1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
9

HELP PLEASE!!!! If you are continually building, reviewing, correcting a model of your system, and incrementally adding to the s

ystem each time, which type of prototyping are you experiencing?
evolutionary with high fidelity
throwaway with high fidelity
evolutionary with low fidelity
throwaway with low fidelity
Computers and Technology
1 answer:
Novosadov [1.4K]3 years ago
6 0

Answer: evolutionary with high fidelity

Explanation:

You are trying to improve the model so that it is able to match any problem. This is evolutionary.

At the same time the model seems to be close to being finalised with all the improvements being made. It is past the design stage and so must be a high fidelity prototype.

You might be interested in
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users c
motikmotik

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

5 0
3 years ago
Consider the following statements. An abstract class is better than an interface when the variables in the abstract class or int
Ksivusya [100]
Well the nonchalant question given for 4th grade red named babyface Justin and Jerome
4 0
3 years ago
While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
Paraphin [41]

Answer:

The question is incomplete.The full question with options is rewritten below:

"While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss.  

Which of the following is the next step the technician should take in troubleshooting this issue?  

A. Contact the ISP, inform the provider of the issue, and ask the provider to check the server.

B. Verify the server has a valid assigned IP address on the LAN subnet.

C. Escalate the problem to a server administrator to check for issues with the server.

D. Check the workstations on the LAN for APIPA configuration."

The answer is option (C): <em>Escalate the problem to a server administrator to check for issues with the server</em>

Explanation:

Being a Support Technician, you may not be able to determine the main issue with the mail server but may need to escalate further to the next category of individual that will confirm the issue with the mail server, in this case the server administrator as he may have higher access into the server at the back end or may directly liaise with the Private ISP.

7 0
3 years ago
Modify the FitnessTracker class, created in Chapter 4 Programming Exercise 3AB, so that the default constructor calls the three-
Ivenika [448]

Answer:

Is this coding?

Explanation:

5 0
3 years ago
What is the protocol used for the majority of network/internet traffic?
mash [69]
This is rather ambiguous, but in this day an age, it has to be the "internet protocol" (IP). 
7 0
3 years ago
Other questions:
  • To create a digital file from an old photo, I would use a _____.
    10·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • In this exercise, use the following variables : i,lo, hi, and result. Assume that lo and hi each are associated with an int and
    9·1 answer
  • Assume that a 5 element array of type string named boroughs has been declared and initialized. Write the code necessary to switc
    5·1 answer
  • Security Definition updates for windows defender are performed through the ——— function in windows server 2016
    7·2 answers
  • My pc suddenly freezes and i can't open any apps or task manager. Apps do not open at all and if i restart from the start it get
    9·1 answer
  • Can an SQL function return multiple values? No answer needed, take the points.
    12·1 answer
  • Besides your computer, where else can you find and use an operating system?
    11·1 answer
  • What is not one of the top health concerns in the United States?physical activitymental healthtobacco useaccess to education
    8·1 answer
  • 16. A/An __________ is operated on the principle that the dying have special needs and wants that hospital personnel are too bus
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!