1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
11

Do you really think our life applications and OSs will be open source at the end for everything?

Computers and Technology
1 answer:
algol [13]3 years ago
4 0

Answer:

 Yes, the given statement is true because the life applications like various networking application and computer and television shows are basically operated and monitored by various OSS  (operational support system).

The open source basically refers to the system which is open for all so that everyone can easily contribute. The operational support system handle all the applications based on our daily life. By proper analyzing the operational system so that it provide efficient output and various resources.

Therefore, various life application and operational system are open source.  

You might be interested in
A money ____ refers to moving a cash amount from one account to another.
Julli [10]
Money Transfer.
HOPE THIS HELPS!
5 0
3 years ago
Read 2 more answers
With respect to PERT and​ CPM, slack A. is a task or subproject that must be completed. B. marks the start or completion of a ta
Wewaii [24]

Answer:

The correct answer is C) With respect to PERT and​ CPM, slack is the amount of time a task may be delayed without changing the overall project completion time.

Explanation:

The CPM (Critical Path Method) method is frequently used in the development and control of projects whose tasks have a fixed duration while the PERT (Program Evaluation and Review Techniques) method is a set of techniques with the same purpose but that allows to work with tasks with estimated probability duration but not deterministic.

Both methods are based on developing a complete scheme that includes all the tasks of a project linked to each other according to their sequence, determining the duration and analyzing different ways of reconfiguring the task planning to optimize the use of the resources of according to the general objectives of the project.

There are tasks that to start performing them must have been completed one or more previous tasks. The overall duration of the project is determined by the Critical Path, which is the sequence of tasks of greater duration. The tasks belonging to the critical path have to be carried out with special care because delays in them would cause delays in the total achievement of the project. That is why these tasks have no slack.

The rest of the tasks have some slack, which is determined by the time that a previous task can be delayed without delaying the total time of completion of the project, that is, not exceeding the duration determined by the critical path.

That is that why we say that the <em>slack</em><em> is the amount of time a task may be delayed without changing the overall project completion time</em>.

8 0
3 years ago
What is a computer network?
Contact [7]

Answer:

A computer network is a group of two or more computers that are linked together. Networks are usually used to share resources, exchange files or communicate with other users. so A

Explanation:

7 0
2 years ago
In 3–5 sentences, describe how technology helps business professionals to be more efficient.
quester [9]

Answer:

Technology helps business professionals, keep more organized, communicate better, and effectively keeps businesses secure. Technology helps keep employee information and business paper work more organized using computers and software; while making it easier to communicate with employee's using e-mail and memo's.

Explanation:

8 0
4 years ago
Read 2 more answers
: For each of the following words identify the bytethat is stored at lower memory address and the byte that is storedat higher m
Aloiza [94]

Answer:

In a <u>little endian computer</u> -The data's least substantial byte is put at the lower address byte. The remaining information will be put in memory in order in the next three bytes.

a)1234

4 is placed at the least significant bits,so this byte stored at lower memory address.

1 is placed at the most significant bits,so this byte stored at higher memory address.

b) ABFC

C is placed at the least significant bits,so this byte stored at lower memory address.

A is placed at the most significant bits,so this byte stored at higher memory address.

c) B100

0 is placed at the least significant bits,so this byte stored at lower memory address.

B is placed at the most significant bits,so this byte stored at higher memory address.

d) B800

0 is placed at the least significant bits,so this byte stored at lower memory address.

B is placed at the most significant bits,so this byte stored at higher memory address.

5 0
3 years ago
Other questions:
  • In which career field would the computing technology industry associations compTIA A+ certification be useful
    6·1 answer
  • When you start to type =av, what feature displays a list of functions and defined names?
    11·1 answer
  • What are the most common types of cables in a network?
    6·1 answer
  • Which application is a digital version of a manual typewriter? A. Database B. Presentation C. Spreadsheet D. Word processor
    8·2 answers
  • 75+ (43-54)<br> -12<br> 12<br> 41
    12·2 answers
  • Cual es la fiabilidad de la innovacion tecnologica
    15·1 answer
  • Logan has developed an excellent presentation with interesting content. He received great feedback on the evaluation
    10·1 answer
  • Girls question <br> who wants to go out ;p
    11·2 answers
  • What is the name of the function below?<br><br> function go(){<br> alert("hello everybody");<br> }
    10·1 answer
  • A nested folder can best be described as what?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!