1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
3 years ago
13

At a company function, a top executive corners you and complains that your department is wasting too much money. The executive d

emands to know why the company must spend so much money on computers and software, especially operating systems and related licenses (for closed source programs and operating systems). Write a report that defends your department by explaining the nature of hardware, software, and operating systems. In the report, be sure to explain how OSS and the Linux operating system can be used to reduce these costs in the long term.
Computers and Technology
1 answer:
Alex777 [14]3 years ago
8 0

Answer:

Report:  

Shields focuses for the for shut source programs and working frameworks  

The shut source program is over the top expensive when contrasted with open source programs at whatever point the help and support administrations gave by the nearby source program designers are generally excellent.  

The shut source association will have propelled improvement and supporting group so the innovations and philosophies utilized will be propelled when contrasted with open source frameworks.  

The equipment bolster will be additionally acceptable contrasted with open source frameworks, a committed inner creating bunch is required if open source frameworks is embraced.  

For little reason or general purposes the utilization of shut framework is gainful.  

Focuses to clarify how OSS and the Linux working framework can be utilized to diminish these expenses in the long haul.  

The open source programming or working framework needn't bother with any permit or option to explore upon.  

For long haul use or committed purposes it is smarter to make an indigenous group so the product can make according to prerequisites and no compelling reason to pay remotely for help and support.  

The open source programming and working frameworks can be altered with no assent from its unique designers it empowers to change the product or working as we required.  

For long haul use applications or working framework it is monetarily plausible to keep an inside advancement group for creating applications instead of depending outside close programming items.

You might be interested in
11111 Power 2 sovle ​
erastovalidia [21]
123,454,321. you just multiply 11111 by itself
4 0
3 years ago
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
3 years ago
Which slide elements must Claire use to enhance her presentation?
Alja [10]
She needs to use animations to enhance her presentation
8 0
2 years ago
Which table option automatically adjusts column widths to fit cell content? autofit contents merge cells autofit window fixed co
noname [10]
Which table option automatically adjusts column widths to fit cell content?
autofit contents
6 0
3 years ago
Write a program that prompts the user for an integer, then asks the user to enter that many values. Store these values in an arr
Svetllana [295]

Answer:

//The Scanner class is imported to allow the program receive user input

import java.util.Scanner;

//The class Solution is defined

public class Solution {

   //The main method is defined here and signify the beginning of program execution

   public static void main(String args[]) {

       

       //Scanner object 'scan' is created to receive user input

       Scanner scan = new Scanner(System.in);

       //Prompt display to the user to enter size of array

       System.out.print("Enter the range of array: ");

       //User input is assigned to arraySize

       int arraySize = scan.nextInt();

       //userArray is initialized with arraySize as its size

       int[] userArray = new int[arraySize];

       

       //counter to count number of array element

       int count = 0;

       //while loop which continue executing till the user finish entering the array element

       while (count < arraySize){

           System.out.print("Enter each element of the array: ");

           userArray[count] = scan.nextInt();

           count++;

       }

       

       //A blank line is printed for clarity

       System.out.println();

       

       //for loop to print each element of the array on straight line

       for(int i =0; i <userArray.length; i++){

           System.out.print(userArray[i] + " ");

       }

       

       //A blank line is printed for clarity

       System.out.println();

       

       //for loop is use to reverse the array in-place

       for(int i=0; i<userArray.length/2; i++){

           int temp = userArray[i];

           userArray[i] = userArray[userArray.length -i -1];

           userArray[userArray.length -i -1] = temp;

       }

       

       //for loop to print each element of the reversed array on straight line

       for(int i =0; i <userArray.length; i++){

           System.out.print(userArray[i] + " ");

       }

     

   }

}

Explanation:

The program is commented to give detailed explanation.

The for-loop use in reversing the array works by first dividing the array into two half and exchanging the first half elements with the second half elements. The element from the first half is assigned to temp variable on each loop, then the element is replaced with the equivalent element from the second half. And the element from the second half is replaced with the value of temp.

3 0
3 years ago
Other questions:
  • How do rubrics increase learning?
    15·2 answers
  • On Brainly, how can I change my username? from halfsidepancake​
    6·2 answers
  • Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Whi
    9·1 answer
  • The advent of optical discs was made possible by developments in ____ technology.
    5·1 answer
  • Which of the following is NOT a safe skill you can use to reduce your risk
    11·2 answers
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • Hello Answerers it would be great if you could answer this:
    12·2 answers
  • HELP PLEASE
    7·1 answer
  • Hey guys join me
    9·1 answer
  • 1k bits equals to how many bits
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!