1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
6

PLEASE help me i dont get this at all

Computers and Technology
2 answers:
zalisa [80]3 years ago
7 0

Answer:

1. You can use them to indicate what other people are allowed to do with your work

2. This license lets others remix, adapt, and build upon your work even for commercial purposes, as long as they credit you and license their new creations under the identical terms

3. one of the licenses created by the Creative Commons project. A work licensed in this way allows the following: The freedom to use and perform the work

4. This license lets others remix, adapt, and build upon your work non-commercially, and although their new works must also acknowledge you and be non-commercial, they don't have to license their derivative works on the same terms

5. This license lets others remix, adapt, and build upon your work non-commercially, as long as they credit you and license their new creations under the identical terms

zepelin [54]3 years ago
6 0

Answer:

dont know dont really care

Explanation:

You might be interested in
Consider the following code segment, where num is an integer variable.int[][] arr = {{11, 13, 14 ,15},{12, 18, 17, 26},{13, 21,
Setler79 [48]

Answer:

c. 16 17

Explanation:

Given

num = 14

The above code segment

Required

The output

In the code segment, we have the following iterations:

for (int j = 0; j < arr.length; j++) and for (int k = 0; k < arr[0].length; k++)

The above iterates through all the elements of the array.

The if condition is true, only on two occasions

(i) When i = 0; j = 2

(ii) When i = 3; j = 0

i.e.

arr[0][2] = 14

arr[3[0] = 14

So, the result of the print statement is: j + k + arr[j][k]

(i) When i = 0; j = 2

j + k + arr[j][k]  = 0 + 2 + 14 = 16

(ii) When i = 3; j = 0

j + k + arr[j][k]  = 3 + 0 + 14 = 17

<em>Hence, (c) 16 17 is true</em>

6 0
3 years ago
A binary floating-poi Select 3 true statements about Python primitive types.
IRISSAK [1]

The true statements about Python primitive types.

  • 32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)
  • A binary floating-point method is used to represent fractions in binary numbers.
  • The decimal number 0.1 cannot be expressed without error in binary floating-point format.

<h3>What are  Python primitive types?</h3>

The  Python primitive types is known to be made up of four primitive data types which are:

  • Integer.
  • Float.
  • String.
  • Boolean.

Note that The true statements about Python primitive types.

  • 32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)
  • A binary floating-point method is used to represent fractions in binary numbers.
  • The decimal number 0.1 cannot be expressed without error in binary floating-point format.

Learn more about Python from

brainly.com/question/26497128

#SPJ1

7 0
2 years ago
__________ is software that comes hidden in free downloadable software that tracks online movements, mines the information store
denis23 [38]

Answer:

Spyware

Explanation:

Spyware is the software which is used to track the online movements, it also track the user action on the computer they are also called sneakware  or stealthware

  • This software is used  in the business purpose which it may be used in the office to track the record of employee in the working hours .
  • Spyware  software is used to track the information without knowing the user.

 

7 0
3 years ago
Use the AND function with appropriate arguments in cell H11 to determine if there is a force out at third base. There is a force
Pie

Answer:

=AND($C11 = "Yes", $D11 = "Yes")

Explanation:

The AND function takes conditional inputs and tests if each of them are TRUE. If all of the inputs are TRUE, the function will output TRUE but if any one of them are not the function will output FALSE. This scales to multiple inputs but this example only has two conditions. It is important to remember that we want to compare a string so our condition must be "Yes", not just Yes.

We also use a relative cell reference, "$", on the columns C and D since we always want to use the "Runner on 1st" and "Runner on 2nd" columns.

6 0
4 years ago
ystem, the design of which was developed using customary structured methods. To manage the intricacy of the application developm
Soloha48 [4]

Answer:

Organized plan is utilized to change the auxiliary examination (for example modules and their interrelation) into a straightforward graphical structure. It is essentially done in two stages:  

1. Transform Analysis  

2. Transaction Analysis  

For showing control stream in organized investigation we use Flow diagrams, But for indicated choice in organized examination, we frequently use choice tree. In choice tree we use hover for current state. An example decision tree is attached with the appropriate response, benevolently allude the equivalent.

4 0
3 years ago
Other questions:
  • The total number of errors divided by the total number of bits transmitted is the definition of __________. committed informatio
    14·1 answer
  • A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected wi
    14·1 answer
  • Space management is a<br> driving method.<br> A. lazy<br> B. defensive<br> C. fast
    14·1 answer
  • Natalie is a secretary and must complete a large amount of filing this afternoon. At 1:00 PM, the office receptionist gets sick
    10·1 answer
  • In the following code, use a lock to protect any data that might need protecting. Keep your critical sections as small as possib
    8·1 answer
  • Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
    13·1 answer
  • Which of the following is not a data in python. float, integer, bool, str.​
    14·1 answer
  • Kirsten manages the infrastructure that hosts her company's CRM platform. She currently has a production environment that all of
    5·1 answer
  • 4.
    8·1 answer
  • The sticky notes often have strings of characters written on them that appear to be passwords. What can you do to prevent the se
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!