1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
11

PLEASE HELLPPPPP EVERYONE IS IGNORING THISSSSSSSSSS

Computers and Technology
1 answer:
Ludmilka [50]3 years ago
8 0

Answer:

Permissive licenses are also known as Apache style or BSD style. They contain minimal requirements about how the software can be modified or redistributed

Explanation:

You might be interested in
Fundamental types of data, such as strings, integers, and real numbers, are known as
alina1380 [7]

Solution:

Fundamental types of data, such as strings, integers, and real numbers, are known as primative data type.

Primitive data structures are char, int, float, double. ... There comes derived data structures and user defined data structures. Derived data structures are also provided by the system but are made using premitives like an array, a derived data. It can be array of chars, array of ints.

Thus the right answer is primative data type.

4 0
4 years ago
Jeffery wants to locate reliable academic information on the effects of global warming and ways to conserve energy. What is the
NNADVOKAT [17]

Answer:

Strategy based on some scenario as follow.

Explanation:

For efficient and effective search for database let consider some point such as use and to combine the words

Jeffery want academic information and conserve energy

Use asterisk and question mark and exclamation point

academic information* energy

If database has a subject then find out it.

Global warming have not the phrase "global warming " anywhere in it.temperature records and climate change are two words

                       

8 0
3 years ago
___ Jacking is a crime that takes place when a hacker misdirects URL to a different site. The Link Itself Looks Safe, But the us
const2013 [10]

Answer: Web Jacking

Here, the hacker takes control of a web site fraudulently. He may change the content of the original site or even redirect the user to another fake similar looking page controlled by him.


If you have any other questions about computers or even hacking hit me up because I know a lot about computers

6 0
3 years ago
What classes should I take in high-school for majoring in computer science?
Gala2k [10]

Answer:

Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.

Explanation:

6 0
3 years ago
Explain the five design principles that cartographers use when designing a map.<br>HELP ASAP
Dovator [93]

Answer:

Five of the main design principles are legibility, visual contrast, figure-ground organization, hierarchical organization, and balance. Together these principles form a system for seeing and understanding the relative importance of the content in the map and on the page.

Explanation:

3 0
4 years ago
Other questions:
  • What is the name of the process that is used to establish whether or not a user’s identity is legitimate?
    7·1 answer
  • What type of mitigation provision is utilized when redundant communications links are installed?
    8·1 answer
  • What does it mean for a school to be “accredited”?
    5·1 answer
  • What to do when you strip a screw
    10·2 answers
  • What is the term used to describe a computer system that can store literary documents, link them according to logical relationsh
    5·1 answer
  • Write a Java program that prints out a 4x4 square (like the one below)
    11·1 answer
  • Convert each number into scientific notation.
    6·1 answer
  • How to create diagram that demonstrates the step<br> by step procedures in performing a mail merge.
    12·1 answer
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
  • The area of ai that investigates methods of facilitating communication between computers and people is?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!