1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
3 years ago
9

A developer wants to take existing code written by another person and add some features specific to their needs. Which of the fo

llowing software licensing models allows them to make changes and publish their own version?
Open-source


Proprietary


Subscription


Software-as-a-Service (SaaS)
Computers and Technology
1 answer:
anzhelika [568]3 years ago
7 0

Answer:

open-source

Explanation:

open-souce software allows any user to submit modifications of the source code

You might be interested in
Help!!!
Butoxors [25]

Answer:

ummmm try the inequality protragathron theorum

Explanation:

ok

3 0
3 years ago
Which address correctly represents one that is composed of two halves, one assigned to a network adapter manufacturer, and the o
Vlad1618 [11]
 Media access control address
5 0
3 years ago
What is the best java 3d modeler library?
LenaWriter [7]
I believe its "Thinking Universe"
5 0
4 years ago
In a networked environment, each computer on the network can access the hardware on the network. True of False?
kakasveta [241]
Access independ on your network it secure or not if not secure you can access to any hardware on the network
7 0
4 years ago
How many host addresses are needed in the largest required subnet?
prohojiy [21]
<span>The subnet is a logical subdivision of an IP network</span><span>
There are 25 host addresses needed in the largest required subnet.
</span>To subnet a network, bits from the host portion of the original network mask are changed into subnet <span>bits. The number of subnet bits borrowed from the host portion defines the number of subnets.
</span>
3 0
3 years ago
Other questions:
  • Samuel is working on decimal and binary conversion for his college project.He is using the binary number 111011 and wants to exp
    8·1 answer
  • _____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard to the users interest
    14·1 answer
  • How is Office 365 different from Windows Live Office?
    12·1 answer
  • You (blank) see stop signs on highways.
    9·2 answers
  • Which of the following is not a location where text can be entered​
    15·1 answer
  • Define some everyday if else statements you use to determine action. What are the branches of your statement?
    12·1 answer
  • Ignorance of policy is a legal excuse for an employee. TRUE or FALSE
    11·1 answer
  • Write a shell (text-based) program, called first_word.py, that opens the file stuff.txt and prints out the first word of every l
    14·1 answer
  • In 5-10 sentences, describe the procedure for responding to an e-mail message.
    5·1 answer
  • What is computer forensics? Where and how would an IT auditor use thisresource?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!