Software whose code is made freely available to others for use, augmentation, and resale is referred to as:

Answers

Answer 1

Answer:

Open Source Software

Explanation:


Related Questions

What type of access controls allow the owner of a file to grant other users access to it using an access control list

Answers

Answer:

Discretionary Access Control

Explanation:

The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control.

What is discretionary access control?

This is known to be a type of control that gives one a specific amount of access control to the use of the object's owner, or any other person.

Note that The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control as it only gives a little access.

Learn more about Discretionary Access from

https://brainly.com/question/20038736

#SPJ2

To break a text string into several lines, which means that the text string continues on the next line, the _____ character should be used.

Answers

Answer:

To break a text string into several lines, which means that the text string continues on the next line, the backslash character should be used.

Michelle wants to define the scope of a software development project for the benefit of her company. How does defining the scope of a

software development project help a company?


A It helps communicate effectively with the client

B. It helps deliver a project as per the client's requirements.

C It helps prepare a legal agreement

D. It helps decide the project budget

Answers

Answer:

im pretty sure its A

Explanation:

it makes more sense

Answer:

It helps deliver a project as per the client’s requirements.

Trust me... I took the test

a virtual network of websites connected by hyperlinks is called

Answers

Answer:

it is called the World wide Web

We want to simulate constantly flipping a coin until we get 3 heads in a row. What kind of loop should we use

Answers

There are different types of loops that are used in computer programming. The kind of of loop that is suitable is the

while loop.

In computer programming languages, a while loop is simply known to be a control flow statement that gives code to be executed everytime based on a given Boolean condition.

The while loop can simply be said to be a repeating if statement.

It used to repeat a particular block of code in any number of times, until a said point or condition is met.

When used in C programming, it often in repeated manner executes a target statement.

Learn more from

https://brainly.com/question/21298406


Who plays a role in the financial activities of a company?

Answers

The chief financial officer

using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack

(NOT A AND B) AND (NOT A AND NOT C) OR (B AND C) logic Gates
draw the logic circuit​

Answers

answer:

((!A && B) && (!A && !C) || (B && C))

I hope the drawing is clear enough.

How to edit an existing recipient list? class 9 for(3 marks)​

Answers

Answer:

(Archives) Microsoft Word 2003: Mail Merge: Working with the Recipient List

Last updated Monday, Aug. 31, 2020, at 10:35 a.m.

This article is based on legacy software.

For a successful Mail Merge, you will need to establish a recipient list, also referred to as the data source. This contains the information that will vary with each record, such as names or identification numbers. If you are creating a mailing list, for example, names and addresses will be included in your data source.

You can either create a new data source or use a pre-existing source, such as your Outlook Contacts. You may also wish to alter the entries in your data source without having to open it, change the appropriate entries, and then save the changes. Mail Merge allows you to specify which individual entries you want to include as well as add and delete data document entries and fields.

Creating a New Data Source

Before creating the data document, take a moment to plan out the information you want to include. While creating your data document, you can add or remove fields to tailor the document to suit your needs. Creating a new data source is an option in the third step of the Mail Merge Wizard.

Anote los tipos de direcciones de IP que existen.​

Answers

Answer:

ENGLISH PLEASE.

Explanation:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in _____ for file servers.

Answers

Answer:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in high-volume data storage for file servers.

The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

Answers

Answer:

The term spyware refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.

Answers

Answer:

C) A company's website

Explanation:

is invalid in the select list because it is not contained in either an aggregate function or the group by clause.

Answers

Answer:

Column

Explanation:

What is Acronyms in Design and Technology?

Answers

Answer:

In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In the design and technologies curriculum, students create quality designed solutions across a range of technologies contexts. Students consider the economic, environmental and social impacts of technological change and how the choice and use of technologies may contribute to a sustainable future.In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In the design and technologies curriculum, students create quality designed solutions across a range of technologies contexts. Students consider the economic, environmental and social impacts of technological change and how the choice and use of technologies may contribute to a sustainable future.Students also take into account the ethical, legal, aesthetic and functional factors that inform the design processes.

Explanation:

Hope its help

how are digital computer classified on different types​

Answers

Answer: we can sub-categorize digital computers as General Purpose Computer & Special Purpose Computer.

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat

Answers

Answer:

Evil Twins Attack

Explanation:

When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.

A file contains 5000 bytes. Calculate the size of the file in kilobytes.
Your answer must be to one decimal place

You should show your working.

Answers

Answer:

5 Kilobytes

Explanation:

5000 bytes ÷ 1000 = 5 kilobytes

3
Select the correct answer.
Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use to
present the model at a board meeting?

Answers

Answer:

he can use microosoft word, gooogle docs/slides, or any old tech because it will present from any

Explanation:

How do you create a website​

Answers

Well, you would need a website builder program. Such as WordPress, Web.com, Gator Builder, and dozens of more. After you have the base and the look, depending on the program you would need to do some scripting.

Scripting may sound easy but depending on the language it takes some time to learn.

Or you could hire someone, you know that works too

what is a drone satellite?​

Answers

Answer:

A satellite that can be controlled where to go.

Explanation:

How do people get in your computer

Answers

Answer:

????

Explanation:

This is absurd, you cannot enter your computer. it is to tiny for you to fit in.

Answer:

Explanation:

I don’t know

State one technique for overcoming external fragmentation in dynamic partitioning. Why is this technique of overcoming external fragmentation considered inefficient

Answers

Compaction often gives solutions to the issues regarding external fragmentation.

One technique for overcoming external fragmentation in dynamic partitioning is

Compaction.

The reason why this technique of overcoming external fragmentation may be inefficient is because:

External fragmentation may need a lot of compaction and it is an expensive operation.

The use of contiguous allocation is often hard to fit processes into memory and also it is so difficult to grow or shrink the amount of memory allocated to a process.

Compaction only takes place when relocation is dynamic, and this also is expensive.

Compaction often shuffle memory notes or contents and then put or pile them up all in free memory and in one large block.

External fragmentation takes place when free memory is removed into small blocks.

Learn more from

https://brainly.com/question/23636593

Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders

Answers

Change the perms to be you not trustedinstaler

Raina remembered when she taught Amara to draw. What happened?

Answers

Sisters is an autobiographical graphic novel written by Raina Telgemeier as a follow-up to her earlier graphic memoir Smile. It details a long summer road trip taken from San Francisco to Colorado by her family and explores the relationship between Raina and her younger sister, Amara.

- BRAINLIEST answerer

Which Windows Server 2016 core technology provides a single interface for installing, configuring, and removing a variety of server roles and features on your Windows server

Answers

Answer:

Server manager

Explanation:

You need to replace the motherboard on a laptop. Which two items should you disconnect or remove first

Answers

Your motherboard should now be freely floating in your case—pull it out. With the old motherboard free, you'll need to remove its CPU cooler, CPU, and RAM so you can install it into your new motherboard.

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

what is not an example of a changing operating space?

Answers

What is not an example of a changing operating space? A parking garage. Riley is driving down the highway when the road starts curving to the right.

Parking in garage is not an example of a changing operating space.

What is operating space?

When an operating space is said to be "changing," it usually means that the environment around your car is deteriorating or switching from an open to a closed state.

Operational Spaces are the space(s) inside the Facilities from which the Concessionaire shall have the right, privilege, and obligation to continuously and for the duration of the Term operate its concession in accordance with the terms and conditions of this Agreement.

Distractions while driving, such as texting and using a phone, driving dangerously, such as going too fast or following too closely.

Driving when intoxicated. While drinking and driving is not especially high among novices, it produces a disproportionate number of fatal crashes.

Thus, parking garage is the answer.

For more details regarding operating space, visit:

https://brainly.com/question/9339555

#SPJ6

What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;

Answers

Answer:

The output of count would be 1.

Explanation:

The first if statement is true. Since 10 > 5

The second if statement is true. Since 20 > 5

So,

count ++;  // That increments the variable count by 1

the else statement is not provoked since the if statements were correct.

Other Questions
Can you help please? The nurse is assessing a client who is experiencing pain. The nurse notes the client is experiencing acute rather than chronic pain when the client makes which statement On average, people spend about _____ minutes per day on apps that do not make them feel good such as apps for dating, social networking, gaming, entertainment, news, and web browsing . What enzyme catalyzes the conversion of carbon dioxide and water to carbonic acid, and where is this enzyme located What are the two ways that harmful algal blooms can negatively impact an ecosystem? (Site 1). The method of substitution is likely the best method for which system?8x2y=18x2y=52x+y=103x+2y=55x2y=32x+2y=13x+2y=93x5y=4 A superhero video game uses 6 coins. An airplane game uses twice as many coins as the superhero game. How many coins does the airplane game use? Complete the bar model, comparison, and equation to solve. Read the quoted speech. Then complete the sentences in reported speech. i need it asapp plss Helppppp Pleaseeeeeee How have the pandemic affect your lifestyle and job? Can someone help me please? pls help ill give brainliest Match the Tools with the name of the tool.Toolbar OptionsQuestion 1 options:Increase IndentLine SpacingDecrease IndentJustify TextBullet PointsCenter Text1234. 56 pregnant women, who use tobacco products can cause which health effect in their baby? An item is regularly priced at $35 It is on sale for 40% off the regular price. How much (in dollars) is discounted from the regular price? Find the least common multiple of: 2v^2y^7 and 11v^4y^8x^3 What is an equation for the perpendicular bisector of the line segment joining (1,2) and (-5,12)? Write your equation in point-slope form, standard form, or slope-intercept form. What effect will most likely result from a combination of drug abuse and unprotected sex with different partners?increased risk of developing a sexually transmitted infectiondecreased chance of developing cervical cancerdecreased risk of developing HIV infectionincreased risk of unplanned pregnancy Can someone help? This is so hard.