answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rufina [12.5K]
2 years ago
3

A programmer created a piece of software and wants to publish it using a Creative Commons license. Which of the following is a d

irect benefit of publishing the software with this type of license?
A

The programmer can ensure that the algorithms used in the software are free from bias.
B

The programmer can ensure that the source code for the software is backed up for archival purposes.

C

The programmer can include code that was written by other people in the software without needing to obtain permission.
D

The programmer can specify the ways that other people are legally allowed to use and distribute the software.
Computers and Technology
1 answer:
natta225 [31]2 years ago
7 0

Answer:

The answer to this question is given below in the explanation section. However,  the correct answer is D.

Explanation:

This question is about publishing software under a creative commons license. The direct benefit of publishing the software under commons creative license is that the programmer can specify the ways that other people are legally allowed to use and distribute the software.

Because under this type of license, the publisher can publish their work under copyright law.  So they can control and specify the ways that how other people can use and distribute it legally.

While other options are not correct, because of its programmer responsibility that source code is free from error and bias, take backup for archival purposes. People can't include anything without obtaining permission etc.

You might be interested in
___refers to self-acting or self-operating.
lisabon 2012 [21]

Answer:

do it to me watch this

Explanation:

trailing zeros in a whole number with no decimal shown are NOT significan

6 0
2 years ago
Suppose you are given an unknown chip which could be any one of the of the following: 7400, 7402, 7404, 7408, 7410, 7420, 7427,
Olenka [21]

The answer & explanation for this question is given in the attachment below.

3 0
2 years ago
A network technician sets up an internal dns server for his local network. When he types in a url which is checked first
VLD [36.1K]

Answer:

The first thing that the browser checks is the cache for the DNS record to find the corresponding IP address.

Explanation:

After the technician sets up the internal DNS server for his local network, the first thing that is checked when he types a website into the url of a browser is the cache to look for corresponding IP addresses.

DNS which means Domain Name System is a database that maintains the website name (URL) and the IP address that it is linked to. There is a unique IP address for every URL (universal resource locator).

Internal DNS servers store names and IP addresses for internal or private servers

8 0
2 years ago
When you reboot your system, the computer follows start-up instructions stored in this type of memory. multiple choice dram sdra
MA_775_DIABLO [31]
<span>A computer’s start-up instructions are stored in a type of memory called Flash. Flash memory can be written to and read from, but its contents are not erased after the computer powers down. This Flash memory is more commonly referred to as the BIOS (Basic Input Output System).</span>
4 0
2 years ago
Read 2 more answers
Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
3241004551 [841]

Answer:

D. Applying strong encryption

Explanation:

Strong cryptography or cryptographic-ally strong are general terms applied to cryptographic systems or components that are considered highly resistant to cryptanalysis.One cryptographic cipher has been mathematically proven to be unbreakable when it is used correctly, but it is only very rarely used.

6 0
2 years ago
Other questions:
  • What is a cursor?
    6·2 answers
  • What is the argument in this function =AVERAGE(F3:F26)
    15·1 answer
  • Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
    10·1 answer
  • A firm that wanted to enable its employees to use and share data without allowing outsiders to gain access could do so by establ
    14·1 answer
  • 1A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The
    5·1 answer
  • Which of the following describes ETL? a) A process that transforms information using a common set of enterprise definitions b) A
    14·1 answer
  • Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos
    13·1 answer
  • Which argument forces a writer to return to and change the input before resolving a “UnicodeError”?
    10·1 answer
  • Why is it important for element IDs to have meaningful names?
    11·1 answer
  • 1.erros can easily be ____ 2.work is done in an ____ no mess environment 3.colors do not _____ and brushes are never ______ 4.st
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!