1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
insens350 [35]
3 years ago
9

One shortcoming of rapid application development (RAD) is _____.

Computers and Technology
1 answer:
VladimirAG [237]3 years ago
8 0
One shortcoming of rapid application development (RAD) is a narrow focus, which might limit future development.
You might be interested in
20 points for ez question lol
slega [8]
I think it might be the third on not certain
5 0
3 years ago
Read 2 more answers
Part of an algorithm which is repeated for fixed number of times is classified as.
AleksandrR [38]

The part of an algorithm which is repeated for a fixed number of times is classified as iteration.

Iteration is basically a repeated execution of the same set of instructions in sequence until a certain condition is met.  For loop is the type of iteration in which a block of instructions repeated again and again for the fixed number of times. Upon completion of the previous iteration, the next iteration starts. The iteration process stops only when the given termination condition matches.

For example, this is the syntax of for loop:

for(initialize; condition; increment);

for (int num=0; num<5; num++)

In this for loop, iteration is carried out for 5 times, starting the value of num from 0 and repeatedly iterates with an increment of one in num until the value of num is less than 5 i.e. 4. This loop terminates once the value of num becomes 5 and, in result the condition num < 5 fails to match anymore.

Therefore, the part of an algorithm which is repeated for fixed number of times is classfied as iteration.

You can learn more about itreation at

brainly.com/question/28134937

#SPJ4

7 0
1 year ago
Every computer consists of physical components and nonphysical components. the nonphysical components of a computer that underst
IrinaVladis [17]
Physical component means Computer Hardware which you can touch and non Physical component means Software, which you can not touch. nonphysical component designed specially for physically component. like Microsoft company designed Software according the Hardware for example Microsoft windows 64 bit could not install on which 32 bit Architecture Hardware.
7 0
3 years ago
What other identifiers would you need to alter in a cloned virtual machine to be sure it was unique? What might happen if these
Romashka [77]

Answer:

Following identifiers needs to be altered in cloned VM.

  1. Changing the IP address
  2. Selecting Ethernet Ports
  3. Rename the Pointers
  4. Renaming the Second Disk Drive
  5. Host names must be unique
  6. Rename the VM name

Explanation:

When we clone the VM, we have to make sure that Cloned VM should have unique system information and network addresses in and out of guest OS.

If UUID’s of all cloned VM's are different then DHCP will get separate ip addresses for those. Suppose if the IP addresses are static or If the IP address was hardcoded then it has to be changed to new IP address manually. If this is not done then it will cause duplicate IP’s and will cause networking issues.

When Cloned VM is created then the ethernet port has to be chosen correctly to make sure that LAN networking is correct.

You should specify the disk capacity. If you choose disk capacity as single file then it will create one vmdk file. So, specify the correct disk capacity, If you did not choose the disk file as single file then you may end up having multiple .vmdk files. So in that case you need to rename the pointers of copy of vmdk files.

Rename the Second Disk Drive. For example : You may find two VM files with VM Copy.vmdk, So you have to rename second disk to VM Copy-1.vmdk or any other name.

The cloned VM copies the parent virtual machine and it also includes the VM name. To avoid problems caused by having VM's with duplicate names on the network, give the VM in the cloned VM a unique name.

You have to make sure that hostnames are different as well. Hostname resolution will lead to conflict if its same on both VM's.

7 0
4 years ago
The Universal Containers research lab is publishing its latest research into knowledge articles assigned to the data category "C
Olenka [21]

Answer:

Option C is correct.

Explanation:

The following research laboratory publishes their new work concerning articles of information allocated to the better standards container classification of information. The community manager needs to ensure all of those posts appear across the Tips and Methods subject field for Community users.

Thus, set up an automatic subject assignment and map the list of Tips and Techniques to the Container good practices group.

8 0
3 years ago
Other questions:
  • Which is considered to be the oldest form of social media? A. media-sharing sites B. location-based services C. social networkin
    5·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • The web server administrator at your e-commerce company is concerned about someone using netcat to connect to the company web se
    11·1 answer
  • A communication medium that carries a large amount of data at a fast speed is called
    6·1 answer
  • You must signal ___ before any turn or lance change ?
    9·2 answers
  • What is the primary purpose of the destination address?
    9·1 answer
  • How to get someone off your best friends list without blocking them
    8·1 answer
  • What is the encoding technique called that is used to store negative numbers in the computer's memory
    10·1 answer
  • 10. Site-to-Site VPN architecture is also known as
    6·1 answer
  • What are the two protocols used most often with iot devices? (select two. )
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!