1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
2 years ago
8

A ____ is someone who develops programs and apps or writes the instructions that direct the computer or mobile device to process

data into information. Group of answer choices troubleshooter software developer computer developer computer manufacturer
Computers and Technology
1 answer:
Pani-rosa [81]2 years ago
4 0

Answer:

A programmer is someone who develops programs and apps or writes the instructions that direct the computer or mobile device to process data into information. Group of answer choices troubleshooter software developer computer developer computer manufacturer

You might be interested in
Aika has several labeled folders for different parts of his research. What is the MOST likely reason he does this? He wants to m
kobusy [5.1K]

Answer:

<u>He wants to easily and quickly find specific bits of research that cover certain topics.</u>

<u>Explanation:</u>

Remember, a research work typically has these 6 (six) components:

  • The Abstract.
  • Introduction
  • Methodology
  • Results
  • Discussion
  • References.

Thus, Aika's decision to label several folders for different parts of his research would make it easier and quicker for him to find specific bits of research that cover certain topics, instead of spending time looking for topics.

4 0
3 years ago
For a list to be binary search-able, we need the following thing to be true, because... a. The list must be sorted, because chec
rusak2 [61]

Answer:

The answer is option A.

Explanation:

Negative numbers can be found by binary search, this makes option B incorrect.

Unsorted and randomized lists are also not things that support a binary search, options C and D are incorrect.

Binary search uses a technique where the middle element of the list is located and used to determine whether the search should be done within the lower indexed part of the list or the higher. So for a list to be binary search-able, it should be sorted and not randomized.

The answer is A.

I hope this helps.

7 0
3 years ago
What is Scrum?
Wittaler [7]

Answer:

A lightweight process for cross-functional, self-organized teams.

Explanation: The process in which teams are cross functional and self organizing to complete a particular task. This term is used in software development. Progress towards well defined goal with by emphasizing on teamwork and accountability.

5 0
3 years ago
_______ provide additional information and request user input.
lapo4ka [179]
The Dialog Box gives extra data and demand client input. The Dialog Box is thought to be a transitory window an application makes to recover client input. An application regularly utilizes exchange boxes to incite the client for extra data for menu things. An exchange box for the most part contains at least one controls with which the client enters content, picks alternatives, or coordinates the activity.
4 0
3 years ago
Read 2 more answers
In command prompt, Whats a command that will list only .ini files in C:\Windows\System32 directory?
Ber [7]

Answer:

The dir command is a Command Prompt command that's used to display a list of the files and subfolders contained in a folder.

hope it helps

3 0
4 years ago
Read 2 more answers
Other questions:
  • . What physical characteristic does a retinal scan biometric device measure?
    8·1 answer
  • What does it mean to have liability for a company?
    6·1 answer
  • Give sally sue specific suggestions on how she can improve her powerpoint skills
    5·1 answer
  • If you buy a 20 dollar thing with a 25 dollar gift card, do you still have 5 dollars?
    7·2 answers
  • Given the code segment below, complete the assignments as stated in the comments. struct aaa { int m; int nn; } struct bbb{ stru
    13·1 answer
  • One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
    7·1 answer
  • If you receive an email message you suspect is spam, what should you do?
    11·1 answer
  • In general, a unit test may need drivers and stubs, but not both.<br><br> TRUE OR FALSE
    10·1 answer
  • Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
    7·1 answer
  • Meats ages hair and feathers all contain this monomer
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!