1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
11

Jessie has received a contract to build a real-time application for a baker. However, the baker doesn't want to invest too much

money. His only requirement is that he wants the customers to know which cupcakes are available at what time and in what quantity. So his core requirement is that the details of product should be in real time. What platform can Jessie use to develop this application?
A.
Polymer
B.
Gulp
C.
Meteor JS
D.
Ionic Framework
Computers and Technology
2 answers:
AleksandrR [38]3 years ago
8 0

Answer:

D. Ionic framework

Explanation:

Out of all mentioned above, the best for developing the progressive app is certainly the Ionic. This is because it is an open-source, hybrid mobile app, cross-platform, and comes with the services and tools that are required for developing the app using web technologies like HTML5, Sass, and CSS. And Ionic happens to be the cheapest of all the framework mentioned above. Hence, it is the correct option. You can load your app on almost all the major app stores, and this is the biggest advantage with Ionic.

Andrei [34K]3 years ago
8 0

Answer:

The answer is ionic framework

Explanation:

This type of software if very cheap and doesnt cost to much money to buy.

You might be interested in
The primary reason for the creation of the Federal Reserve System LOADING... ​was: A. to create a single central bank similar to
Gelneren [198K]

Answer: (C) to reduce or eliminate future bank panics.

Explanation:

The Federal Reserve System being the central reserve system in the US was created with the primary objective of reducing and eliminating bank panics in periods of recessions and depressions and other bank related matters.

3 0
3 years ago
Which ics function records time accounting and procures needed items?
vladimir1956 [14]
It is the finance / administration function that records time accounting and procures the needed items
7 0
3 years ago
Write a line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values.
Valentin [98]

Answer:

A line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values. Separate each item with 1 space, and end the line with a semi-colon.

Here,

const int MAX = 25;

7 0
2 years ago
Which of the following is NOT correct concerning database design?
Alborosie

1 is not correct.

Hope this helps!

5 0
3 years ago
Is MOOC's potentially harmful to copyright? Why or why not ?
vladimir2022 [97]

Answer:

Fair-use exceptions to traditional copyright protection face challenges as well, given a MOOC's potential for global reach. Nonetheless, fair use and MOOCs are not mutually exclusive ideas. MOOCs remain an experiment...

5 0
3 years ago
Other questions:
  • The operation of the waste spark Ignition system is being discussed. technician a says that the spark that occurs on the exhaust
    14·1 answer
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • With a _____ network connection, the computers and other devices on the network are physically connected via cabling to the netw
    10·2 answers
  • How many electrons are there in an atom of carbon? A. Four B. Eight C. Six D. One
    15·2 answers
  • Difference between entropy and enthalpy is
    9·1 answer
  • Interactive television with video-on-demand capabilities changes how people watch television and how consumers access the Intern
    8·1 answer
  • Which of these personal protective equipment items prevents injury from falling objects ?
    15·1 answer
  • How do you change your name on brainly after you have made an account​
    5·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • 30 POINTS FOR THE ANSWER
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!