1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
4 years ago
12

Using examples, evaluate the open source model of software development. In your discussion highlight some of its advantages and

disadvantages. Furthermore, explain some of the alternatives that also exist.
Computers and Technology
1 answer:
exis [7]4 years ago
5 0
Hope this helps! Good luck!

You might be interested in
A ________ is a type of page break. section break column column break section
Setler [38]
Bar of soap will break
7 0
4 years ago
A cell reference is also called a cell _______.
viva [34]
A cell reference is also called a cell address.
7 0
3 years ago
Which storage device is not recommended as a permanent storage solution?
Brut [27]

Answer:

In comparison to permanent storage, non-permanent storage, also called volatile memory, is a storage device whose data is lost when its power source is disconnected. Examples of non-permanent storage include CPU cache and RAM.

Explanation:

i just know

8 0
2 years ago
Is there any way to edit question?
kicyunya [14]

Yes, there should be a writing tool next to your question, but if someone answered your question you can’t edit it.

3 0
3 years ago
Which of the following are recent trends? Check all of the boxes that apply.
allochka39001 [22]

Answer:

More access points

New applications

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • QUESTION : John travels a lot and he needs to access his documents and services on the go. Which of these technologies allows hi
    15·1 answer
  • 20. Which of the following describes an acceptable print resolution?
    10·2 answers
  • Which of the following tasks can you perform using a word processor?
    12·1 answer
  • Given an integer variable strawsOnCamel, write a statement that uses the auto-increment operator to increase the value of that v
    12·1 answer
  • Bobby is investigating how an authorized database user is gaining access to information outside his normal clearance level. Bobb
    14·1 answer
  • One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
    14·1 answer
  • Which characteristic describes a flash lighting setup?
    6·1 answer
  • Where can i make an animation for free?
    10·1 answer
  • Why stress testing is needed?​
    14·2 answers
  • Creat your own guideline in using search engine , using keywords and getting links in a online setting?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!