1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
2 years ago
14

Which is true for comments? Group of answer choices The compiler does not generate machine code for comments. The compiler conve

rts comments into a series of machine instructions. The compiler allocates memory for comments along with for variables. The compiler translates comments into ASCII values.
Computers and Technology
1 answer:
pogonyaev2 years ago
7 0

The true statement of comments is that the compiler does not generate machine code for comments.

<h3>Does a compiler generate machine code for comments?</h3>

This is known to  be No for the answer because , they are said to often ignored by the compiler.

Therefore one can say that The true statement of comments is that the compiler does not generate machine code for comments as that is not their functions.

Learn more about comments from

brainly.com/question/27049042

#SPJ1

You might be interested in
A toolbar of round buttons that appear when you move the mouse when in Slide Show view id called ____________.A toolbar of round
Alisiya [41]

Answer:

the slide show toolbar is displayed

6 0
2 years ago
How do you determine which type of operating system that best supports your computer or mobile device?
kirill115 [55]
Run a compatibility check on your computer to check it or ask a tech professional what os they think would be compatible 
4 0
3 years ago
WILL UPVOTE &lt;3
andreev551 [17]
D. Mechanical weathering
8 0
2 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
3 years ago
In excel what does sidney need to consider when creating formulas
Musya8 [376]
The biggest thing she need to consider are her variables. and the output she will get.
5 0
3 years ago
Other questions:
  • 1.
    5·2 answers
  • Write a paragraph on the following topic.
    14·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • Which field of study would be most useful for a person who wants to work in a recycling plant?
    12·2 answers
  • Radio and television are examples of
    9·1 answer
  • I can't find the errors! Could anyone help me please?!
    5·1 answer
  • You will be creating a quiz grading program. You will compare the student's answers with the correct answers, and determine if t
    15·1 answer
  • You are tasked with leading a project to build a custom software testing tool for client. You have been provided with a set of p
    7·1 answer
  • You are splitting up all your apples equally between 3 people. which statement below will calculate how many apples will be left
    12·1 answer
  • Attach 2 screen shots demonstrating an understanding of file management tools, such as keyboard shortcuts, copy, paste, delete,
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!