1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
2 years ago
9

A developer wants to take existing code written by another person and add some features specific to their needs. Which of the fo

llowing software licensing models allows them to make changes and publish their own version?
Open-source


Proprietary


Subscription


Software-as-a-Service (SaaS)
Computers and Technology
1 answer:
anzhelika [568]2 years ago
7 0

Answer:

open-source

Explanation:

open-souce software allows any user to submit modifications of the source code

You might be interested in
What is the full form of GUI​
77julia77 [94]

Answer:

(GUI) stands for Graphical User Interface

3 0
2 years ago
Read 2 more answers
What is network topology​
Fynjy0 [20]
DescriptionNetwork topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.
3 0
3 years ago
What is the best way to describe how your voice should sound when you read a story out loud
umka21 [38]
Full of emotion and not like a robot 
3 0
3 years ago
Firmware is: *
drek231 [11]

Answer:

Software that is embedded in hardware.

Explanation:

It is permanent software programmed into a read-only memory.

3 0
3 years ago
Read 2 more answers
In order to protect your computer from the newest virus, which of the following should you do after you've installed a virscan s
NNADVOKAT [17]
After installing your anti-virus, you must do the following to make sure that your computer will be virus free moving forward:

1. Scan every drive of your computer.
2. Scan every program, photo, video, etc before opening those.
3. Avoid visiting restricted sites.
4. Update your antivirus application. This way, the application gets new virus database.
5. Schedule antivirus scanning.
6. If your antivirus application do not have scheduled scanning, plan it.
7. Install antivirus widgets or extension in your web browser.
8. For maximum protection, you can install another antivirus application.
9. Uninstall risky applications.
10. Scan flashdrives before opening or exploing those. Avoid borrowing flashdrives.
11. Avoid inserting your flashdrives to other devices.
12. Defrag your system. Some virus can't be detected because your system's drive may be badly fragmented.

3 0
3 years ago
Other questions:
  • Jack wants to store a large amount of data on his computer. He chooses to use a database for this purpose. What is a database? A
    8·1 answer
  • How does the occupational outlook affect the monetary benefits of a career
    11·1 answer
  • HEY DO U LIKE TRAINS!
    7·1 answer
  • For his class project, Matt has to create an image in a color scheme that has shade or tint variations of the same hue. Which co
    7·1 answer
  • I have the assembly for the max. can someone change the variables of it and make it min. I mean, the assembly for finding the mi
    7·1 answer
  • Explique si en la pc que se usa para hacer las tareas escolares se puede ver un video juego de los llamados “pesados”
    13·1 answer
  • How many bits would be needed to count all of the students in class today there is 20 students
    6·1 answer
  • We can include following item(s) during configuration itemidentification:
    10·1 answer
  • True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that int
    10·1 answer
  • The program requires the age to be between 0 and 8.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!