1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
7

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra

ms for certain functions, are referred to as service level agreements. open-source software. mashups. software packages. outsourced software.
Computers and Technology
1 answer:
Dovator [93]3 years ago
6 0

Answer:

Software packages.

Explanation:

Prewritten, commonly available software programs that has been applied here as software packages which completely remove the requirement of the organization to compose the own computer programs for all of these functionalities.

Software package is one of the collection of the program inside which the user get all useful applications or software as well as software module that meet their requirements.

You might be interested in
Why is the stateless nature of the internet a problem for shopping cart software? g?
Snezhnost [94]
In a stateless connection, each transmission is independent, no continuous connection is maintained.  Stateless system is a problem for shopping cart software because it does not keep information from one transmission or session to another, thus shopping cart must store information about specific shoppers and their purchases. 
4 0
3 years ago
Read 2 more answers
​printers, monitors,​ tablets, cpus, and laptops are examples of​ ____________.
AlladinOne [14]
​printers, monitors,​ tablets, cpus, and laptops are examples of​ ____________.

c. hardware
5 0
3 years ago
Are there protections for people in terms of what data can be collected by different sites?
s2008m [1.1K]
Yes , usually before you sign up for a website or app it will warn you and tell you what the app or website will have access to and what will gained through using the website or app
8 0
3 years ago
Tcp takes a three-step approach to establishing a reliable communication. first, from the transport layer of the sending device
tiny-mole [99]

TCP takes a three-step approach to establishing a reliable communication.

First, from the transport layer of the sending device a request packet is transmitted to the receiving device's transport layer asking if a session can be established.

Second, if available, the receiving device sends a packet back to the sending device indicating that it is available for communication.

Third, the sending device begins to send its data to the receiving device.

4 0
3 years ago
Which steps allow a user to change the column layout in the Handout Master?
sukhopar [10]

Answer:

It's D

Explanation:

On edgenuity

7 0
3 years ago
Other questions:
  • What are factors that limit a technological design
    13·1 answer
  • List and explain the error in the code
    14·1 answer
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    12·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • Pls help me
    5·1 answer
  • One of the best ways to shoot a picture is to frame the subject in the middle of the screen or viewer. T or F
    14·2 answers
  • Because people can easily upload information and share online, they tend to:
    15·1 answer
  • Please help it’s timed
    13·1 answer
  • PLS REPLY ASAP WILL MARK BRAINLIEST
    5·2 answers
  • The ________ function will change a character argument from lowercase to uppercase. isupper toupper tolarge fromlower none of th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!