1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
3 years ago
10

In the context of in-house software development options, companies that develop software for sale are called _____.

Computers and Technology
1 answer:
Pavel [41]3 years ago
6 0

A software vendor is an organization specializing in making and selling software for mass or niche markets. 

A software dealer is an organization which sell software produced by others.

Meanwhile, Software distribution<span> is the process of delivering </span>software<span> to the end user. And the person or organization who are responsible for distributing software to others are called as software distributors.</span>

Here the answer is A.

You might be interested in
A customer struggles with the small print of most smartphones. The customer still likes the idea of using a smartphone for phone
aliya0001 [1]

Answer:

The answer is a phablet.

Explanation:

A phablet is a class of smartphones with an intermediate size between a smartphone and a tablet. If the customer follows the recommendation, then he could still use this device for phone calls and work and not struggle anymore with the small print of the typical smartphone.

3 0
2 years ago
Read 2 more answers
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
3 years ago
List the seven basic internal components found in a computer tower
egoroff_w [7]
1. Motherboard (you plug all other components to it)
2. Processor (CPU)
3. Memory (RAM)
4. Graphics card
5. Sound card (sometimes integrated with motherboard)
6. Hard Disk Drive (HDD)
7. Power supply unit
6 0
3 years ago
Read 2 more answers
A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status
Lyrx [107]

Answer:

Back up the user data to removable disk

Explanation:

Before you work on a computer, especially anything that has to do with files not accessible, this might need to format the system because it might either be a virus or other forms of malware. Since backup was done to a different logical partition on the disk, the first thing to do before performing any diagnostic procedures on the disk is to back up the user data to a removable disk in order not to lose the information in the system.

8 0
2 years ago
1. _____ are used to clarify code, but are not interpreted by the interpreter as commands. (1 point)
mariarad [96]

Answer:

1. D Comments

2. B False

3. C Logical Expression

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which result would support the particle theory of light?
    6·2 answers
  • Code a call to the function anotherFunc passing the array myints.
    15·1 answer
  • Bran is writing a book on operation system errors. Help him complete the sentences.
    7·1 answer
  • Write an application that instantiates five Recording objects and prompts the user for values for the data fields. Then prompt t
    13·1 answer
  • Which key is used to indent the first line of a paragraph to the right?
    15·2 answers
  • Donna often travels around the world. When she travels, she needs to access her emails from different locations. However, to kee
    6·2 answers
  • (20points)
    6·1 answer
  • (03.05 LC
    14·1 answer
  • What can you do to make sure no one outside your company can gain access to its wireless network?
    11·1 answer
  • External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!