What is open source software​

Answers

Answer 1

Answer:

Open Source Software

Explanation:

Open-source software is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. Open-source software may be developed in a collaborative public manner.

Answer 2

Answer:

open so software is an computer software that is reliance in which copyright holding reference uses the rights use study change and disturb this software and it so scold to anyone for any propose also open source software maybe diplobed in collaborative public manner

Explanation:

helpful


Related Questions

Starting in 2024 under a new law, all new smartphones sold in the eu must have….

Answers

Answer:

USB type C cables.

Explanation:

Which two devices are examples of endpoints susceptible to malware-related attacks? (choose two. )

Answers

A server and desktop are examples of endpoints susceptible to malware-related attacks.

Malware

A malware (short for “malicious software”) is a term used to describe any piece of file or code that is deliberately transmitted by an attacker or attackers with the aim of infecting, controlling or stealing data over a computer network.

It is recognized by IT professionals that computer servers and desktop devices are susceptible targets of malware attacks, hence, it is often encouraged certain measures are in place to prevent an attack or reduce the damage one may cause.

You can learn more about malware-related attacks here https://brainly.com/question/22185332

#SPJ12

write the icon of full justification​

Answers

Answer:

In the paragraph group, click the Dialog box Launcher. ,and select the Alignment drop - down menu to set your justified text. You can also use the keyboard shortcut , Ctrl + J to justify your text

A user wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page. What setting should the user enable on the printer for this print job to achieve this result

Answers

A user who wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page should check the portrait orientation check box.

What is a Spreadsheet?

A spreadsheet is basically a term used to describe any computer application that is used to compute, organize, analyse and store data in tabular form.

Spreadsheets applications play a crucial role today as they help to make the work of educators more efficient. The next time you come across data presented in a tabular form, do remember it was likely made possible by a spreadsheet application.

You can learn about spreadsheets here https://brainly.com/question/26919847

#SPJ1

what is one of the key components of a typical formula?

Answers

A formula key components are:

FunctionsReferencesOperatorsConstants.

What is a formula?

This is known to be a kind of mathematical relationship or rule that is said to be expressed in form of symbols.

Note that function is the association between a set of inputs that is said to have one output and all function do contain a domain and range.

Therefore, A formula key components are:

FunctionsReferencesOperatorsConstants.

Learn more about formula from

https://brainly.com/question/2005046

#SPJ11

You hide three worksheets in a workbook and need to unhide them. What is an accurate statement about this process?

Answers

The  accurate statement about this process is that "The person must unhide each worksheet separately".

How do you unhide multiple sheets in Excel?

To unhide multiple sheets, one can:

Right-click the Sheet tab at the bottom, and then click on  Unhide. Then also click all together the Shift + Up/Down Arrow keys to click multiple (or all) worksheets, and then click OK.

Note that The  accurate statement about this process is that "The person must unhide each worksheet separately".

Learn more about worksheets  from

https://brainly.com/question/25130975

#SPJ12

Cloud architecture has unlimited __________. Select one: a. Sustainability b. Vulnerability c. Reliability d. None of the other options are correct e. Accessibility

Answers

Note that in the case above, Cloud architecture has unlimited Accessibility.

Does cloud computing have unlimited storage?

The cloud storage is one that often depends on the cloud service provider and it is one that often give unlimited cloud storage and Accessibility for all.

Therfore, Note that in the case above, Cloud architecture has unlimited Accessibility as everyone can access it whenever they want.

Learn more about Cloud architecture from

https://brainly.com/question/11934271

#SPJ12

a web browser is an example of which type of network component?

Answers

A  web browser is an example of Network Client type of network component.

What is a Network Client?

This is known to be a  software that runs  usually on a client computer and it is one that gives room for it to set up connectivity with services that are known to be running on server computers.

Note that A  web browser is an example of Network Client type of network component as that is what it is..

Learn more about web browser from

https://brainly.com/question/22650550

#SPJ11

Select examples of software
Mouse
Computer programs
Applications
Monitor
Photo editing program

Answers

Answer: Computer programs, applications, photo editing program

Explanation:

Computer software is stuff you have downloaded on your computer. Mice and monitors are both physical objects, and therefore is not software. On the other hand, computer programs, applications, and a photo editing program are all on your computer and stuff you would have to download in order to have.

Write an if-else statement to describe an integer. Print positive even number if iseven and ispositive are both true. Print positive number if iseven is false and ispositive is true. Print not a positive number otherwise. End with newline.

Answers

The positive number if is even is false and the positive is true. Print, not a positive number otherwise. End with a newline. C code is the answer.

How, support your answer?

#include <stdio.h>

#include <stdbool.h>

int main(void) {

int userNum;

bool is Positive;

bool is Even;

scanf("%d", &userNum);

isPositive = (userNum > 0);

isEven = ((userNum % 2) == 0);

if(isPositive && isEven){  printf("Positive even number");}

else if(isPositive && !isEven){

 printf("Positive number");}

else{ printf("Not a positive number");

}printf("\n");

return 0;

Thus, this could be the answer.

To learn more about integer. click here:

https://brainly.com/question/2114800

#SPJ1

Medium to large businesses, or those with large data-storage needs, are more likely to use microsoft sql server or oracle as their dbms.

Answers

Answer:

True

Explanation:

SQL is a common language for data storage and maintenance that is utilized by mobile applications and organizations. It is used by almost every medium and large businesses to capture employee data and confidential business data. SQL is used by their database administrator to change and add information to their online database. It serves as the back-end data storage for apps, allowing authorized users to access information quickly and securely. Microsoft has created many versions of SQL Server, allowing you to select the one that best meets your workload and requirements. Companies that utilize SQL Server may encounter a variety of issues. Businesses choose Oracle for data storage and databases because it is exceptionally efficient for relational data and never crashes. Oracle databases are industrial computers' database equivalents. Businesses invest in Oracle because it offers the necessary relational data at fast speed and absolute dependability. Oracle database technologies provide consumers with cost-effective and high-performance version of Oracle Database, the world's most popular convergent, multi-model database management system, as well as in-memory, NoSQL, and MySQL databases.

When you use transact-sql, you can store procedural code in:

Answers

When you use transact-sql, you can store procedural code in stored procedure, scriptsz or user defined functions.

What is a procedural code?

It should be noted that a procedural code is ten code that directly instruct a device on how to finish a task.

In this case, when you use transact-sql, you can store procedural code in stored procedure, scripts, or user defined functions.

Learn more about procedural code on:

brainly.com/question/18265814

#SPJ12

[1] Define a computer system.

Answers

Hi There!

So, to help explain what a computer system or help gain an understanding, I am going to use a analogy. What I mean by that is how a computer system may be compared to a automobile.

An automobile is made up of a variety of pieces, including an engine, gearbox, axles, wheels, a battery, gears, and other electronics. The components are all interconnected within a frame and function as a whole to enable the car to travel down a road. There is also a driver. By interacting with or physically directing the steering wheel to do certain actions, such as driving straight ahead, turning left, or turning right, the driver controls the vehicle.

The computer system is like a car in that it merely consists of many pieces. The hardware consists of a CPU, memory cards, storage, and other electrical components. The hardware is arranged in a frame and interconnected so that the user may command the computer to do particular tasks. The user and the computer system must interface or communicate. The computer system features a keyboard and mouse instead of a steering wheel, which enables the user to interact with or direct the computer to do activities like opening a file, creating a document, or printing a page.

This comparison should help you understand what a computer system better.

Cheers!

ROR

Where would you add a new tag on an invoice that was already created?

Answers

To add a new tag on an invoice that was already created, find the tag group, select the run report and select edit group.

What is an invoice?

It should be noted that an invoice is a stamped document that itemizes and records a transaction.

In this case, to add a new tag on an invoice that was already created, find the tag group, select the run report and select edit group.

Learn more about invoice on:

brainly.com/question/4056820

#SPJ12

What do you understand by ' selecting' text​

Answers

Answer:

highlight the whole sentence

Explanation:

that is what it means

Selecting is highlighting text or picking an object.

Which device allows users to directly hear data from a computer

Answers

Answer:

peripheral device

Explanation:

allows us users to visualize or hear the information stored inside personal computers.

a help desk structured into levels or tiers of support uses a ____ support model.

Answers

A help desk that is structured into levels or tiers of support uses a multilevel support model.

What is a multilevel support model?

A multilevel support model can be defined as a type of model that is structured into two or more (multiple) levels or tiers, for the purpose of efficiency and control.

This ultimately implies that, a help desk that is structured into levels or tiers of support uses a multilevel support model.

Read more on multilevel support model here: https://brainly.com/question/15172615

#SPJ11

Write a program using integers usernum and x as input, and output usernum divided by x three times.

Answers

Answer:

Hopefully This Will Help

Explanation:

If the input is:

2000

2

Then the output is:

1000 500 250

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.

Answers

Answer:

(config)# service password-encryption

Explanation:

A system administrator could use service password-encryption command to prohibit any specified credentials from showing in text format in configuration files. This command secures all passwords in the config file that have been specified.

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command.

An administrator can use the service password-encryption command to stop all configured passwords from being displayed in configuration files as plain text. All configured passwords in the configuration file are encrypted by this command.

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

Hence, to prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command.

Learn more about the configuration file here:

https://brainly.com/question/32311956.

#SPJ6

What are the two protocols used most often with iot devices? (select two. )

Answers

Z-Wave and Zigbee are the two protocols that are used most often with IOT devices.

What is a protocol?

A protocol can be defined as a formatted blocks of data that have been designed and established by professionals to obey a set of standard rules (conventions) such as Z-Wave and Zigbee.

In Computer networking, the two protocols that are used most often with Internet of Things (IOT) devices include the following:

Z-WaveZigbee

Read more on protocols here: https://brainly.com/question/17387945

#SPJ12

Which myth of the foundation of the olympian games is prominently displayed on the east pediment of the temple of zeus of olympia?.

Answers

Answer:

This does not belong under the category of Computers and Technology

The myth of the foundation of the olympian games is prominently displayed on the east pediment of the temple of zeus of olympia is that the sculptures shows The Chariot Race of Pelops and Oinomaos.

What is Temple of Zeus?

The ruined Temple of Zeus stands that site of Olympia was built to honor the chief of the gods. It was probably constructed at around 470 B.C when the ancient Olympic Games were at their peak.

The east pediment of the Parthenon showed the birth of goddess Athena from the head of her father Zeus. The sculptures that represented the actual scene are lost. The sculptures represent about the Chariot Race of Pelops and Oinomaos.

The Temple of Olympian Zeus is also known as the Olympion or Columns of the Olympian Zeus, is a former colossal temple at the center of the Greek capital Athens.

In the center of the sculpture stands Zeus watching over Pelops to the right and Oenomaus to the left. Beside them are two female figures, followed by the chariots about to be raced on.

Learn more about Olympia here:

https://brainly.com/question/858693

#SPJ2

An organization with a(n) _____ structure, sometimes called a "franchiser," uses highly centralized information systems

Answers

An organization with a global structure, sometimes called a "franchiser," uses highly centralized information systems to perform its tasks.

What is an information system?

An information system refers to a set of computer systems that is primarily used by an organization to obtain, store, and process data, including the dissemination of information, knowledge, and the distribution of digital products from one geographical location to another.

Basically, an organization with a global structure, which is sometimes referred to as a "franchiser," make use of highly centralized information systems to perform its tasks.

Read more on information here: brainly.com/question/25885448

#SPJ12

Angela is considering buying stock in a popular computer software company whose price has dropped significantly in the last year. Why might this be a wise move for angela to make?

Answers

Th right decision for Angela to make is that It is better to buy when prices are low and then she sell when prices are high.

What is the decision about?

In the case above, it is better that Angela made a better decision because  it is easy and good in terms of profit that she will earn for her to buy when prices are low and then sell when prices are high.

Therefore, Th right decision for Angela to make is that It is better to buy when prices are low and then she sell when prices are high.

See full question below

Angela is considering buying stock in a popular computer software company whose price has dropped significantly in the last year. Why might this be a wise move for Angela to make? because it is smart to buy when prices are high and sell when prices are low because it is smart to buy when prices are low and sell when prices are high because her investment will be guaranteed by the government if the company fails because the company will rebound because she likes to use the products they sell

Learn more about stock from

https://brainly.com/question/13928270

#SPJ12

Write a class with name shares shares( ) constructor to initialize the object shares(String , int , int ) constructor to initialize the object void buy( ) for buying the shares void sell( ) for selling the shares calc( ) to calculate the total value of shares show( ) to show the details. Note : buy( ) and sell( ) functions will increase or decrease the number of shares, and accordingly the Total value of shares will change. Create another class and write main( ) function and use the above functions....use : string nm(name of buyer)
int no(no. of shares)
int unitprc(price of 1 share)
int totalval (total value of all shares)

Answers

Explanation:

What is constructor?

Constructor is a member function of class, whose name is same as the class.

A constructor is a special type of member function of a class which initializes objects of a class. In C++, Constructor is automatically called when object(instance of class) is created.

Constructor is invoked at the time of object creation. It constructs the values i.e. provides data for the object that is why it is known as constructors.

Constructor does not have a return value, hence they do not have a return type.

Which two choices are examples of trivial file transfer protocol (tftp) use? (choose two. )

Answers

The two examples of trivial file transfer protocol (TFTP) use are:

Download router upgrades.Software upgrades to IP telephones.

What is trivial file transfer protocol (TFTP)?

Trivial file transfer protocol (TFTP) can be defined as a simple lockstep protocol which is designed and developed to avail an end user an ability to receive a file or place a file onto a remote host.

In Computer networking, the two examples of trivial file transfer protocol (TFTP) use include the following:

Download router upgrades.Software upgrades to IP telephones.

Read more on FTP here: brainly.com/question/20602197

#SPJ12

What is the name of the directory that contains symbolic links to unix sysv rc scripts for runlevel 2?

Answers

/etc/rc2.d is the name given to the directory that contains symbolic links to UNIX SysV rc scripts for runlevel 2.

What is a directory service?

A directory service can be defined as a software system designed and developed to store, organize and provide end users with a name and an access to directory information, so as to effectively and efficiently unify (synchronize) all network resources.

In Computer networking, /etc/rc2.d is the name given to the directory that contains symbolic links to UNIX SysV rc scripts for runlevel 2.

Read more on UNIX SysV here: https://brainly.com/question/15616559

#SPJ12

a. A set of electronic program that makes of computer perform tasks
1. Instructions
2. Software
3. Hardware
4. None of the

Answers

Answer:

2. Software

Explanation:

Software is an app

Hardware is the computer or cell phone or mobile phone

toppr

Create a chart on basic commands used in HTML.
It should include basic body structure of HTML also.And make it beautiful

Answers

basic HTML commands

1 the head tag

2 titles

3 the body tag

4 headers

5 paragraph

6 performance text

7 bold face and italics

the HTML tag Al truth not currently required by the all clients the HTML tag signals the point where tax should started being interprinted as HTML code

Identify a true statement of array.find(callback [, thisArg]) method. It tests whether the condition returned by the callback function holds for all items in array. It returns the value of the first element in the array that passes a test in the callback function. It tests whether the condition returned by the callback function holds for at least one item in array. It returns the index of the first element in the array that passes a test in the callback function.

Answers

The true statement of the array is that C. It tests whether the condition returned by the callback function holds for at least one item in array.

What is an array?

It should be noted that an array means a data structure that can store a fixed size collection of elements.

In this case, the true statement of the array is that it tests whether the condition returned by the callback function holds for at least one item in array.

Learn more about array on:

brainly.com/question/26104158

#SPJ12

what type of storage drive contains multiple spinning platters?

Answers

The type of storage drive that contains multiple spinning platters is called; Hard disk drives

What is the hard disk drive?

A computer hard disk drive (HDD) is a non-volatile data storage device. Non-volatile refers to storage devices that maintain stored data when turned off.

Now, the correct answer to the question is hard disk drives. This is because a hard disk drive is comprised of a stack of spinning metal disks known as platters. Each spinning disk has trillions of tiny fragments that could possibly be magnetized in order to represent bits (1s and 0s in binary code).

Read more about Hard disk drives at; https://brainly.com/question/24498473

#SPJ12

Other Questions
if n 18 = find n Need help simple explanation if possible What can be inferred about the Cyclops in this excerpt from Homers Odyssey? "The land of Cyclops first, a savage kind, Nor tamed by manners, nor by laws confined: Untaught to plant, to turn the glebe, and sow, They all their products to free nature owe: The soil, untill'd, a ready harvest yields, With wheat and barley wave the golden fields; Spontaneous wines from weighty clusters pour, And Jove descends in each prolific shower, By these no statues and no rights are known, No council held, no monarch fills the throne; But high on hills, or airy cliffs, they dwell, Or deep in caves whose entrance leads to hell. Each rules his race, his neighbour not his care, Heedless of others, to his own severe." A.The Cyclops is warm and hospitable toward his guests. B.The Cyclops cares for his neighbors well-being and advice. C.The Cyclops does not follow typical rules of the civilized human world. D.The Cyclops can survive only in the deep, dark caves on the island. If you vacillate, do you make immediate and decisive choices?Yes or No Mrs. Andrews asked how a Private Fee - for - Service ( PFFS ) plan might affect her access to services since she receives some assistance for her health care costs from the State . What should you tell her ? Changing the business task involves defining a new _____. what are the three areas on the dashboard that let you find and perform every feature and function you need in quickbooks online? Determine how many kilojoules are absorbed when 341 g of Ca(OH)2 reacts via the following reaction:Ca(OH)2(s)CaO(s)+H2O(l),H=+65.3kJ the patient has a significant visual impairment (category 2) due to astigmatism in the left eye. it is corrected with glasses. the right eye has normal vision. what icd-10-cm code(s) is/are reported? Which word is the best antonym for invincible. a. quickly forgottenb. not athleticc. easily defeated What are the measures of 1 and 2? Show your work or explain your answers. A pyramid has a square base with sides of length s. The height of the pyramid is equal to 1/2 of the length of a side on the base. Which formularepresents the volume of the pyramid?A. V = 1/12 s ^3B. V=1/6 s ^3C. V=1/3s ^3D. V=3sE. V=6s Q6. This part of the question is for simplifying your work: Make a graph and shadow the interested regions of the inequalities in the given picture.The following is the actual question: Find the highest and lowest value of the equation in the given picture within the unshadowed region. which statement best describes the chinese who immigrated to the united states in the late 1800s Teniendo como referencia los textos de La Santa Biblia y los mitos de la creacin indgena colombiana Cmo se explica y gran parecido entre ambos textos In one class, homework is worth 10% of the final grade, each of 3 projects is worth 20%, and a final exam is worth 30%.(a) If a student has an 81 homework average and a 95 on the first project, what is the student's grade at this point?(b) If the same student from part (a) gets a 72 on the second project and a 71 on the third project, what is the lowest grade the student can get on the final exam to get an 80 overall in the course?(a) The grade at this point is_____(Simplify your answer. Round to the nearest tenth as needed.)(b) The lowest possible grade is____(Simplify your answer. Round to the nearest integer as needed.) When adding two 8 bit binary numbers, which of the following statements is true? find the positive square root of 217.05 and 100.2001......with division method In 1990, the average monthly bill for cellular telephone service was $80.90. From 1990-1997, the monthly bill decreased by 8.6% per year (in other words, each year the bill is 91.4% ofwhat is was the previous year (Source: Statistical Abstract of the United States).Part a: Write a formula for the average monthly cellular telephone bill in terms of the year. Let n = 1 represent 1990.Part b: What was the average monthly bill in 1993 What is Beijing Opera and where did it originate?