1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
2 years ago
14

Which is true for comments? Group of answer choices The compiler does not generate machine code for comments. The compiler conve

rts comments into a series of machine instructions. The compiler allocates memory for comments along with for variables. The compiler translates comments into ASCII values.
Computers and Technology
1 answer:
pogonyaev2 years ago
7 0

The true statement of comments is that the compiler does not generate machine code for comments.

<h3>Does a compiler generate machine code for comments?</h3>

This is known to  be No for the answer because , they are said to often ignored by the compiler.

Therefore one can say that The true statement of comments is that the compiler does not generate machine code for comments as that is not their functions.

Learn more about comments from

brainly.com/question/27049042

#SPJ1

You might be interested in
Which of the following best describes a group?
ExtremeBDS [4]

Answer:

I would say it would be a cluster of related commands.

5 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for t
Liula [17]

Answer:

"Cross-training " seems to be the right response.

Explanation:

  • Cross-training seems to be the method of constructing a multi-professional workers staff with incentive plans to make sure that they must have the same tools to complete different occupational tasks throughout the organization.
  • This will be a very broad approach besides randomized controlled training methods, both maximum and minimum frequency, for generations.
7 0
3 years ago
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to
STatiana [176]
Things! :D :D :D :D :D
5 0
3 years ago
What is the value of count after this nested FOR loop executes fully.
Alisiya [41]

Answer:

168 (although the =< must be corrected to <=)

Explanation:

int count = 0;

for (int row = 4; row <= 15; row++)

for (int col = 0; col < 13; col = col +2)

count+=2;

The inner for loop runs 7 times (for col = 0,2,4,6,8,10,12). Anything higher is not less than 13. Therefore the inner loop increments count by 2 seven times, i.e. it increments count by 14.

The outer for loop runs 12 times (for row = 4,5,6,7,8,9,10,11,12,13,14,15).

If the count is incremented by 14 twelve times, you are incrementing it by 14*12 = 168.

Therefore the count goes from 0 to 168 after the nested loops.

5 0
3 years ago
Other questions:
  • Why are video texts an example of multimedia? A. They use audio and visual elements together. B. They use one type of medium to
    13·2 answers
  • What is the name of the program that takes high-level code and transforms it into machine-level code?
    8·1 answer
  • which of the following is a malicious program that can replicate and spread from computer to computer? A. Email B. Virus C. Spam
    15·1 answer
  • What was one of the first inventions that made it possible to communicate almost instantly?
    11·1 answer
  • After you select a cell with an error indicator, you can click the error checking _______ to display additional information abou
    14·1 answer
  • Help me pls, thank you
    12·2 answers
  • Which statements about editing an existing Contact in Outlook are true? Check all that apply.
    9·2 answers
  • If String str = "Computer Science";, then what is the value of str.substring(10);? ​
    6·1 answer
  • What problems do you see in the process of transacting business online
    10·1 answer
  • Because his father _____ his ten-speed bike away to punish him for his failing grades, the boy sulked for two days.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!