with the aid of examples explain the differences between open source software and licensed software​

Answers

Answer 1

Answer:

Explanation:

Source is when a company go no limits to run the software but can easily be taken done by a complaint or two or a bug while a licensed it a protected version of the software.


Related Questions

how did hitles rules in nazi germany exemplify totiltarian rule?

Answers

Answer:

hope this helps if not srry

The program is the set of instructions a computer obeys

Answers

Answer:

True

Explanation:

a program is basicly just a list of commands you can run over and over again.

kỹ năng học tập ở bậc đại học là gì

Answers

Answer:

please translate

Thank you ✌️

10. Question
What are the drawbacks of purchasing something online? Check all that apply.

Answers

Explanation:

1) the quality of purchased good may be low

2) there might me fraud and cheaters

3) it might be risky

4) we may not get our orders on time

There are many drawbacks of purchasing online, some of them are as follows,

Chance of pirated item in place of genuine product.Chances of fraud during digital purchase and transaction.Product not deliver on time as expected.Not getting chance to feel the product before purchase.

These are some of the drawbacks of purchasing something online.

Learn more: https://brainly.com/question/24504878

What Causes #### error?​

Answers

Answer:

The answer is below

Explanation:

Causes of ####error in Microsoft Excel can be traced to multiple sources. The major causes of #### error in Microsoft Excel, however, are the following:

1. When the column is not wide enough to show all values or figures of the cell contents.

2. When there are too many decimal places of the figure in a cell

3. When the date value in the cell is negative

4. When the time value in the cell is negative.

WHAT IS ONE WAY A PIVOTTABLE COULD COMBINE THE FOLLOWING DATA

Answers

Answer: You sort table data with commands that are displayed when you click a header arrow button. Hope it help's :D

In the right situations, the use of multi-threads can allow for application speedup. Provide a small code example that illustrates how threads can be used to arrive at an appropriate result. Identify if there is a point where too many threads might impact performance of the application. g

Answers

Answer:

Explanation:

Threads allow an applications to run faster because they allow various tasks to run at the same time instead of doing one at a time and having to wait for one to finish before starting the next task. However, if too many threads are running at the same time, or a thread has a very large task or requires another task to finish before finishing its own then this can drastically impact performance. Mainly because too many resources are being used at a single moment. The following code is a small example of how threads work in Python.

import threading

import time

def thread_function(name):

   print("Thread {name}: starting")

   time.sleep(2)

   print("Thread {name}: finishing")

thread1 = threading.Thread(target=thread_function, args=(1,))

thread1.start()

time.sleep(1)

thread2 = threading.Thread(target=thread_function, args=(2,))

thread2.start()

thread2.join()

A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the internal through the same router. Which of the following should be Implemented to segment me accounting department from the rest of the users?

a. Implement VLANs and an ACL.
b. Install a firewall and create a DMZ.
c. Create a site-to-site VPN.
d. Enable MAC address filtering.

Answers

Answer:

C

Explanation:

definitely C you’re welcome

1011 0110 10102 = ?16

Answers

Answer:

B6A

Explanation:

I think you want to convert binary to hex.

Hexadecimal or "hex" is a numbering system which uses 16 different numerals. We saw that decimal used ten numerals from 0 to 9. Hex expands on this by adding six more, the capital letters A, B, C, D, E and F.

0...1...2...3...4...5...6...7...8...9...A...B...C...D...E...F

Steps to Convert Binary to Hex

1. Start from the least significant bit (LSB) at the right of the binary number and divide it up into groups of 4 digits. (4 digital bits is called a "nibble").

2.Convert each group of 4 binary digits to its equivalent

hex value .

3.Concatenate the results together, giving the total hex number.

Which are the best networking projects for a final year student in college

Answers

Answer:

The best networking project for a final year are Security issues with mobile IP.IP based patients monitoring systems.

Book information (overriding member functions) Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a PrintInfo() function that overrides the Book class' PrintInfo() function by printing not only the title, author, publisher, and publication date, but also the edition and number of volumes. Ex. If the input is: The Hobbit J. R. R. Tolkien George Allen & Unwin 21 September 1937 The Illustrated Encyclopedia of the Universe James W. Guthrie Watson-Guptill 2001 2nd 1 the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe Author: James W. Guthrie Publisher: Watson-Guptill Publication Date: 2001 Edition: 2nd Number of Volumes: 1 Note: Indentations use 3 spaces. LAB ACTIVITY 11.14.1: LAB: Book information (overriding member functions) File is marked as read only Current file: main.cpp cin >> numVolumes; main.cpp Book.h 25 26 27 28 29 30 31 32 33 34 35 36 myBook. SetTitle(title); myBook. SetAuthor(author); myBook. SetPublisher(publisher); myBook.SetPublicationDate(publicationDate); myBook.PrintInfo(); Book.cpp Encyclopedia.h myEncyclopedia. SetTitle(eTitle); myEncyclopedia. SetAuthor(eAuthor); myEncyclopedia. SetPublisher(ePublisher); myEncyclopedia. SetPublicationDate(ePublicationDate); Encyclopedia.cpp

Answers

Answer:

hansnmakqkai8aiaiakqklqlqlqlqlqqqw

Write a function named square_list that takes as a parameter a list of numbers and replaces each value with the square of that value. It should not return anything - it should mutate the original list.

Answers

Answer:

The function is as follows:

def square_list(myList):

   for i in range(len(myList)):

       myList[i] = myList[i]**2

   print(myList)

Explanation:

This defines the function

def square_list(myList):

This iterates through the list elements

   for i in range(len(myList)):

This squares each list element

       myList[i] = myList[i]**2

This prints the mutated list

   print(myList)

Select the pseudo-code that corresponds to the following assembly code. Assume that the variables a, b, c, and d are initialized elsewhere in the program. You may want to review the usage of EAX, AH, and AL (IA32 registers). Also recall that the inequality a > b is equivalent to b < a. i.e. If A is greater than B, that's equivalent to saying that B is less than A.
.data
; General purpose variables
a DWORD ?
b DWORD ?
c BYTE ?
d BYTE ?
upperLevel DWORD 18
lowerLevel DWORD 3
; Strings
yes BYTE "Yes",0
no BYTE "No",0
maybe BYTE "Maybe",0
code
main PROC
mov eax, 1
cmp AH, c
jg option1
jmp option3
option1:
mov edx, OFFSET yes
call WriteString
jmp endOfProgram
option2:
mov edx, OFFSET no
call WriteString
jmp endOfProgram
option3:
mov edx, OFFSET maybe
call WriteString
endOfProgram:
exit
main ENDP
END main
a) if (c > 0)
print (yes);
else
print (maybe);
b) if (c < 0)
print (yes);
else
print (maybe);
c) if (c < 1)
print (yes);
else
print (maybe);
d) if (c > 1)
print (yes);
else
print (maybe);

Answers

Answer:

ae

Explanation:

The pseudo-code that corresponds to the given assembly code is:

b) if (c < 0)

print (yes);

else

print (maybe);

What is the pseudo-code

In assembly code, the command cmp AH, c checks if the high byte of the EAX register (AH) has the same value as the variable c. Then, if the value in AH is more than the value in c, the instruction jg option1 will move to option1.

Therefore, In the pseudo-code, one can check if c is smaller than 0. If it happens, we say "yes". If not, we say "maybe"

Read more about   pseudo-code here:

https://brainly.com/question/24953880

#SPJ2

An error due to wrong input by the user

Answers

Answer:

when did it take place..

How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array

Answers

Answer:

Explanation:

260 cost units, Big O(n) complexity for a push

Given a sorted list of integers, output the middle integer. A negative number indicates the end of the input (the negative number is not a part of the sorted list). Assume the number of integers is always odd. Ex: If the input is:

Answers

Answer:

The program in Python is as follows:

myList = []

num = int(input())

count = 0

while num>=0:

   myList.append(num)

   count+=1

   num = int(input())

myList.sort()

mid = int((count-1)/2)

print(myList[mid])

Explanation:

This initializes the list

myList = []

This gets the first input

num = int(input())

This initializes count to 0

count = 0

The following is repeated until the user inputs a negative number

while num>=0:

This appends the input number to the list

   myList.append(num)

This increments count by 1

   count+=1

This gets another input

   num = int(input())

This sorts the list

myList.sort()

Assume the number of inputs is odd, the middle element is calculated as

mid = int((count-1)/2)

This prints the middle element

print(myList[mid])

From the complete question. the condition that ends the loop is a negative integer input

nhiệt độ chiết rót của máy chiết rót có van trượt là bao nhiêu

Answers

Answer:

please translate

Thank you✌️

A red team initiated a DoS attack on the management interface of a switch using a known vulnerability. The monitoring solution then raised an alert, prompting a network engineer to log in to the switch to diagnose the issue. When the engineer logged in, the red team was able to capture the credentials and subsequently log in to the switch. Which of the following actions should the network team take to prevent this type of breach from reoccurring?
A. Encrypt all communications with TLS 13
B. Transition from SNMPv2c to SNMPv3 with AFS-256
C. Enable Secure Shell and disable Telnet
D. Use a password manager with complex passwords

Answers

Answer:

Hence the answer is Option A Encrypt all communication with TLS 1 3.

Explanation:    

Transportation Layer Security (TLS 1 3)---->TLS stands for Transport Layer Security and is the successor to SSL (Secure Sockets Layer). TLS provides secure communication between web browsers and servers. The connection itself is secure because symmetric cryptography is used to encrypt the transmitted data.  

SNMPv3 Security with 256 bit AES encryption is not available for all devices. The net-snmp agent does not support AES256 with SNMPv3.so it is not the correct option.  

The best choice is an option a because TLS 1 3 because,  

TLS version 1 3 helped in removing all the insecure features such as:  

SHA-1

RC4

DES

3DES

AES-CBC

Cryptarithmetic algorithm

Answers

Answer:

CryptArithmetic or verbal arithmetic is a class of mathematical puzzles in which the digits are replaced by letters of the alphabet or other symbols. Usually it is required that each letter would be replaced by a unique digit. Each letter having different value from the other letters.

Explanation:

Cryptarithm now denotes mathematical problems usually calling for addition, subtraction, multiplication, or division and replacement of the digits by letters of the alphabet or some other symbols. ... Since D × B has only one digit, B must be 3 or less. The only two possibilities are 0 and 2.

What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initialization list to the first two elements but leaves the other elements with the values currently in memory. b. It assigns the two values in the initialization list to the first and second elements, third and fourth elements, and fifth and sixth elements. c. This statement is invalid. d. It assigns the two values in the initialization list to the first two elements and default values to the other elements.

Answers

Answer:

It assigns the two values in the initialization list to the first two elements and default values to the other elements.

Explanation:

Given

The array initialization

Required

Interpret the statement

double gallons[6] implies that the length/size of the array gallons is 6.

In other words, the array will hold 6 elements

{12.75, 14.87} implies that only the first two elements of the array are initialized ; the remain 4 elements will be set to default 0.

What can be used to store data, plant viruses, or steal data?

Answers

Answer:

ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!

Explanation:

The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.

Create a class, CallClass, with two methods to show call by value and call by reference. One method has two parameters that are any primitive types, whereas the other has a parameter that is an object of any class. Create a CallClassTest class that calls the two methods with proper arguments to show call by value and call by reference. You do not need to read the values of parameters from the screen. (5 pts)

Answers

Answer:

The output file is given below.

Explanation:

Please visit gotit-pro.com to get complete working code.

You are working from home using a microcomputer, a DSL modem, and a telephone connection to the Internet. Your company is connected to the Internet and has both local area networks and a mainframe computer. List all the different network connections involved in this operation.

Answers

Solution :

It is given that I am using a microcomputer at home along with  DSL modem as well as a telephone network for the internet. My company has internet and has local area network and also a mainframe network.

Therefore, the different network connections involved are :

local area network to the wide area networkmicrocomputer to the internet connection

_________ are standard devices, such as switches and routers, that have small onboard computers to monitor traffic flows through the device as well as the status of the device and other devices connected to it

Answers

Answer:

Managed devices

Explanation:

hope it helps u

a) Importance of Software Engineering I​

Answers

Answer:

os, operating system is very important

Develop a program that will maintain an ordered linked list of positive whole numbers. Your program will provide for the following options: a. Add a number b. Delete a number c. Search for a number d. Display the whole list of numbers At all times, the program will keep the list ordered (the smallest number first and the largest number last).

Answers

Answer:

#include <iostream>

using namespace std;

struct entry

{

int number;

entry* next;

};

void orderedInsert(entry** head_ref,entry* new_node);

void init_node(entry *head,int n)

{

head->number = n;

head->next =NULL;

}

void insert(struct entry **head, int n)

{

entry *nNode = new entry;

nNode->number = n;

nNode->next = *head;

*head = nNode;

}

entry *searchNode(entry *head, int n)

{

entry *curr = head;

while(curr)

{

if(curr->number == n)

return curr;

curr = curr->next;

}

}

bool delNode(entry **head, entry *ptrDel)

{

entry *curr = *head;

if(ptrDel == *head)

{

*head = curr->next;

delete ptrDel;

return true;

}

while(curr)

{

if(curr->next == ptrDel)

{

curr->next = ptrDel->next;

delete ptrDel;

return true;

}

curr = curr->next;

}

return false;

}

void display(struct entry *head)

{

entry *list = head;

while(list!=NULL)

{

cout << list->number << " ";

list = list->next;

}

cout << endl;

cout << endl;

}

//Define the function to sort the list.

void insertionSort(struct entry **h_ref)

{

// Initialize the list

struct entry *ordered = NULL;

// Insert node to sorted list.

struct entry *current = *h_ref;

while (current != NULL)

{

struct entry *next = current->next;

// insert current in the ordered list

orderedInsert(&ordered, current);

// Update current

current = next;

}

// Update the list.

*h_ref = ordered;

}

//Define the function to insert and traverse the ordered list

void orderedInsert(struct entry** h_ref, struct entry* n_node)

{

struct entry* current;

/* Check for the head end */

if (*h_ref == NULL || (*h_ref)->number >= n_node->number)

{

n_node->next = *h_ref;

*h_ref = n_node;

}

else

{

//search the node before insertion

current = *h_ref;

while (current->next!=NULL &&

current->next->number < n_node->number)

{

current = current->next;

}

//Adjust the next node.

n_node->next = current->next;

current->next = n_node;

}

}

int main()

{

//Define the structure and variables.

char ch;int i=0;

entry *newHead;

entry *head = new entry;

entry *ptr;

entry *ptrDelete;

//Use do while loop to countinue in program.

do

{

//Define the variables

int n;

int s;

int item;

char choice;

//Accept the user choice

cout<<"Enter your choice:"<<endl;

cout<<"a. Add a number"<<endl

<<"b. Delete a number"<<endl

<<"c. Search for a number"<<endl

<<"d. Display the whole list of numbers"<<endl;

cin>>choice;

//Check the choice.

switch(choice)

{

//Insert an item in the list.

case 'a' :

// cin>>item;

cout<<"Enter the element:"<<endl;

cin>>item;

//To insert the first element

if(i==0)

init_node(head,item);

//To insert remaining element.

else

{

ptr = searchNode(head,item);

//Check for Duplicate data item.

if(ptr==NULL)

{

insert(&head,item);

}

else

{

cout<<"Duplicate data items not allowed";

cout<<endl<<"EnterAgain"<<endl;

cin>>item;

insert(&head,item);

}

}

insertionSort(&head);

i=i+1;

break;

//Delete the item from the list

case 'b' :

int numDel;

cout<<"Enter the number to be deleted :"<<endl;

cin>>numDel;

//Locate the node.

ptrDelete = searchNode(head,numDel);

if(ptrDelete==NULL)

cout<<"Element not found";

else

{

if(delNode(&head,ptrDelete))

cout << "Node "<< numDel << " deleted!\n";

}

break;

//Serach the item in the list.

case 'c' :

cout<<"Enter the element to be searched :";

cout<<endl;

cin>>s;

ptr = searchNode(head,s);

if(ptr==NULL)

cout<<"Element not found";

else

cout<<"Element found";

break;

//Display the list.

case 'd' :

display(head);

break;

default :

cout << "Invalid choice" << endl;

break;

}

//Ask user to run the program again

cout<<endl<<"Enter y to countinue: ";

cin>>ch;

}while(ch=='y'||ch=='Y');

return 0;

}

output:

Queues can be represented using linear arrays and have the variable REAR that point to the position from where insertions can be done. Suppose the size of the array is 20, REAR=5. What is the value of the REAR after adding three elements to the queue?

Answers

Answer:

8

Explanation:

Queues can be implemented using linear arrays; such that when items are added or removed from the queue, the queue repositions its front and rear elements.

The value of the REAR after adding 3 elements is 5

Given that:

[tex]REAR = 5[/tex] --- the rear value

[tex]n = 20[/tex] --- size of array

[tex]Elements = 3[/tex] --- number of elements to be added

When 3 elements are added, the position of the REAR element will move 3 elements backward.

However, the value of the REAR element will remain unchanged because the new elements that are added will only change the positioning of the REAR element and not the value of the REAR element.

Read more about queues at:

https://brainly.com/question/13150995

We canconnect  two or more computer together using cables true or false​

Answers

This is true for most modern computers

5 Write full forms of the following: CPU b. MHz с. СВТ d. CAI e. ICU f. POS a. Write suitable technical term for the following statements. The continuously working capacity of computer without loos its speed and accuracy. b. The computer terminology, in which output is determined accord to the input The computer device used in hospitals that helps to main heartbeat of the patient. Opiemak The collection of eight bits or two Nibbles. C. I byte d. ng School Level Computer Science - 6​

Answers

Answer:

CPU = Central prossing Unit

Which of the given assertion methods will return true for the code given below? Student student1 = new Student(); Student student2 = new Student(); Student student3 = student1;
The Student class is as follows.
public class Student{
private String name;
}
a. assertEquals(student1, student2);
b. assertEquals(student1, student3);
c. assertSame(student 1, student3);
d. assertSame(student1, student2);

Answers

Answer:

The true statements are :

A. assertEquals(student1,student2)  

C. assertSame(student1,student3)

Explanation:

AssertEquals() asserts that the objects are equal, but assertSame() asserts that the passed two objects refer to the same object or not, if found same they return true, else return false.

Methods are collections of named code segments that are executed when evoked

The assertion method that will return true for the given code is: assertEquals(student1,student2)  

The code segment is given as:

Student student1 = new Student();

Student student2 = new Student();

Student student3 = student1;

In Java, the assertEquals() method returns true if two objects have equal values.

Assume student1 and student2 have equal values, the statement assertEquals(student1,student2) will return true

Read more about java methods at:

https://brainly.com/question/15969952

Other Questions
Much like the Japanese during World War II, Americans are currently subjected to greater scrutiny and discrimination. a. African b. Asianc Native d. Muslim The base of the pyramid is a regular hexagon. Find the volume of the pyramid. Round your answer to the nearest tenth.pls pls help answer what is the rule for the reflection How many federal agencies are responsible for managing land resources in the United States? prepare a flowchart showing written sources of history. Explain the importance of any two written sources. The_____states that the distribution of the sample means tend to beapproximately normal as sample sizes increase.A. Intermediate Value TheoremB. Sample Values TheoremC. Central Limit TheoremD. Approximate Values Theorem Translate this sentence into a multi-step equation Six more than the quotient of a number and 8 is equal to 2. Please help I dont understand The African American population of Detroit grew rapidly as AfricanAmericans:A. Migrated to jobs in automobile manufacturing B. Attended military training C. Gathered to center of religious worship D. Reunited with distant relatives help asap pleaseeee asap Why were European traders from centuries ago attracted to India? What do you know about the slope when y2 - Y1 = 0?. The slope is undefined.BThe slope is zeroc. The slope is positive.D. The slope is negative. Revise this paragraph from the essay on voter identification, which focuses on one of the claim's supporting reasons. As you revise the paragraph, focus on:1. making sure the point of the paragraph is precise and related to the overall claim in the essay,2. using words, phrases, and clauses to link major ideas in the paragraph,3. organizing ideas in a logical way,4. stating and addressing a counterclaim,5. maintaining a formal style and objective tone, and6. correcting MLA citation errors.Underline any portions of the original paragraph that you include in your version of the paragraph. (30 points).Paragraph to be revised:Essay claim: Laws requiring people to show photo identification in order to vote decrease voter participation.Lots of people don't have photo identification. Requiring people to show photo identification to vote would keep those without this type of identification from voting. Those who often don't have identification include elderly individuals who no longer drive and citizens living in high poverty areas where transportation is limited. They would be denied the chance to vote. Sociologist Mark Abernathy writes, "requiring photo identification in order to vote essentially eliminates a whole population of American voters. These voters are part of society, but they are denied a basic right guaranteed to all Americans over the age of eighteen. Elections are then determined by only a portion of the population, not the entire population" (page 820 of the article "Photo Identification Disenfranchisement"). Some people think this is just not true. Ria Olberson, an economist at Alabaster University, states, "few Americans are without drivers' licenses. Even if the license is expired or revoked, it still counts as photo identification. To claim that requiring identification disenfranchises a segment of the American population is simply inaccurate" (page 101). Olberson is just wrong! A lot of people don't have licenses because they either don't need them or they don't want them. Consider people living in major cities. They have no reason to get driver's licenses: public transportation. This extremely large group of people would be forced to obtain driver's licenses to participate in a process that they are guaranteed as citizens of the United States. 1. Calculate the slope of a line going trough A (-4,3) and B (0,6)2. Calculate the slope of a line with a run of 3 and a rise of 93. Calculate the equation if two points are (1,6) and (5,0) Someone do this pls Which system has a central government and local units that implement the central governments decisions?A. monarchical systemB. federal systemC. parliamentary systemD. unitary system Im not smart and need help 1.03 Transformation of energy flvs science question Vt nh c nm ln t im A trn mt t vi vn tc u 20m/s theo phng thng ng. Xc nh cao ca im O m vt t c. B qua ma st In factorial designs, the response produced when the treatments of one factor interact with the treatments of another in influencing the response variable is known as _____. a. replication b. interaction c. the main effect d. a factor how did slavery change the traditional way of life for africans in north america