1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
11

Do you really think our life applications and OSs will be open source at the end for everything?

Computers and Technology
1 answer:
algol [13]3 years ago
4 0

Answer:

 Yes, the given statement is true because the life applications like various networking application and computer and television shows are basically operated and monitored by various OSS  (operational support system).

The open source basically refers to the system which is open for all so that everyone can easily contribute. The operational support system handle all the applications based on our daily life. By proper analyzing the operational system so that it provide efficient output and various resources.

Therefore, various life application and operational system are open source.  

You might be interested in
Yolanda is making a banner for a school pep rally. She cuts fabric in the shape of a parallelogram. The angle at the bottom left
Irina18 [472]

The answer is 100°

A parallelogram is any four sided shape with two pairs of opposite parallel and equal length sides. It is safe to say that a square is a parallelogram and not the other way round.

To explain how we got to 100 degrees, I have attached an image. Based on the image attached, the opposite angles are equal. The adjacent angles are supplementary. With this in mind, the supplement of 80° will be 100°


5 0
4 years ago
Read 2 more answers
Please answer questions in complete sentences!
Troyanec [42]

i need help on that too :cc

7 0
2 years ago
Please Help Me <br> Why is IT important to different businesses?
Vesna [10]

Answer:

Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.

Explanation:

your welcome but ew..

6 0
3 years ago
While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
PolarNik [594]

Answer:

C. Escalate the problem to a server administrator to check for issues with the server.

Explanation:

Pinging is a tool or program that IT technicians and professional for testing if a particular host or server is reachable. Since after the support technician pinged the email server from various location and the LAN results in 0% packet loss, this means that the fault is not from the LAN, but that the host server or server administrator is unreachable or have issues. Thus, the next step of troubleshooting is to escalate the issue to the server administrator to check for issues with their server.

5 0
3 years ago
You are employed as a network administrator at Widget. The Widget network is TCP/IP based. You have been instructed to configure
wolverine [178]

DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease acknowledgement. These stages are often abbreviated as DORA for discovery, offer, request, and acknowledgement.

Explanation:

  • DHCP provides reliable IP address configuration, while reducing network administration.
  • Discovery : The DHCP client broadcasts a DISCOVER message on the network subnet using the destination address or the specific subnet broadcast address.  A DHCP client may also request its last known IP address
  • Offer :When the server receives a DISCOVER message from a client, which is an IP address lease request, the DHCP server reserves an IP address for the client and makes a lease offer by sending a OFFER message to the client.
  • Request : In response to the DHCP offer, the client replies with a REQUEST message, broadcast to the server,[a] requesting the offered address.
  • Acknowledge : When the DHCP server receives the REQUEST message from the client, the configuration process enters its final phase. The acknowledgement phase involves sending a ACK packet to the client.
7 0
3 years ago
Other questions:
  • HELP ASAP!!!!!!!!! ITS A UNIT TEST: WILL MARK AS BRAINLIEST&gt;
    13·1 answer
  • Which of the following is the best example of a manager with a delegator leadership style
    10·2 answers
  • The two ways to use the help menu is by searching of the contents or searching the _____
    13·2 answers
  • How do you reduce computer screen flicker
    11·1 answer
  • Wedding photographers must be skilled at producing photographs that capture the
    8·1 answer
  • PLEASE ANSWER
    6·1 answer
  • EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.
    8·1 answer
  • How can you protect your information when using wireless technology
    10·1 answer
  • Which of the following are exclusively associated with copyright protection
    5·2 answers
  • Question: 4/8
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!