 years ago
True or Flase
mel-nik [20]

Answer:

True.

Explanation:

In statement 1 we have loop-=++count;

which means loop = loop - (++count);

Where ++ is a pre increment operator which increases the value of count by 1 before using it.

In the other statement also we are doing the same thing.

Increasing the count by 1 and decreasing it from the loop variable.

Hence we conclude that the answer is True.

3 0
4 years ago
Other questions:
  • Discuss OPENGL instruction to draw the following drawing primatives:
    14·1 answer
  • In networking, what addressing type is used in sending an email to someone?
    6·1 answer
  • Design a database to keep data about college students, their academic advisors, the clubs they belong to, the moderators of the
    12·2 answers
  • Which of the following could be useful during system testing?
    6·1 answer
  • When you insert an object in a document, word always inserts it as a floating object. true or false.?
    11·1 answer
  • The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Unins
    12·1 answer
  • PLEASE HELP ME WITH THIS QUESTION:
    8·1 answer
  • PLEASE HELP ASAP
    15·1 answer
  • Josh is learning about hackers know for finding loopholes in systems, without notifying the company or organization beforehand.
    13·1 answer
  • What is the purpose of each component ?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!