1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
13

Linux is a kind of software whose code is provided for use, modification, and redistribution, at no cost. What kind of software

would this be considered from the choices available? Group of answer choices client/server subscription open source SourceForge
Computers and Technology
1 answer:
Scilla [17]3 years ago
6 0

Answer:

Linux is a type of open-source software. The entire premise of open-source code is to make it as easy for people to develop and share as possible, instead of use as a vehicle to make money. This way, the collective knowledge of the community can make the program as secure and user-friendly as possible.

Explanation:

You might be interested in
What is networking and types of networking?​
ANEK [815]

Answer:networking is searching the internet for information

there are different types of networking scanning the internet for info or reading a website

Explanation:

8 0
3 years ago
Define cyber law and cyber crime with examples.​
kifflom [539]

Answer:

Cyber crime is unlawful acts where the computer is either a tool or target or both. An example of such would be theft, fraud, forgery, etc. Cyberlaw on the other hand encompasses cybercrime.

4 0
3 years ago
Microsoft outlook is one of the most widely used _____ software applications
Marysya12 [62]
Computer: Microsoft Outlook is one of the most widely used computer software application.
7 0
3 years ago
Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within
Zolol [24]

Answer:

Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt().

Explanation:

You will write a flowchart, and C code for a program that does the following:1. Within main(), it asks for the user’s annual income.2. Within main(), it calls a function called printIt() and passes the income value to printIt().  3. The printIt() function evaluates the income, and if the number is over 90000, prints a congratulatory message.  If the income is not over 90000, it prints a message of encouragement, like “You WILL make $50,000, if you keep going.”Here is what the output looks like.File SubmissionUpload your Flowgorithm file, your .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading.

8 0
3 years ago
Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
yKpoI14uk [10]

Answer:

Setting a strong password policy

Explanation:

In implementing a comprehensive security program, one of the first steps would be to set up a strong password policy.

It is important to understand what the company is trying to protect from third parties.

Setting up a password policy is going to increase the security of the system through the use of strong passwords.

5 0
3 years ago
Other questions:
  • Any method of determining whether an event or object is older or younger than others
    13·2 answers
  • Which tab would you click to access the autosum feature?
    9·1 answer
  • Write a method called evenBeforeOdd that accepts an array of integers and rearranges its elements so that all even values appear
    15·1 answer
  • Which type of DNS zone resolves host names to IP addresses?
    8·1 answer
  • What is character referencing and why is it used?
    8·1 answer
  • Creating a Graphical User Interface in Java
    11·1 answer
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    6·1 answer
  • Find the ratio of 24 to 36​
    5·2 answers
  • Based on what you know about the Sort and Find functions, return to the database file to determine the answers to the following
    7·2 answers
  • Which of these statements are true about domain controllers (dcs)? check all that apply.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!