1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FromTheMoon [43]
3 years ago
7

Which of the following is an advantage of using proprietary licensed software? The software’s source code can be easily modified

. The software is free for anyone who wants to use it. The software is usually polished and has fewer bugs. The software can be installed on unlimited computers.
Computers and Technology
2 answers:
denpristay [2]3 years ago
8 0
There are three advantages of opting out for a proprietary software.

The first one - a competitive advantage. Wether a person develop a robot or a company develops a platform, they will have something unique. An individual is able to use this software to attract investors. A company may attract more clients.

Secondly, a company gains quite some independence when it starts relying on its own software. What if a 3rd party platform developer goes out of business or decides 

Ainat [17]3 years ago
8 0

Answer:

C The software is usually polished and has fewer bugs.

Explanation:

You might be interested in
Type the correct answer in the box. Spell all words correctly. Joseph is a digital media developer and has years of work experie
Damm [24]

It is better to develop soft skills. Irrespective of profession, soft skill is a common skill which is required to be present in everyone to move along with others and continue the work successfully. A person who is good at technical need soft skill to work in collaboration with others, manage team, solve problems, etc.

So there are separate soft skill training provided for various roles and years of experience. So, I suggest to have soft skill training and do additionally MBA degree.

5 0
3 years ago
What are the reason of making computer virus.​
GenaCL600 [577]

Answer:

Some computer experts create computer viruses to prove certain a process will work

Explanation:

6 0
2 years ago
Read 2 more answers
Write a c++ program that accepts a string from the user and then replaces all occurrences of the letter e with the letter x
mixer [17]

Answer:

#include <iostream>

using namespace std;

int main()

{

   string str;

   cout<<"Enter the string: ";

   cin>>str;

   for(int i=0;str[i]!='\0';i++){

       if(str[i]=='e'){

           str[i]='x';

       }

   }

   cout<<"the string is: "<<str<<endl;

  return 0;

}

Explanation:

First, include the library iostream for using the input/output instructions.

Create the main function and declare the variables.

Then, use the cout instruction and print the message on the screen.

cin store the string enter by the user into a variable.

After that, take a for loop and if-else statement for checking the condition if the string contains the 'e', then change that alphabet to 'x'.

This process continues until the string not empty.

Finally, print the updated string.

6 0
3 years ago
One author states that Web-based software is more likely to take advantage of social networking (Web 2.0) approaches such as wik
kodGreya [7K]

Answer:

Yes

Explanation:

I will say Yes. There are very much limitless possible and future we can expect from social media and even more from social networking. Its capabilities from upcoming software in the future. Since the Internet is in its early days of growing and cloud computing being introduced there are way more possibilities in the future.

Social media can be duely applied by CIT (Computer Information Technologies) graduates. It can be used to improve them in their career and also will helps them connect professionally. Quora is one such platform which is not exactly like LinkedIn but pretty much serves the purpose.

6 0
3 years ago
The giant eniac stores how much size memory
swat32

if you mean the giant eniac stores how much memory, the answer would be that the original model had no storage but later a 100-word storage core was installed

3 0
2 years ago
Other questions:
  • Graphic images can be stored in a variety of formats including ____.
    15·1 answer
  • When powering off your computer is best down using?
    8·2 answers
  • Which ipv6 prefix will the typical enterprise network receive from the service provider?
    12·1 answer
  • Anna is looking for a job. Which two types of skills would she find necessary to secure a job ?
    5·1 answer
  • MIDI is a A.technology based on placing brief digital recordings of live sounds under the control of a synthesizer keyboard. B.t
    10·1 answer
  • Implement RandMultipByVal function, which gets one integervariable as its argument
    12·1 answer
  • What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
    11·1 answer
  • You can apply several different worksheet themes from which tab?
    6·2 answers
  • Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize th
    13·1 answer
  • A state government is attempting to reduce the digital divide. Which of the following activities has the greatest potential to c
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!