1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
5

An open system consists of nonproprietary hardware and software based on publicly known standards that allows third parties to c

reate add-on products to plug into or interoperate with the system.A. Management systemB. Reputation systemC. Knowledge systemD.Open system
Computers and Technology
1 answer:
kolezko [41]3 years ago
6 0

Answer:

The answer is "Option D".

Explanation:

A system or a group of components that communicate with your environment through the sharing of resources, materials, and knowledge with a view to system regeneration and development is known as an Open system. In other words, we can say that it is a system that includes a non-proprietary hardware and advert-based software which enables third parties to add or interact with products to plug in the system and It is freely available on the internet. In this question, the incorrect options can be described as follows:

  • In option A, The management system is used by an organization. It is a paid system that's why it is not correct.
  • In option B, This system enables users in online communities and evaluates one another that's why it is not correct.
  • In option C, This type of system provides resources for upgrade user knowledge. It is a paid system that's why it is not correct.  

You might be interested in
What is difference between reserved and user defined word
EastWind [94]

Answer:

A user defined word is a name we give to a particular data structure. Reserved keywords are words which are pre-defined by the programming language. Reserved keywords are mostly lowercase like int, long, short, float etc.

User defined words can be made up of capital letters, low case letters, digits and underscores.

7 0
3 years ago
In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
Alexus [3.1K]
In ciphertext-only.

EXPLANATION: it is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. The attack is completely successful if the corresponding plaintexts can be extracted or, even better, the key.
3 0
3 years ago
How do i recover a google account that was deleted?
Daniel [21]

Answer:

Just change your password

Explanation:

go to google account recovery and put in your old username and password if it has been a long time it might not come back. Or you can just change your password

7 0
3 years ago
How many bits are required to store the text of the number "97" in ASCII?'
valina [46]

Answer:

You need x64 or x32 bits

Explanation:

I don't have a capture or a photo

8 0
3 years ago
Read 2 more answers
Write the function header (the first line of the function definition) to define a function named DisplayStats that accepts a str
Degger [83]

Answer:

void DisplayStats(string fName, int num1, double examScore);

Explanation:

Using C++ programming language.

Function headers (signatures) are allowed to be placed on top just before the main method in C++ indicating that the function's definition will be provided down below the main method, thereby allowing you to call the function within the main function.

The requirements of the the question are met. The function signature above indicates that it is void (wont return any value), The name is DisplayStats, and the parameter list are separated by single spaces as required with the correct data types.

4 0
3 years ago
Other questions:
  • The _____ pseudo-class represents the exact instant in which a link is activated.​
    14·1 answer
  • Which events occurred during the Space Race?
    5·1 answer
  • Write a C++ function, lastLargestIndex that takes as parameters an int array and its size and returns the index of the last occu
    10·1 answer
  • Which business document is usually written in block style with the body tedt aligned along its left margin?
    9·1 answer
  • Which term is used to describe bitmap images
    8·2 answers
  • A cell reference with only one dollar sign before either the column or the row is called an absolute reference.
    10·1 answer
  • Write a program that computes and prints the average of the numbers in a text file. You should make use of two higher-order func
    9·1 answer
  • Which is one use for a hyperlink? A. to create a heading style B. to animate important text C. to create a link to a website. D.
    7·1 answer
  • marco wants to create a heading that is bold and italic to make it really stand out on his webpage. he's typed in the code
    12·2 answers
  • The temperature at 8 AM was 44°F and at noon it was 64°F. what was the percent of change from 8 AM to noon?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!