1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
11

Linux is ____ software, which means its code is provided for use, modification, and redistribution.

Computers and Technology
1 answer:
shtirl [24]3 years ago
7 0
The answer: "An open source"
You might be interested in
The city government of Los Angeles recently upgraded its information technology infrastructure​ and, for the first​ time, implem
Maru [420]

Answer:

The correct answer to the following question will be Option A (Open source software).

Explanation:

It's a type of software which is open to all we can download that software by the free of cost. Wamp, Apache server is one of the example of the open source software.

Any software accessible for alteration which is circulated because of its source code is known as Open source software. Open source permissions influence the way technology is used, researched, updated, and circulated by individuals. In fact, it give permission to code users for using this software for whatever use might desire.

Which ensures it includes a developer authorization to modify the script in any manner they want to:

  • Developers will patch glitches.
  • Change features.
  • Modify the app to suit their needs.

No other software available for the alteration is available in the option. So, the proper answer is Option A.

8 0
4 years ago
When a user utilizes another computer to communicate with a third party, with the result that the third party cannot recognize t
avanturin [10]

Answer:

Online or Web Proxy

Explanation:

Web or online proxy allows you to hide your Internet Protocol (IP) address from the website you are trying to visit or access. It is like a shield between the website you are accessing and you. They can be seen as a middleman between you and the site you are visiting and as such, the site sees that a specific IP address is accessing its server but the address is not yours as all requests between your computer and the web server are first passed through the proxy server.

<em>Hope this helps!</em>

4 0
3 years ago
The requester of sensitive information should not receive access just because of his or her clearance, position, or rank. The re
JulsSmile [24]

Answer:

Need to know

Explanation:

Need to know is a policy or predetermined criterion by which the requester of an information is granted access to the requested information only when a valid need is establish and not just because of his or her clearance, position, or rank.  

7 0
3 years ago
Imagine that you work for an organization that has no Internet use policy. Employees use the Internet in whatever way they want
Strike441 [17]

Answer: Yes

Explanation:

It would force the company to either enforce the policy and fire all of its employees.

8 0
2 years ago
Kelly wants to change the text in a cell so that it is centered instead of left-aligned, where should she look to make this
timurjin [86]

Answer:

c

Explanation:

I don't know if it's correct

make me brainlist

4 0
3 years ago
Other questions:
  • To create an individual version of a slide, you would click
    9·1 answer
  • An automated search feature used by search engines to find results that match your search terms is called a spider or ?
    5·1 answer
  • All of the following are current key technology trends raising ethical issues except:_________
    13·1 answer
  • Which statement best describes what happen to the temoporary working memory (RAM) of a computer when it shut down
    12·2 answers
  • How can i get google assistant on my lava iris 820 smartphone easily???? ​
    10·1 answer
  • Va rog urgent
    8·1 answer
  • What is the purpose of a hyperlink in a presentation?
    11·1 answer
  • Which package is required for shadow passwords to be enabled?.
    15·1 answer
  • A Chain of dry-cleaning outlets wants to improve its operations by using data from devices at individual locations to make real-
    14·1 answer
  • Integrity constraints are enforced by Group of answer choices A. The operating system B. The end user C. The database designer D
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!