1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
12

Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal informati

on manager V. proprietary A. software used to keep track of appointments B. software that is hosted on a website C. software used to track tasks and coordinate resources D. software which must be purchased E. software code that is freely available
Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
6 0

Answer:

A. Personal information manager.

B. Web-based.

C. Project management.

D. Proprietary.

E. Open source.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Simply stated, it is a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into the following categories;

A. Personal information manager: software used to keep track of appointments. It can be used to schedule and manage schedules easily.

B. Web-based: software that is hosted on a website. It works based on cloud computing services and as such requires the use of internet for use at all times.

C. Project management: software used to track tasks and coordinate resources.

D. Proprietary: software which must be purchased. It also known as a closed-source software and can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

E. Open source: software code that is freely available. It is typically published as a free software that may be downloaded on various platforms by the end users.

You might be interested in
Jason is creating a web page for his school's basketball team. He just finished creating his storyboard. Which tool should he us
xeze [42]

Jason should use a text editor

3 0
3 years ago
Read 2 more answers
Qr code is more developed than barcode​
Blizzard [7]

While a barcode only holds information in the horizontal direction, a QR code does hold information in both horizontal and vertical directions. Due to this, a QR code holds hundreds of times more information than a barcode.

With that being said they have different purposes, and there about the same developed as each other, unless you count how much information they can store.

7 0
3 years ago
Which is a benefit of using the paste link option?
kherson [118]
It helps because its a faster way to copy a link .     
8 0
3 years ago
Read 2 more answers
Net Worth is equal to assets minus liabilities. Which event will have the greatest impact (positive or negative) on one's net wo
kolezko [41]
The answer would be: Go on a vacation that costs $3,500 

Paying off money for buying a car will not decrease your net worth as you get the car as assets for the money you use. But the depreciates 20% will cause you to lose $3,000 assets. Assuming you are not buying assets at all, go on a vacation that costs $3,500 will increase liability without any effect on assets. Paying up bills will decrease your asset but it also decreases your liability so the net worth wouldn't change. 
7 0
3 years ago
There are a few simple rules that you can follow to store and manage files and folders in your computer. What is the most import
Nitella [24]
You should avoid deleting the unknown files to store your personal files and folders because if you delete that files it may be critical position with computer.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which folder is the default choice for saving bitmap or JPEG files created by a user?
    9·1 answer
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • Often used in connection with a business
    6·1 answer
  • Given the following while() loop, which statement is true assuming A,B,C,D are int variables and A > B? while ( ( A >= B)
    8·1 answer
  • Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis
    10·1 answer
  • Explain the computer according to size​
    10·1 answer
  • Why was it important for the date format to be standardized by the
    7·1 answer
  • Write a program that repeatedly takes integers from the user as long as he
    7·1 answer
  • Silas develops this algorithm to compute the calories burned for an activity for a given number of minutes and body weight: If t
    6·1 answer
  • Laptop computers use PCMCIA cards, another type of ________
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!