1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ELEN [110]
3 years ago
9

You are developing open-source software based on existing source code developed by someone else. What is the term for the piece

of software you develop?
Computers and Technology
1 answer:
GalinKa [24]3 years ago
5 0

Answer:

Derivative work

Explanation:

The idea of derivative work does not belong to the field of computing originally, it is a concept in copyright law referring to written works, art works, music etc. In applying this to computing, it is not generally agreeable what constitutes a derived work (a piece of software), but it is reasonable to understand that if you build a software using another person's codebase, or when a reasonable part of your code is taken from someone's code, then your software is not entirely yours because it is derived from others and a permission known as copyleft is required.

You might be interested in
The advanced boot options screen can be displayed by pressing what key during the boot sequence?
mart [117]
It depends what system you are using usually it's F11 and F12
6 0
3 years ago
Which of the following is a negative impact of technology on society
vlada-n [284]

Modern technology has absolute control over our lives. Nowadays we work, love, shop, play and communicate with each other and the world online. We have embraced advanced technology, seeking only the benefits and completely ignoring the downfalls. The social impact of technology is huge because today we spend more time online than ever before and the Internet plays a key role in various areas of our lives. There’s no doubt that modern technology has facilitated our lives and our communication with the world, but it also has many visible flaws.

4 0
4 years ago
Selective colleges choose to have in-person meetings to learn more about the applicants. These meetings are called:
lubasha [3.4K]
The meeting is called collage interviews
4 0
3 years ago
Read 2 more answers
The concept of the internet was developed by the u.s. department of defense as a network that ________ in event of an attack.
Shkiper50 [21]
<span>Would not be easily distrupted</span>
8 0
3 years ago
The arguments in a method call are often referred to as ____ . The variables in the method declaration that accept the values fr
Snezhnost [94]

Answer:

The arguments in a method call are often referred to as <u>actual parameters</u>. The variables in the method declaration that accept the values from the actual parameters are <u>formal parameters</u>.

Explanation:

Method is a small piece of program that is used to solve the particular problem. The problem may be repeat at multiple instances, so a method is written and call it on multiple places where it needed.

There are two different types of parameters used in methods. Actual parameters and formal parameters. Actual parameters are those, that are used in method call contain actual values that need to processed through method. Formal parameters are used for the purpose of declaration and accept the values that contains by actual parameters at the time of method call.

4 0
3 years ago
Other questions:
  • Which mode of IPSec should you use to assure the integrity and confidentiality of data within the same LAN?a. AH promiscuous mod
    6·1 answer
  • Select the correct statement below. Group of answer choices
    6·2 answers
  • Need help with Brainly!! Thanks in advance for sharing your thoughts or answering any of my questions on this. [][] Firstly, Bra
    14·1 answer
  • Regarding computer protection, quarantining is defined as ________.
    9·1 answer
  • Plez answer this
    10·1 answer
  • Need answer ASAP!!!!!
    6·1 answer
  • Comment if u wanna text me on behance
    6·1 answer
  • Which is the most correct option regarding subnet masks?
    10·1 answer
  • In disc brakes, pads are forced against the of a brake disc​
    14·1 answer
  • When you _______ the top row or the left column, you can keep column headings and row labels visible as you scroll through your
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!