1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
14

The city government of Los Angeles recently upgraded its information technology infrastructure​ and, for the first​ time, implem

ented software in the human resources department that is freely distributed along with the code underlying the program. The type of software the city has implemented in HR is called​ ________. A. open source software B. legacy software C. proprietary software D. human resources software E. firmware
Computers and Technology
1 answer:
Maru [420]3 years ago
8 0

Answer:

The correct answer to the following question will be Option A (Open source software).

Explanation:

It's a type of software which is open to all we can download that software by the free of cost. Wamp, Apache server is one of the example of the open source software.

Any software accessible for alteration which is circulated because of its source code is known as Open source software. Open source permissions influence the way technology is used, researched, updated, and circulated by individuals. In fact, it give permission to code users for using this software for whatever use might desire.

Which ensures it includes a developer authorization to modify the script in any manner they want to:

  • Developers will patch glitches.
  • Change features.
  • Modify the app to suit their needs.

No other software available for the alteration is available in the option. So, the proper answer is Option A.

You might be interested in
What is the wave speed of a wave that has a frequency of 100 Hz and a wavelength of 0.30m?
swat32

<u><em>Answer:</em></u>

<u><em>The speed is  </em></u>

<u><em>= </em></u>

<u><em>30 </em></u>

<u><em>m </em></u>

<u><em>s </em></u>

<u><em>− </em></u>

<u><em>1 </em></u>

<u><em> </em></u>

<u><em>Explanation: </em></u>

<u><em>The speed of a wave is given by </em></u>

<u><em> </em></u>

<u><em>speed </em></u>

<u><em>( </em></u>

<u><em>m </em></u>

<u><em>s </em></u>

<u><em>− </em></u>

<u><em>1 </em></u>

<u><em>) </em></u>

<u><em>= </em></u>

<u><em>frequency(Hz) </em></u>

<u><em>× </em></u>

<u><em>wavelength (m) </em></u>

<u><em> </em></u>

<u><em>The frequency is  </em></u>

<u><em>f </em></u>

<u><em>= </em></u>

<u><em>100 </em></u>

<u><em>H </em></u>

<u><em>z </em></u>

<u><em> </em></u>

<u><em>The wavelength is  </em></u>

<u><em>λ </em></u>

<u><em>= </em></u>

<u><em>0.3 </em></u>

<u><em>m </em></u>

<u><em> </em></u>

<u><em>The speed is </em></u>

<u><em> </em></u>

<u><em>v </em></u>

<u><em>= </em></u>

<u><em>λ </em></u>

<u><em>f </em></u>

<u><em>= </em></u>

<u><em>0.3 </em></u>

<u><em>⋅ </em></u>

<u><em>100 </em></u>

<u><em>= </em></u>

<u><em>30 </em></u>

<u><em>m </em></u>

<u><em>s </em></u>

<u><em>− </em></u>

<u><em>1 </em></u>

<u><em> </em></u>

<u><em></em></u>

<u><em></em></u>

<u><em></em></u>

6 0
3 years ago
In which of the following locations can you edit all of the Properties of a PowerPoint file?
Lapatulllka [165]
Access the File<span> menu, choose </span>Info Pane<span> to get to </span>Backstage view, you can see Properties on t<span>he area on the right side </span>of the current PowerPoint presentation.  <span>Within the </span>Properties<span> pane click the </span>Show All Properties<span>  option , T</span><span>his will displays properties such as </span>Size<span>, the number of </span>Slides<span>,  </span>Hidden Slides<span>, the number of </span>Multimedia Clips, etc.  Some of the entries are editable w<span>ithin the  </span>Properties pane, and some are not. Just move your mouse cursor over any detail of a property. The editable sections will change the cursor into edit mode.  
6 0
3 years ago
What computer worm was used to sabatoge iran's nuclear program?
Stels [109]
Researches at symantec have uncovered a version of the stuxnet computer virus that was used to attack irans nuclear program in November.
4 0
3 years ago
To test for the current date in a query, type ____ in the criteria row of the appropriate column.
lyudmila [28]

Answer:

zxc

Explanation:

zc

6 0
3 years ago
Which device makes telecommunications possible?
Dmitrij [34]
A. modem or d. voice input. Not a port because a port allows one to insert a peripheral device but not really communicate. I have no idea what an expansion slot is. It could be d. voice input because this allows a person to hold an audible conversation.

But  I'd go for modem because a modem lets you connect devices like laptops, tablets, phones, computers etc. and share data between them. So things like mailing are possible (I THINK)!  <span />
7 0
3 years ago
Other questions:
  • How to remove a channel from favorite list on suddenlink?
    15·1 answer
  • Your computer is configured to obtain an ipv4 address and dns server address automatically. what utility will help you to find t
    7·1 answer
  • Your friend Kayla is starting her own business and asks you whether she should set it up as a P2P network or as a client-server
    13·1 answer
  • The purchase and subsequent sale of a securities position in a customer account solely to generate commissions is____________.
    15·1 answer
  • A girl scout troop with 10 girl scouts and 2 leaders goes on a hike. When the path narrows, they must walk in single file with a
    12·1 answer
  • Eric would like to have a color textbook that makes it look as if the character in an image is speaking. Which object should he
    14·1 answer
  • An organization requires secure configuration baselines for all platforms and technologies that are used. If any system cannot c
    7·1 answer
  • What is an outcome in a game? Don't search google just give me an answer
    9·1 answer
  • Why is the Microsoft website considered the best source for information about pagefile.sys?​
    15·1 answer
  • security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!