1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
2 years ago
6

Please help...........​

Computers and Technology
2 answers:
9966 [12]2 years ago
7 0

Answer:

A :is concerned with defending users’ freedom of use

C:makes source code available for editing

Hope it helps!

- miah

MrMuchimi2 years ago
4 0

Answer:

Explanation:

As a user of GPL v3 software, you have lots of freedom: You can use GPL software for commercial purposes. You can modify the software and create derivative work. You can distribute the software and any derivative work you produce, without having to ask for permission or pay

You might be interested in
Which of the following BEST describes the relationship between the Boston Marathon bombing and biometrics?
ale4655 [162]

Answer:

Because of the newly developed biometric technology, the FBI was able to

quickly identify two suspects.

The blurry photos released by the FBI after the bombing prompted

researchers to improve their early biometric software.

Because biometric technology was unavailable at the time, the Boston

Marathon bomber remains at large.

The Boston Marathon bombing made researchers aware of how biometric

technology is sometimes useless and ineffective.

Explanation:

6 0
2 years ago
Which is a disadvantage of pie charts?
anzhelika [568]
While the reader of a pie chart can clearly see which categories dominate, it can be difficult to see categories that occupy only a small percentage of the chart. This problem becomes worse if there are many small categories in the chart. Labeling the categories can also be difficult.
6 0
3 years ago
Why would a designer choose to use a static layout? Check all of the boxes that apply.
Dafna1 [17]

Answer:

Explanation:a & c

6 0
2 years ago
Solid _____ is one color used throughout the entire slide.
andreev551 [17]
Solid Fill is one color used throughout the entire slide. It is possible to apply solid colors to the objects inside your slides, it may be line or fill. Usually in a powerpoint background, solid fill is used to make the presentable presentable.
7 0
2 years ago
Design pseudocode for a program that will permit a user to store exactly 50 numbers in an array. Create an array big enough to h
galben [10]

Answer:

#include<stdio.h>

//declare a named constant

#define MAX 50

int main()

{

   //declare the array

   int a[MAX],i;

   //for loop to access the elements from user

   for(i=0;i<MAX;i++)

   {

      printf("\n Enter a number to a[%d]",i+1);

      scanf("%d",&a[i]);

  }

  //display the input elements

  printf("\n The array elements are :");

  for(i=0;i<=MAX;i++)

  printf(" %d ",a[i]);

}

Explanation:

PSEUDOCODE INPUTARRAY(A[MAX])

REPEAT FOR I EQUALS TO 1 TO MAX

PRINT “Enter a number to A[I]”

READ A[I]

[END OF LOOP]

REPEAT FOR I EQUALS TO 1 TO MAX

PRINT A[I]

[END OF LOOP]

RETURN

ALGORITHM

ALGORITHM PRINTARRAY(A[MAX])

REPEAT FOR I<=1 TO MAX

PRINT “Enter a number”

INPUT A[I]

[END OF LOOP]

REPEAT FOR I<=1 TO MAX

PRINT A[I]

[END OF LOOP]

6 0
3 years ago
Other questions:
  • Suppose you're trying to remove the clamp from a ground strap that's connected to a battery. The clamp won't come loose. Which o
    14·2 answers
  • You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the ind
    6·1 answer
  • How does technology helps save the environment?​
    6·1 answer
  • The idea generating technique most often used in writing business letter is ?
    9·2 answers
  • What do character formats do for your document's message? A. Set how text aligns within a document B. Provide organization C. Pr
    6·2 answers
  • What are factors that limit a technological design
    11·2 answers
  • Your wireless network has been breached and it seems as though the attacker has modified a portion of your data that is used wit
    12·1 answer
  • If you want Nud3s add me on sc Kermit4lyfe1
    11·2 answers
  • write a pay-raise program that requests a person's first name, last name, and current annual salary, and then displays the perso
    6·1 answer
  • Rolulzoss<br>A. State three positive uses of computers in the government sector​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!