1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
11

Commercial technical data and commercial software:_________.

Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
4 0

Answer:

Must be available to consumers to qualify as commercial.

Explanation:

According to Defense Federal Acquisition Regulation Supplement and Federal Acquisition Regulation Supplement technical data and software belongs to the authentic developer or the direct beneficient otherwise, if made available to consumers it will then be regarded as the "Commercial technical data and commercial software."

Hence, the right answer to the question is option C "Must be available to consumers to qualify as commercial."

You might be interested in
Technical safeguards involve the hardware and software components of an information system. group of answer choices true false
mamaluj [8]

The statement technical safeguards involve the hardware and software components of an information system' is true.

In the field of information security, technical safeguards can be described as components that provide security to an information system. The technical safeguards can either be hardware or software used for the protection of data in a system.

Technical safeguards ensure that only those personnel that have permission to access a certain data or system can use it.

Different technical safeguards used are Identification and authentication, Encryption, Firewalls, Malware protection, and Application design. All these safeguards ensure that any data does not pass to an unauthorized entity. Malware protection protects a system from viruses and other kinds of malware that hackers can use for stealing data.

To learn more about technical safeguards, click here:

brainly.com/question/18074746

#SPJ4

4 0
2 years ago
The use of _______________ can validate input responses from clients and prevent certain attack methodologies
ElenaW [278]

Answer:

The use of Javascripts  can validate input responses from clients and prevent certain attack methodologies

Explanation:

A javascript is basically a “client-side scripting language” mostly use to capture data or to validate the response from the client in the client side. It avoids unnecessary transfer of information from client side to the server side, thus making the online web application to work faster. I

t is also used to add special effects or dynamic pages. It works well with HTML which is a language understood by the browser. So, a javascript is called by an element from the HTML. The function call is very similar to the function call made in the other programming languages.

4 0
3 years ago
Select the correct answer. Which of these statements is an explorer most likely to make?​
Varvara68 [4.7K]

Answer:

Then it would be D for your answer. :)

Explanation:

please mark brainliest! :)

and have a great day!

3 0
3 years ago
Pick the two statements about packets and routing on the Internet which are true. a. Packets travelling across the Internet take
Cloud [144]

Answer:

B. TCP ensures messages can be reliably transmitted across the Internet.

D. TCP must account for the fact that packets may not arrive at a destination computer in the intended order

Explanation:

TCP or transmission control protocol is a connection oriented protocol that divides a packet to segments, and reliably sends them to their destination.

TCP is a layer 4 (transport layer) protocol in the OSI network model. Its packets data unit, PDU, is called segment.

For TCP connection to be successful, a three way handshake must be established between the client and server.

When a connection is established, tcp sends the packets in sequenced segments to the destination through various routes, the source receives acknowledgement for segments received by the destination and the source resend segment that were lost. In the destination, the TCP arranges the segments to its proper sequence.

8 0
3 years ago
Using data from a tal distribution database, define a view named toplevelcust. it consists of the number, name, address, balance
valentina_108 [34]
A) CREATE TABLE toplevelcust (number INTEGER PRIMARY KEY, <span> name TEXT, address TEXT, balance DOUBLE, credit DOUBLE</span>);

b) select number, name, credit - balance from toplevelcust

c) This I cannot answer
7 0
4 years ago
Read 2 more answers
Other questions:
  • What is the answer please
    13·2 answers
  • The variable sentence stores a string. Write code to determine how many words in sentence start and end with the same letter, in
    13·1 answer
  • A _____________ is some text or data that is stored on your computer and used by a website to track how you use that site. quest
    8·2 answers
  • Regional culture has been affected by technology in these ways. Select all that apply. decreased educational opportunities impro
    9·2 answers
  • Why is it important to bring standalone systems into the domain? 4?
    8·1 answer
  • What can help prevent issues related to downloading content from the internet
    11·2 answers
  • Passwords are usually alphanumeric and usually cannot contain spaces or ________.
    10·2 answers
  • $
    15·2 answers
  • Three classifications of operating system​
    8·1 answer
  • A.1111+1011. b. 10111+11111 c. 1111*1011 d. 1110*1101 perform the binary calculations.​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!