when the software code (instructions) are provided to the consumer who can than make modifications in how the program operates at the most basic level, it is called

Answers

Answer 1

Open source refers to the practise of making software code (instructions) available to users so they can modify the program's most fundamental functionality.

How does software differ from software code?A programmer's text editor or visual programming tool-created programming statements that are later saved in a file are known as source code. The output, a compiled file, that results from the compilation of the source code using a C compiler is referred to as object code in most contexts.Although though the titles of the coding paradigms can occasionally change, the majority of experts agree that there are four main forms of code: imperative, functional, logical, and object-oriented.Between code and software, there is a thin but important line. Programmers create code, which is a formal blueprint for the software that describes every last detail of its purpose. The finished product is the software; during use, it is what the user sees, hears, feels, and encounters. This variation can occasionally be substantial.

To learn more about software code, refer to:

https://brainly.com/question/28224061


Related Questions

when using a computer with virtual memory, which of the following are true (more than one may be true). you are penalized for incorrect answers. select one: a. all processes can always access the memory of other processes. b. no process may access the memory of another process. c. it is possible to share the memory of another process.

Answers

when using a computer with virtual memory, (b.) no process may access the memory of another process. (c.) it is possible to share the memory of another process. Are true.

What is virtual memory?

Virtual memory, also known as virtual storage[b], is a memory management strategy used in computing that offers users the illusion of a very big main memory by providing them with a "idealized abstraction of the storage resources that are actually accessible on a specific machine".

The operating system of the computer converts virtual addresses—memory addresses utilized by a program—into physical addresses in computer memory using a combination of hardware and software. A process or task sees main storage as a contiguous address space or group of contiguous segments. Real memory is allotted to virtual memory, and virtual address spaces are managed by the operating system.

To know more about virtual memory visit:

https://brainly.com/question/29471676

#SPJ1

Write a c program that uses iteration to find the sum of all multiples of 3
and all multiples of 4 between 3 and 150 inclusive. Print the sum.

Answers

#include<stdio.h>

int main()

{

int sum_3=0, sum_4=0; //Variable to store the sum of multiples of 3 and 4

for(int i=3; i<=150; i++) //Iterating from 3 to 150

{

if(i%3==0) //Checking if i is a multiple of 3

sum_3 += i; //Adding i to the sum of multiples of 3

if(i%4==0) //Checking if i is a multiple of 4

sum_4 += i; //Adding i to the sum of multiples of 4

}

printf("Sum of multiples of 3: %d\n", sum_3); //Printing the sum of multiples of 3

printf("Sum of multiples of 4: %d\n", sum_4); //Printing the sum of multiples of 4

return 0;

}

what tool should be used to remove fields and format data when importing?

Answers

Answer:

Power Query editor

Explanation:

Power Query editor is a Microsoft Office application, it can be utilized to remove fields and format data when importing files.

which of the following is a limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10?

Answers

The option that is limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10 is known to be option a. Windows PE/.

What is Windows PE used for?

Windows PE (WinPE) is known to be a term that connote  a little form of an operating system.

It is known to be one that is often used to install, deploy, as well as been used to repair Windows desktop editions, Windows Server, and other kinds of Windows operating systems.

Note that with the use of the Windows PE, a person can be able to Set up their hard drive before they can install the  Windows.

Therefore, based on the above, The option that is limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10 is known to be option a. Windows PE/.

Learn more about Windows PE from

https://brainly.com/question/14297547

#SPJ1

Which of the following is a limited and non-GUI version of Windows based on Windows 10 technologies that can be used for installing, troubleshooting, and repairing Windows 10?

a. Windows PE

b. WAIK

c. USMT

d. DISM

Read the following scenario:

A theatrical production is in rehearsal for a revival of a classic Tony Award-winning drama. The director, wanting to make the best production possible, has spared no expense. Unfortunately, the production is over budget. The director does not want to eliminate any of the design elements or special effects he has incorporated into the production. Which of the following would a production manager most likely do to get the production back on budget?

A. work with the costume designer to minimize costume changes and use cheaper materials
B. work with the lighting designer to create the effects the director wants using a minimal amount of equipment and personnel
C. eliminate some of the supporting roles
D. offer to take a pay cut

Answers

B is the answer to the question

Test if a password entered is correct. The secret phrase is “Amedeo Avogadro” (without the quotes).

Sample Run 1
Enter the password: Amedeo Avogadro

Sample Output 1
Correct!

Sample Run 2
Enter the password: Georg Cantor

Sample Output 2
Not Correct

Answers

Sample run & Output 1 is correct.

What is the correct password format?Make use of both alphabetic and numeric characters. Because passwords are case-sensitive, combine upper- and lowercase letters. Use a mix of letters and numbers, a misspelled word, such as 2HotPeetzas or ItzAGurl, or a phrase like "many colors" using only the consonants.You should pick a phrase that is simple to remember, at least 8 characters long, and incorporates as many of the aforementioned strategies as you can. Select a sentence that you will remember, select the first or final letter from each word, and then replace some of the remaining letters with numbers and symbols. Then you may give certain letters capital letters (perhaps the first and last, or second to last, etc.)

Learn more about Password refer to :

https://brainly.com/question/15016664

#SPJ4

Sample run & Output 1 is correct.

What is the correct password format?Make use of both alphabetic and numeric characters. Because passwords are case-sensitive, combine upper- and lowercase letters.Use a mix of letters and numbers, a misspelled word, such as 2HotPeetzas or ItzAGurl, or a phrase like "many colors" using only the consonants.You should pick a phrase that is simple to remember, at least 8 characters long, and incorporates as many of the aforementioned strategies as you can.Select a sentence that you will remember, select the first or final letter from each word, and then replace some of the remaining letters with numbers and symbols. Then you may give certain letters capital letters (perhaps the first and last, or second to last, etc.)

Learn more about Password refer to :

brainly.com/question/15016664

#SPJ1

What is the extension of a BASIC256 program file?​

Answers

Answer:

The extension of a BASIC-256 program file is kbs

Installing a system file checksum verification application on your servers is an example of ensuring

Answers

Installing a system file checksum verification application on your servers is an example of ensuring the integrity and security of your system files by verifying that they have not been tampered with or corrupted during transmission or storage. This verification process helps to prevent errors and vulnerabilities that could compromise the stability and performance of your servers and the applications running on them. By regularly verifying the checksums of your system files, you can detect any changes or discrepancies that may indicate a potential security breach or system malfunction, and take appropriate measures to address them.

To know more about following installing a system file please check the following link

https://brainly.com/question/26221430

#SPJ11

What is a hole note in word form

Answers

whole note is the answer

Answer:

4 beats

Explanation:

NEED HELP ASAP!!

Given that myGrade = 65, consider the conditional operator (myGrade<=65) ? myGrade+10: myGrade=myGrade+5. What is the value of myGrade after the conditional operator executes?

Answers

Answer:

75 is the answer and marke me as brainleast

Question #2
Dropdown
Complete the sentence.
When you use
you display intermediate results to trace the program flow.

Answers

Answer:

print debugging

Explanation:

Answer:

print debugging

Explanation:

got it right

Which term describes a protocol to manage a network, able to configure a network, monitor activity, and control devices?

Post Office Protocol version 3 (POP 3)

Simple Mail Transfer Protocol (SMTP)

Internet Message Access Protocol (IMAP)

Simple Network Management Protocol (SNMP)

Answers

Answer:

Simple Network Management Protocol (SNMP)

Explanation:

Answer:

SNMP

Explanation:

vote brainliest please.

a major league baseball team wants to reach out to fans in their stadium to offer them seat upgrades. which technology would they use?

Answers

They would employ beacon technology. If a major league baseball team wishes to interact with the crowd at its venue and give seat upgrades.

What constitutes the third stage in creating and carrying out a digital marketing campaign?

The first three digital marketing steps, which form the foundation of a successful digital marketing plan, are as follows: Establish attainable objectives or ambitions. Establish your target market. Converting campaign creation and publication.

Which of the following enables you to speak with numerous users simultaneously?

As a result, timesharing is a procedure that enables numerous users to interact with a computer system at once such that each user has the impression that they are the only ones using it.

To know more about beacon technology visit:-

https://brainly.com/question/30245567

#SPJ4


\(3x - 5 = 3x - 7\)

Answers

Answer:

x = -1/2

Explanation:

Hey there!

To solve for x we need to simplify the following,

3x - 5 = 7x - 3

-3x to both sides

-5 = 4x - 3

+3 to both sides

-2 = 4x

Divide both sides by 4

-1/2 = x

Hope this helps :)

an individual who blocks the traffic from an authorized user to a system they are authorized to access is conducting which of the following threat types?

Answers

The individual who blocks the traffic from an authorized user to a system they are authorized to access is conducting a denial-of-service (DoS) threat type.

Denial-of-service (DoS) is a type of cyber-attack that is intended to prevent legitimate users from accessing targeted computer systems, applications, or networks. A DoS attack is typically done by flooding the targeted resource with more traffic than it can manage, causing it to crash and deny access to authorized users.

DoS attacks are implemented by cybercriminals, hacktivists, or malicious actors to destroy businesses or cause financial damage. Denial-of-service (DoS) is a type of cyber-attack that is intended to prevent legitimate users from accessing targeted computer systems, applications, or networks.

To know more about system visit :

https://brainly.com/question/19843453

#SPJ11

HERES A RIDDLE!!

What is more useful when it’s broken??

Answers

Answer:

an egg

Explanation:

the music sound clips need to undergo some from of data compression before the music editor can send them via email. which type of compression, lossy or lossless, should he use? give a justification for your answer.

Answers

When it comes to compressing music sound clips, the music editor should use lossy compression. The reason for this is because lossy compression techniques are specifically designed to reduce file size while sacrificing some quality in the process.

In other words, lossy compression algorithms permanently remove certain parts of the audio data that are considered less important, resulting in a smaller file size.

Lossless compression techniques, on the other hand, are designed to compress data without sacrificing any quality. This means that the original data can be reconstructed perfectly from the compressed file.

However, this type of compression results in much larger file sizes, which would not be suitable for sending via email.

Lossy compression, on the other hand, can reduce file sizes significantly without compromising too much on quality. The compressed files may not be identical to the original, but they are still very close in terms of sound quality.

This makes lossy compression the ideal choice for sending music sound clips via email.

There are several different lossy compression techniques that the music editor could use, such as MP3 or AAC. However, the specific technique used will depend on the requirements of the recipient and the limitations of the email system being used.

In summary, the music editor should use lossy compression to reduce the file size of music sound clips before sending them via email.

This technique sacrifices some quality in exchange for a smaller file size, making it the ideal choice for this scenario.

For more question on "Lossy Compression" :

https://brainly.com/question/28467102

#SPJ11

question 1 what information does a data analyst usually find in the header section of an rmarkdown document? select all that apply.

Answers

The title, author, date, and file type are all found in the header section of an RMarkdown document.

What do you mean by rmarkdown document ?

The first step in using R Markdown to create documents is to create an Rmd file that combines R code chunks and markdown content (material with simple text formatting). The.Rmd file is given to knitr, which runs every R code chunk and generates a new markdown (.md) document with the R code and its results. Following the processing by pandoc, the markdown file produced by knitr is converted into a final web page, PDF, MS Word document, slide show, handout, book, dashboard, package vignette, or other format. Although it may seem difficult, R Markdown makes it really straightforward by combining all of the aforementioned processing into a single render function. Even better, RStudio has a "Knit" option that lets you render an interactive.

To know more about rmarkdown document, visit

https://brainly.com/question/29980064

#SPJ4

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?
A. Boot the computer from the Windows installation disc and run Startup Repair.
B.Boot the computer from the Windows installation disc and perform a clean installation of Windows.
C.Boot the computer from the Windows installation disc and run Reset this PC.
D.Boot the computer from the Windows installation disc and run System Restore.

Answers

Answer:

C.Boot the computer from the Windows installation disc and run Reset this PC

Hold down the shift key continuously until the Advanced Recovery Options menu appears. To troubleshoot, click. Click Reset this PC after that. Choose whether to perform a clean install and remove everything, or to keep your files. Thus, option C is correct.

What Windows installation disc and run Reset this PC?

From the menu, choose Settings > Update & Security > Recovery. The title of the page should say “Reset this PC.” Next, click Get Started. Choose between removing everything or keeping my files.

In Windows 10, launch the Settings window by clicking the Start menu, then selecting the gear icon in the lower left corner. Another choice from the list of apps is the Settings app. Click Update & Security > Recovery in Settings, then decide Get started under reboot this PC.

Therefore, Boot the computer from the Windows installation disc and run Reset this PC.

Learn more about Windows installation here:

https://brainly.com/question/24282472

#SPJ5

A geometric sequence is Sn = a +ar+ar+... tap-1 = 1r|<1 The geometric sequence can be calculated by: • define a row array rRowArray containing n values of • define a row array exponent Terms containing all the exponents in the summation, i.e. (0,1...,-1] • calculate a row array geometricterms, using element-by-element array operation for all the terms in the summation • sum all the terms in the row array geometric Terms Complete the following code to calculate the geometric series: number Terms -10; n-10; -0.5; a-1; rRowArrayer. "ones(1,n); exponent Termsccomplete the code>; Check Show answer geometricTerasa rowArray complete the code> sum Termssum geometric Terms) Check Show answer

Answers

The code to the geometric sequence is ;

numberTerms = -10;

n = 10;

a = -0.5;

r = 1;

rRowArray = r.^(0:n-1);

exponentTerms = 0:n-1;

geometricTerms = a.*rRowArray;

sumTerms = sum(geometricTerms);

What is the code of the geometric sequence

Note that I assumed that the common ratio r is equal to 1 based on the information provided in the problem statement. If the common ratio is different from 1, you should replace the value of r accordingly. Also, I set the value of a to -0.5 based on the information provided in the problem statement, but you should replace it with the actual value given in your problem.

The output of the code is the sum of the first 10 terms of the geometric series, which is stored in the variable sumTerms. The row arrays rRowArray, exponentTerms, and geometricTerms contain the values of r raised to the appropriate powers, the exponents in the summation, and the individual terms of the geometric series, respectively.

Learn more on code here;

https://brainly.com/question/24368848

#SPJ1

Im so stuckk on this not the math one sorry

Im so stuckk on this not the math one sorry

Answers

the email address would follow protocol

Which is government departments fund the Global Positioning System
The Global Positioning System is funded by the department of

Answers

Answer:

The department of defense

Explanation:

When a presentation goes beyond __________ minutes, the speaker should divide it into major segments by using reviews, questions or graphics.

Answers

Answer:

15 minutes

Explanation:

What are the flowchart symbols?​

Answers

Answer:Flowchart use to represent different types of action and steps in the process.These are known as flowchart symbol.

Explanation:The flowchart symbols are lines and arrows show the step and relations, these are known as flowchart symbol.

Diamond shape: This types of  flow chart symbols represent a decision.

Rectangle shape:This types of flow chart symbols represent a process.

Start/End : it represent that start or end point.

Arrows: it represent that representative shapes.

Input/output: it represent that input or output.

1. what is the relationship between logical and physical models?

Answers

The relationship between logical and physical models is that they are two different views of the same system. A logical model is an abstract representation of a system that describes its functional requirements, business rules, and relationships between entities.

It is independent of any specific technology or implementation. A physical model, on the other hand, is a concrete representation of a system that describes its physical components, such as hardware, software, and databases. It is dependent on the technology used to implement the system. The logical model serves as a blueprint for the physical model, which is designed to meet the requirements of the logical model.

The physical model is derived from the logical model and serves as the basis for building and implementing the system. Therefore, the logical model and physical model are complementary and interconnected, and both are essential for designing and implementing a successful system.

Learn more about physical models: https://brainly.com/question/1511455

#SPJ11

Question 1:

Define what they do?

Command + B

Command + D

Command G


Question 2:

Select any of the five tools from the toolbar in adobe illustrator.
Explain what the do..

Answers

Answer 1:

Command + B: In Adobe Illustrator, Command + B is a keyboard shortcut used to apply bold formatting to selected text.

Command + D: In Adobe Illustrator, Command + D is a keyboard shortcut used to repeat the last action or command. This can be useful for quickly duplicating elements or repeating a complex series of steps.

Command + G: In Adobe Illustrator, Command + G is a keyboard shortcut used to group selected objects together. Grouping objects allows you to treat them as a single object, making it easier to move, rotate, or manipulate them as a unit.

What is Answer 2?

One of the five tools from the toolbar in Adobe Illustrator is the Selection tool. The Selection tool is used to select, move, and manipulate objects within the document. It is represented by the black arrow icon in the toolbar.

Therefore, When an object is selected with the Selection tool, you can perform actions such as moving, resizing, rotating, or modifying the shape or appearance of the object. The Selection tool is a basic and essential tool for working in Adobe Illustrator, and is used frequently throughout the design process.

Learn more about adobe illustrator at:

https://brainly.com/question/15169412

#SPJ1

write a brief note on computer monitor

Answers

Answer:

A computer monitor is an electronic device that displays digital images generated by a computer's graphics card. It is one of the essential components of a computer system, allowing users to interact with the computer and view its output. Monitors come in various sizes, resolutions, and display technologies such as LCD, LED, OLED, and CRT.

Modern computer monitors usually have a flat-panel display, which is thinner and consumes less power than the older CRT (cathode ray tube) monitors. Monitors can be connected to the computer through various interfaces, such as VGA, DVI, HDMI, and DisplayPort, and some models have built-in speakers or USB ports for added functionality.

The resolution of a monitor determines the number of pixels it can display horizontally and vertically, with higher resolutions providing more screen real estate and sharper images. Refresh rate is another important factor, with higher refresh rates allowing for smoother motion and reducing eye strain.

In summary, a computer monitor is an essential component of a computer system that displays visual output to the user, and choosing the right monitor for your needs depends on factors such as size, resolution, display technology, and connectivity options.

Consider a partial output from a cost minimization problem that has been solved to optimality. name Final value shadow price constraint R.H side allowable increase allowable desrease
labor time 700 -6 700 100 200
The Labor Time constraint is a resource availability constraint. What will happen to the dual value (shadow price) if the right-hand-side for this constraint increases to 750 ?
a. It will be zero. b. It will be positive. c. It will remain at −6. d. It will be more negative. e. It will be less negative.

Answers

Option(e) is correct. The Labor Time constraint is a resource availability constraint. If the right-hand side for this constraint increases to 750, the dual value (shadow price) will be less negative.

Resource availability constraints imply a scarcity of resources. The limiting factor is that these constraints limit the production or output of an organization. Constraints of resource availability are represented as linear equations in optimization problems, which must be fulfilled. These constraints specify the maximum number of resources that can be used in production, the minimum amount of production that must be achieved, and the availability of specific resources within the plant, among other things.The allowable increase and decrease in the right-hand side of the constraint of labor time are 100 and 200, respectively.The allowable increase is 50. Therefore, the shadow price will be less negative. As a result, the correct option is (e) It will be less negative.

To learn more about resource availability constraints please visit:

https://brainly.com/question/14977242

#SPJ11

FILL THE BLANK. in vivo exposure within systematic desensitization is ______ imaginal exposure.

Answers

In vivo exposure within systematic desensitization is real-life exposure.Systematic desensitization is a therapeutic technique commonly used in cognitive-behavioral therapy (CBT) to treat phobias.

In vivo exposure specifically refers to the real-life, physical exposure to the feared stimuli or situations. It involves directly facing the feared object or engaging in the feared activity in the actual environment where it occurs. For example, if someone has a fear of heights, in vivo exposure would involve gradually exposing them to heights in real-life situations, such as climbing a ladder or standing on a high balcony.On the other hand, imaginal exposure is a different technique within systematic desensitization that involves exposure to feared situations or stimuli through imagination or mental imagery. It is typically used when the feared stimuli cannot be easily replicated in real life or when it is impractical to expose the individual directly to the feared situation.

To know more about desensitization click the link below:

brainly.com/question/5557547

#SPJ11

____________________ uses an algorithm to encrypt a ciphertext document from a plaintext document, and when the information is needed again, the algorithm is used to decrypt the ciphertext back into plaintext.

Answers

The Advanced Encryption Standard (AES), is a symmetric encryption algorithm and one of the most secure.

Other Questions
find the area under the standard normal curve to the right of z=0.81z=0.81. round your answer to four decimal places, if necessary either elements or compounds which are present prior to a chemical reaction Change the following sentences from Direct to Indirect Speech (5 marks) He said, I write a short poem. I said, I shall finish my work as quickly as I can. Arun said, I have not been able to finish my work this evening. He said, The flood had destroyed their fields. The poet said, Sweet are the uses of adversity. Help!! Help me find poetic elements in this poem please.Poem: citizenship by Javier Zamora What is the most watched sporting event in the world? The general rule of thumb when considering financing is to work more on raising funds than business operations. start raising funds immediately. bring in angel investors at the last minute. wait as long as possible before seeking investors. Question 12 12) involves the sale of shares of stock in exchange for cash. Seed-Stage Financing Early-Stage Financing Startup Financing Equity Financing 13) involves modest amounts of capital provided to entrepreneurs to prove the concept; usually in exchange for equity. Startup Financing Debt Financing Seed-Stage Financing Early-Stage Financing Question 14 14) involves funds provided to entrepreneurs to enable them to implement the idea by funding product R&D; usually in exchange for equity. Equity Financing Startup Financing Early-Stage Financing Seed-Stage Financing 15) involves large sums of money provided to companies with a Management Team and proven product/service with minimal to no revenue; usually in exchange for equity. Early-Stage Financing Seed-Stage Financing Equity Financing Startup Financing summary of american history by judith ortiz coder pls help i need the help You have just received a birthday present of $30. There are two ways you might spend this money. You choose to buy two new CDs instead of taking your friends out to lunch. Your choice not to take your friends out in known in economics as a(n) *A.opportunity costB.capital resourceC.variable costD.revenue _______ facilities include electrical power, communication services, and environmental controls such as heat and humidity.A. SupportingB. InformationC. PhysicalD. All of the above Which sentence below uses the correct verb form?A. Amy's rabbits has been coming to our homeroom class for show and tell today.B. Amy's rabbits was coming to our homeroom class for show and tell today.C. Amy's rabbits is coming to our homeroom class for show and tell today.D. Amy's rabbits are coming to our homeroom class for show and tell today. -Decentralized decision making- Acasts to changes in the market placeProducers and consumers have control of the economyAll of these are characteristics of aeconomyBsocialisttradicional pls help oooooooooooooopoo Are the short sections of dna that are synthesized on the lagging strand of the replicating dna. "Likewise, when I do use my Spanish and allude to myPuerto Rican heritage, it comes from deep inside mewhere my imagination and memory reside, and I do ited through my writing." (Paragraph 3)nof1indWhich statement best explains the purpose of thissentence?O 1. It reminds the reader that the author is a writeras well as a teacher of literature.O2. It highlights the author's belief that people of allcultural backgrounds enjoy reading greatliterature.O3. It emphasizes for the reader that most of theauthor's education was in English rather thanSpanish.O4. It introduces the author's view that literaturethat draws on both culture and experience hasgreat meaning. help me on this one please 10) An organism that transmits a disease is referred to as a: A. Plague B. Mosquito C. Human D. Vector E. None of the above 11) Rabies is a disease of: A. Respiratory tract B. Nervous system C. Digestive system D. Circulatory 12) A small gram negative bacillus which causes plague:A. Yersina Pestis B.bcuccela abortus C. Ducrey's Bacillus D. Pasturella Tularensis 13) With respect to AIDS: A. It is an RNA virus B. Reverse transcriptase is essentialC. The receptor is the CD4 glycoprotein D. B. &C E. A, B and C are all true 14). In Toxoplasmosis A. The organism toxoplasma gondii is an Apicomplexan as the malarial parasite B. It is associated with birth defects C. It is spread by exposure to cat feces D. Al of these HELP ME PLEASE LOVE U GUYS Graph all of the following points on the same coordinate plane.a. (4,2)b. (2,4)c. (2,4)d. (4,2)e. (4,2)f. (2,4) help me help me help me help me