_____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

A. Accessibility
B. Relationship
C. Feasibility
D. Performance


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following statements will set a ListView control, puppyListView, to be 300 pixels high and 200 pixels wide?

a. puppyListView.setSize(200, 300); b. puppyListView.setSize(300, 200); c. puppyListView.setPrefSize(200, 300); d. puppyListView.setPrefSize(300, 200);

Computer Science & Information Technology

Which of the following is a way to initialize an array with PHP?

a. use the array function b. just declare array elements c. use the array_name() function d. all of the above are acceptable e.only (a) and (c) are acceptable f. only (b) and (c) are acceptable g. only (a) and (b) are acceptable

Computer Science & Information Technology

What is the name for the most recent and more nefarious form of social engineering tactics?

A. Denial of Service B. phishing C. smurf attack D. zombie

Computer Science & Information Technology

Define the term black box, and explain why it is an important concept in object-oriented analysis. Can you think of other black boxes that you use in everyday life?

What will be an ideal response?

Computer Science & Information Technology