1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
7

Which of the following best describes open source software?

Computers and Technology
2 answers:
rusak2 [61]3 years ago
7 0

a type of software that is open to the public and can be modified.


sp2606 [1]3 years ago
5 0
What was the options they gave you?
You might be interested in
A client calls to complain that his computer starts up, but crashes when Windows starts to load. After a brief set of questions,
melomori [17]

Answer:

It may be that the amount of ram is not compatible with that computer, it may not support ram that is over 8 GB or higher, it may not be properly installed in the hardware, or the motherboard may not be able to read it.

Explanation:

Hardware and software is very unbalanced when it comes to new RAM being installed, as people complain about this exact same issue many times.

5 0
4 years ago
A ___ is a mobile device that typically ranges from seven to ten inches in size.
Ber [7]

A tablet computer, or commonly known as tablet,  is a mobile device that typically ranges from seven to ten inches in size. It has mobile operating system and LCD touchscreen display processing circuitry. The touchscreen display is operated by  finger. The tablet has many all of the functionalities of a computer, but not all of them.


3 0
4 years ago
The retention of encoded information over time refers to
Crank

It refers to Storage

7 0
2 years ago
What level of damage to national security can you reasonably expect top secret information to cause if disclosed?.
Vinvika [58]

Exceptionally grave damage is the level of damage to national security can you reasonably expect top secret information to cause if disclosed.

When it is conceivable that information's unauthorized exposure could result in exceptionally severe harm to the country's security, it may be given the "Top Secret" classification. The strictest caution should be exercised while applying this classification.

Armed hostilities against the United States or its allies, a breakdown in international relations that has a significant impact on national security, the compromise of crucial national defense plans or sophisticated cryptologic and communications intelligence systems, the disclosure of sensitive intelligence operations, or the disclosure of scientific or technological advancements that have a significant impact on national security are examples of "exceptionally grave damage."

The level of harm to national security that can be expected from the disclosure of top-secret material is exceptionally grave damage.

To know more about exceptionally grave damage click here:

brainly.com/question/2802958

#SPJ4

3 0
1 year ago
Create a datafile called superheroes.dat using any text-based editor, and enter at least three records storing superheroes’ name
vitfil [10]

Answer:

Open a text-based editor like Microsoft word, notepad, libraoffice, etc, type the name of the super hero on the first field and the main power on the second field. Then click on the file menu or press ctrl-s and save file as superheroes.dat.

Explanation:

The file extension 'dat' is used to hold data for programs, for easy access. The file above holds data in fields separated by a space and has multiple records.

7 0
4 years ago
Other questions:
  • The smallest unit of storage in the following list is a
    7·1 answer
  • Within the Differentiated Services (DiffServ) architecture, how many classes of service (CoS) are there?
    7·1 answer
  • Draw the gates required to build a half adder.
    12·1 answer
  • Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value is consi
    6·1 answer
  • A dog walks 10 km north in 2 hours and then 8 km south in 1 hour.
    10·1 answer
  • A powerful computer that acts as a hub for other computers is a called a ______.
    15·2 answers
  • Let’s say you are given a number, a, and you want to find its square root. One way to do that is to start with a very rough gues
    15·1 answer
  • Assume TCP is operating in steady state congestion avoidance phase (no slow start) and the maximum congestion window size is 220
    8·1 answer
  • Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer dema
    10·1 answer
  • can i get an access code for free online? if yes, what website is it so i can get a free access code?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!