Software whose code is made freely available to others for use, augmentation, and resale is referred to as:
Answer:
Open Source Software
Explanation:
On average, people spend about _____ minutes per day on apps that do not make them feel good such as apps for dating, social networking, gaming, entertainment, news, and web browsing .
Averagely, people (end users) spend about 27 minutes per day on software applications (programs) that do not make them feel good.
A software can be defined as a collection of data or set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.
Basically, software applications (programs) are broadly categorized into three (3) main groups and these are;
System softwareUtility softwareApplication softwareAn application software is typically designed and developed for the performance of a specific task rather than the operation of a computer system.
According to an American survey, people (end users) averagely spend about 27 minutes per day on software applications (programs) that do not make them feel good such as those focused on:
Social networkingDatingEntertainmentGamingNewsWeb browsingOn the other hand, people (end users) averagely spend about 9 minutes per day on software applications (programs) that make them feel good such as those focused on:
HealthExerciseReadingRelaxationEducationFind more information: https://brainly.com/question/14379808
State one technique for overcoming external fragmentation in dynamic partitioning. Why is this technique of overcoming external fragmentation considered inefficient
Compaction often gives solutions to the issues regarding external fragmentation.
One technique for overcoming external fragmentation in dynamic partitioning is
Compaction.
The reason why this technique of overcoming external fragmentation may be inefficient is because:
External fragmentation may need a lot of compaction and it is an expensive operation. The use of contiguous allocation is often hard to fit processes into memory and also it is so difficult to grow or shrink the amount of memory allocated to a process. Compaction only takes place when relocation is dynamic, and this also is expensive.Compaction often shuffle memory notes or contents and then put or pile them up all in free memory and in one large block.
External fragmentation takes place when free memory is removed into small blocks.
Learn more from
https://brainly.com/question/23636593
what is one benefit of utilizing social media to deliver advertising messages?
Answer:
Increased Brand Awareness.
Explanation:
Social media is one of the most cost-efficient digital marketing methods used to syndicate content and increase your business' visibility. Implementing a social media strategy will greatly increase your brand recognition since you will be engaging with a broad audience of consumers.
Answer:
An organization can test ads and promotions before bringing them to traditional media.
Explanation:
Which of the statements indicates that Shane & Co. is an ethical organization?
Shane & Co. deal in manufacturing plastic cups. Despite three years of operations, they haven’t been able to even break even. The irate investors are eagerly waiting for the next financial report that is due. Shane & Co. can manipulate the figures to show growth, however they choose to display the facts as it is. They are sure to lose some of the investors on board but are willing to take the risk.
Shane & Co. deal in manufacturing plastic cups
Despite three years of operations, they haven’t been able to even break even
Shane & Co. can manipulate the figures to show growth
however they choose to display the facts as it is
They are sure to lose some of the investors on board
but are willing to take the risk
Answer:
however they choose to display the facts as it isbut are willing to take the riskHow do Machine Learning (ML) and Artificial Intelligence (AI) technologies help businesses use their enterprise data effectively?
Machine learning and Artifical intelligence helps develop models which are capable of learning continously on its own , hence, progressively getting better based on the amount and correctness of the data. Hence, artifical intelligence and machine learning models helps enterprise to draw insightful pattern from their data, capable of driving enterprise growth.
Models created using these automation technology continously learn from enterprise data, which they convert to reasonable insight which can help enterprise deduce lapses in business and foster business growth.
Hence, machine learning and artificial intelligence helps put enterprise data into good use.
Learn more : https://brainly.com/question/15584994
With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.
Answer:
Your answer is...
Visual.With visual voicemail, users can view message details, and in some cases read message contents without listening to them.
I hope this helped at all.
define hyperlink in detail with its type
Answer:
Hyperlinks are the primary method used to navigate between pages and Web sites. ... Text hyperlink – Uses a word or phrase to take visitors to another page, file or document. • Image hyperlink – Uses an image to take visitors to another page, file or document.
Which of the following is not a view for interacting with a form object?
A. Datasheet view
B. Design view
C. Form view
D. Layout view
question
Which of the following is not a view for interacting with a form object?D. Layout viewhope it helps
Answer:
Layout view Layout view is a more visually-oriented view than Design view.
In every programming language, when you access data stored in an array, you must use a ____ containing a value that accesses memory occupied by the array. a. condition b. key c. subscript and. superscript
Answer: this app allow u to have answers made for students 5 star ap but there are some ads that get in the way
Explanation:
but it is good
What is the role of a control in a system that is functioning correctly
Learning Objectives:
• understand when to use the different
print statements
• create a variable and assign it a value
• use Scanner to read in user input
• print the value of a variable using
printf
Output:
US state: Texas
Capital: Austin
The capital of Texas is Austin
Description:
Copy and paste the code below:
/*******************************************************
* Name:
* Assignment: A01
*******************************************************/
public class A01{
public static void main(String[] args){
// part1
System.out.print("x x x");
System.out.print("x o x");
System.out.print("x x x");
System.out.println();
// part2
}
}
Write your name in the comment on top. The red letters in the output are the user inputs.
This assignment consists of 2 parts.
First you demonstrate your understanding of the different print statements by modifying a
code segment. Then you read in two Strings and print a statement based on the user input.
Part1:
The code segment provided includes
three print statements that produce
the following output:
Change the code segment so that it
produces the following output:
Hint: you will need to change the number of
statements
Part2:
• Prompt the user to enter a state
• Read in the user response and assign
it to a String variable named state
Hint: before you can assign a value to the
variable state it needs to be declared
• Prompt the user to enter the name of
the capital
• Read in the user response and assign
it to a String variable named capital.
• Use printf and format specifiers to
print the following message:
The capital of state is capital
where you substitute state and capital with
the state and capital entered by the user.
Make your output look exactly like the output displayed above.
Make sure to read in the input next to the prompt but without touching it (use a blank to
separate the prompt from the user input). The output should use a single empty line to
separate the frog displayed in part1 from the output created in part2.
Answer:
take out the cord than put it back in than it shall work
___________________________________ allows many home users, corporations, and organizations around the world to connect far more computers to the Internet than they would otherwise be able to connect.
Answer:
network address translation
Explanation:
to allow excel to change the cell references in a formula or function from row to row or column to column as you fill with it, you must use an ________.
to allow excel to change the cell references in a formula or function from row to row or column to column as you fill with it, you must use an formula cells.
You must utilize a cell formula to allow excel to modify the cell references in a formula or function between row to row or column to column as you fill it out.
Cell formula and Excel:A cell reference is a name for a cell or a group of cells on a worksheet that may be used in a formula to tell Microsoft Office Excel where to look for the values or data that the calculation should compute.
The cell function in Excel returns data about a cell in a spreadsheet. info type specifies the type of information to be returned.
Cell may obtain information such as the cell's address and filename, as well as specific information about the cell's formatting.
Find out more information about 'Cell formula'.
https://brainly.com/question/26988565?referrer=searchResults
Helpppppp meeeeeeeeeeeee pleaseeeeee
Answer:
B
Explanation:
PATA drives, also known as ATA, ATAPI, or Integrated Drive Electronics (IDE), are the type of drives that were generally used in workstations until recently. PATA drives typically have a maximum transfer rate of 150MBps.
Cloud storage is a cloud computing model in which data are stored on remote servers accessed from the Internet, or “cloud.” For most PACS manufacturers, the cloud storage is primarily utilized as a long-term storage solution only.
what should you consider when using a wireless keyboard with your home computer cyber awareness
A good practice is to protect data on your home wireless systems. What one should you consider when using a wireless keyboard with your home computer is Reviewing and configuring the available security features, including encryption.
An individual need to protect their information when using wireless technology. It can be done through avoiding the use of non-Bluetooth-paired or unencrypted wireless computer peripherals.The kind of information sometimes cause serious damage to national security in the event of unauthorized disclosure.
Learn more from
https://brainly.com/question/25349554
What is the name of the table tools contextual tab that appears once you insert a table? Transform Design Outline Charts.
Answer: B.) Design
Explanation: just took it
Answer:
b
Explanation:
What are the revised versions of water grinding mill and horse cart
Basic computer programs used by a variety of companies include:
Spreadsheets
Podcasts
iTunes
Videos editing
Pick one please
Answer:
spreadsheets
Explanation:
every company uses spreadsheets because they are used to list and organize data easily
Several small stores rent space within a larger shopping centre. The owners of the shopping centre have provided a physical network throughout the entire centre.
(a) Explain how virtual networking can be used to give each store a private logical network. Diagrams may be used in your answer.
Answer:
okay so my first question is what is this question for because I cant really answer without more info
A backup utility can ensure that data is not lost if your computer or disk drive
fails. *
True or false
true or false? multimedia components such as audio and video do not significantly contribute to increased computer network traffic.
Answer:
false
Explanation:
are you KIDDING ME? imagine streaming a 4k video through YT.. yeah you know how much storage and bandwidth that takes up? it is VERY BIG. this is false
multimedia components such as audio and video do not significantly contribute to increased computer network traffic. The statement is false.
What is multimedia ?Multimedia is an user engaging type of media which offers a variety of effective ways to give information to user and user can interact with digital information through it.
Multimedia can act a communication tool, it has many application like Education, training, reference materials, corporate presentations, marketing, and documentary application.
Multimedia use text, audio, video, graphics, and animation to give information in a dynamic way and it is a technological way of presenting information with textual data like video conferencing, Yahoo Messenger, email, and the Multimedia Messaging Service ( MMS Service (MMS).
For more details regarding multimedia, visit
https://brainly.com/question/9774236
#SPJ2
What is the purpose of formatting charts?
changes the data set used for creating the chart
changes the look and feel of the display
changes the values in the data set
changes the type of chart used
Intro
Don
Answer:
Changes the look and feel of the display
Explanation:
Because you don't change the data nor the values in the char
And it does not change the type of chart.
________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. (1pts) Question 5 - ________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing
Answer:
Hey there!
Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing
Hope this helped! :)
__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.
Answer:
bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.
what is a collection of web pages containing text images audio and videos.
Answer: A website..?
pretty sure nones gonna do this but please do it would gelp alot of my exams irs gonna bring me like 10 marks :(
what is pascaline ?
also called Arithmetic Machine, the first calculator or adding machine to be produced in any quantity and actually used. The Pascaline was designed and built by the French mathematician-philosopher
1. Give a natural number x. Display the last digit of 3 at the power of x. 2. Give a natural three-digit number. Calculate the sum of the digits and check if the sum is perfectly square
in c++
web browsers save website information in their _________, which helps the site load faster on future visits.
Answer: cache
Explanation:because I took the quiz