1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zubka84 [21]
3 years ago
6

A program that is free to use and make changes to is

Computers and Technology
2 answers:
jenyasd209 [6]3 years ago
5 0

Answer:

open source

Explanation:

Stels [109]3 years ago
4 0

Answer:  C) Freeware.

Explanation:

You might be interested in
Which of the constraints listed below would be considered a physical constraint
timurjin [86]
Materials

materials are the only physical thing
8 0
2 years ago
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
3 years ago
Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
erma4kov [3.2K]

Treasury bond − Diversified mutual fund - Stocks.

An investment is an asset or item that is purchased with the hope that it will generate income or will appreciate in value. All investments involve some degree of risk. In finance, risk refers to the degree of uncertainty or potential financial loss that could happen in an investment decision.

In general, as investment risks rise, investors seek higher returns to compensate themselves for taking such risks. Relying on personal resources has more risk than relying on public resources of producers.

Usually, a portfolio made up of 60% stocks, 30% mutual funds, and 10% Treasury bonds would be considered to be the highest risk portfolio.

3 0
3 years ago
What is the black oval for on the back of an ipod touch for?
Brut [27]

The black strip is wifi antenna for iPod Touch.

5 0
3 years ago
Express 42 as a product  of its prime factor​
salantis [7]
The only way to write 42 as the product
of primes.

Except to change the order of the factors is
2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.
6 0
2 years ago
Read 2 more answers
Other questions:
  • Consider the following sequence, defined from n=2 to 15 (inclusive). Pn=n2−1. Produce a list named primes which only contains va
    10·1 answer
  • Which of the example DFSs discussed in this chapter would handle a large, multiclient database application most efficiently? Exp
    14·1 answer
  • Assuming that the user enters 45 and 62 as inputs for n1 and n2, respectively, what is the output of the following code snippet?
    15·1 answer
  • Assume that strikeCounter has already been declared to be a "pointer to int". Assume further that strikeCounter has been initial
    7·1 answer
  • Write a c program to count the total number of commented characters and words in a c file taking both types of c file comments (
    11·2 answers
  • What is information technology?
    9·1 answer
  • How do i fix this to make it run ???
    9·1 answer
  • A computer can manipulate symbols as if it understands the symbols and is reasoning with them, but in fact it is just following
    15·1 answer
  • Which Save As element allows a user to save a presentation on a computer?
    11·1 answer
  • The question is in the photo
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!