1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
4 years ago
11

Jessie has received a contract to build a real-time application for a baker. However, the baker doesn't want to invest too much

money. His only requirement is that he wants the customers to know which cupcakes are available at what time and in what quantity. So his core requirement is that the details of product should be in real time. What platform can Jessie use to develop this application?
A.
Polymer
B.
Gulp
C.
Meteor JS
D.
Ionic Framework
Computers and Technology
2 answers:
AleksandrR [38]4 years ago
8 0

Answer:

D. Ionic framework

Explanation:

Out of all mentioned above, the best for developing the progressive app is certainly the Ionic. This is because it is an open-source, hybrid mobile app, cross-platform, and comes with the services and tools that are required for developing the app using web technologies like HTML5, Sass, and CSS. And Ionic happens to be the cheapest of all the framework mentioned above. Hence, it is the correct option. You can load your app on almost all the major app stores, and this is the biggest advantage with Ionic.

Andrei [34K]4 years ago
8 0

Answer:

The answer is ionic framework

Explanation:

This type of software if very cheap and doesnt cost to much money to buy.

You might be interested in
Describe two measures you can use to evaluate whether an attachment in a message is reliable to open.
meriva
<span>If a attachment is not reliable to open, terrible effects can happen, peradventure it may have a virus or even malware that can destroy a computers software. 

To avoid this and stay on the safe side, try the following:-

- Open it in protected view 
- Do not save the attachment on your computer 
- Look at the author and read the message carefully to make sure it is not biased. 
- Open it on a flash-drive </span>
8 0
3 years ago
Read 2 more answers
What is TRUE about the following array?
mr Goodwill [35]
<span>d. someVals[1] has the value of 4</span>
3 0
4 years ago
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
In programming languages, ____ is used as a mnemonic representation for the program instruction’s memory address.
Alecsey [184]

Answer:

Assembly language

Explanation:

Assembly language writes instructions in human letters. Every machine language instruction has a corresponding assembly language instruction that means exactly the same thing. Assembly language uses a symbolic form of a program which are capable of:

- readable by human beings (+/-)

- constants, addresses, and names of symbolic instructions

- arithmetic during assembly - calculations of addresses, constants

- synthetic instructions (not supported by our assembler)

- expansion of macroinstructions (not supported by our

assembler)

- assembly instructions (pseudo-instructions)

• memory allocation

• memory initialization

• conditional assembly (not supported by our assembler)

3 0
3 years ago
State 10 differences between video conferencing and teleconferencing​
mr_godi [17]
Answer:
Teleconferencing is voice-only or audio and video communication, while video conferencing supports the conference by providing both video and voice, so you can fully see the person when you are listening to the communicator,

Teleconferencing is capable of transmitting the data during the conference, either using traditional PBX systems or VoIP, while video conferencing offers VoIP services. The formal requires less bandwidth, while the latter is highly dependent on network bandwidth.


6 0
2 years ago
Other questions:
  • You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?
    5·1 answer
  • Which of the following is NOT true of input validation?
    7·1 answer
  • An example of live footage is when?
    10·2 answers
  • Plz answer me will mark as brainliest​
    6·1 answer
  • Use the Bisection Method to find the root 2. Write a main program and a function program 3. Main Program a. define constants b.
    9·1 answer
  • Judy forgot where she saved a certain file on her computer. Therefore, she searches for all files with a .jpg file extension. Wh
    7·2 answers
  • The paint 3D program is used for drawing picture true or false​
    10·2 answers
  • Who is Mr.Anonymous?
    5·2 answers
  • The space between the margin<br> and start<br> of paragraph is called
    8·1 answer
  • Https://www.canva.com/design/DAEdipB8WJ4/etwBH9c1cMBNIaThAaOUqg/view?utm_content=DAEdipB8WJ4&amp;utm_campaign=designshare&amp;ut
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!