1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
insens350 [35]
3 years ago
9

One shortcoming of rapid application development (RAD) is _____.

Computers and Technology
1 answer:
VladimirAG [237]3 years ago
8 0
One shortcoming of rapid application development (RAD) is a narrow focus, which might limit future development.
You might be interested in
Why are there problems with patching electronics such as heart rate monitors and MRI machines that run embedded Windows OSs?
timofeeve [1]

Answer:

The various problems with patching electronics such as heart rate monitors and MRI machines that run embedded Windows OSs is that they have a certification which is usually at a specific revision level.

Another issue is that probably the maker or the manufacturer didn’t provide the patch method which would have been used to fix such electronics.

8 0
3 years ago
And this also please. help​
gregori [183]

Answer:

1. Scanner = reading passports.

2. Barcode reader = automatic stock control.

3. pH sensor = monitor soil in a greenhouse.

4. Microphone = voice recognition.

Explanation:

1. Scanner: Copies paper documents and converts the text and pictures into a computer-readable form. Therefore, it can be used for reading passports.

2. Barcode reader: reads labels containing parallel dark and light lines using laser light or LEDs; the width of each line represents a binary code. Therefore, it is used for automatic stock control.

3. pH sensor: detect changes in acidity levels; data is often in analogue form. Thus, it is typically used to monitor soil in a greenhouse.

4. Microphone: allows audio signals to be converted into electric signals; these can be interpreted by a computer after being converted into digital form. Microphones are used for voice recognition.

5 0
3 years ago
____ is a consistent relational database state in which every foreign key value also exists as a primary key value.​ a. ​ Refere
maria [59]

Answer:

The correct answer is Option A (Referential integrity)

Explanation:

When a relational database table is in ​first normal form, that means it has no repeating fields or groups of fields, and hence all rows have the same columns, while if a relational database table is in second normal form, it implies that every non-key field is functionally dependent on the primary key. If can be in the third normal form if no non-key field is functionally dependent on any other non-key field.​

A relational database on its own is a universal approved database model whose data is stored in tables divided into records and fields that serve as an information unit that organizes data points for easy access.

In the relational database, foreign keys are being checked to reference the primary key and enforce referential integrity so as to ensure that the foreign key must have a matching primary key. It means the reference from a row in one table to another table must be valid. Referential integrity concerns the concept of a foreign key normally enforced by the database management system.

4 0
3 years ago
EASY QUESTIONS! 10 POINTS AND BRAINLIEST FOR BEST ANSWER! PLEASE HELP ANSWER THIS only if you know BOTH ANSWERS!
Illusion [34]

Answer:

chain also why would some knock on their own dang door lol

Explanation:

it's easy indeed

8 0
4 years ago
Read 2 more answers
__________ is the brain of a computer.<br><br> A. Hardware<br> B. CPU<br> C. Memory<br> D. Disk
iren [92.7K]

Answer:

The CPU is the brain of a computer

8 0
3 years ago
Read 2 more answers
Other questions:
  • Maggie is preparing a document.she wants to open the help menu to sort out a formatting problem.which key should she press to op
    15·2 answers
  •   Why does a shaded-pole motor run at a constant speed?  A. The lines of force do not change direction.  B. The current through
    15·1 answer
  • Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were se
    7·1 answer
  • Which feature of a presentation program’s interface provides a list of commands to create, format, and edit presentations?
    14·2 answers
  • What company uses the most storage?
    15·1 answer
  • What happens when the data in an investigation does not support the original hypothesis? The scientist gives up and starts an in
    10·2 answers
  • An example of hardware is a(n) _____.
    9·2 answers
  • How many of yall are willing too sub to my channel called "Space Juice" with around 200 subs?!​
    6·1 answer
  • How do you refer particular cell?<br>​
    12·1 answer
  • URGENT! Drag the tiles to the correct boxes to complete the pairs.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!