1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LUCKY_DIMON [66]
3 years ago
9

Pedro has written a program in a high-level language to do some calculations for a friend. His friend needs to use the program i

mmediately on his laptop. Pedro does not know what software is available on the laptop. Also, his friend's internet connection is very slow. Explain which type of translator Pedro should use for his program. Give reasons why this is the best choice in this case.​
Computers and Technology
1 answer:
Fofino [41]3 years ago
4 0

In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.

<h3>Why do you need to translate a program written in a high-level language into machine language?</h3>

Programming languages are known to be easy for humans to read and understand.

Note that The program (source code) need to be translated into machine language so that the computer can be able to carryout the program.

Therefore, In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.

Learn more about machine language from

brainly.com/question/23275071

#SPJ1

You might be interested in
Expalin the defference between the driver of a desktop and a laptop​
Pani-rosa [81]

Answer:

None, drivers are hardware specific, if both devices share the same hadware manufacurer they tend to have the same drivers.

A driver is a software component that lets the operating system and a device communicate with each other. So asking for a difference in drivers is as asking the difference in hardware in both devices, though one tends to be more intergrated they are all the same in low level functions

Also drivers might not even communicate directly with the device but send a request. thats why some drivers can be written directly into an operating system.

7 0
3 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
Your boss calls you in a panic. he said he just deleted three paragraphs and doesn t know how to bring them back. what do you te
Ipatiy [6.2K]
Undo is Ctrl-Z. Undo buttons also exist in most non-Notepad text editing programs.
5 0
3 years ago
John typed 545 words in 35 minutes, what is his typing speed
Katarina [22]

Answer: 545 words per 35 mins

Explanation:

4 0
3 years ago
Read 2 more answers
Rtjfifjjir<br> jhjjbkjkjjgggjhvhjvhf
V125BC [204]
Skakskdnsmakakkskzskskslslskakidfjjfueiskxncjowkcnjsosldnxnxisoszmsmzkakaskzkkz 浜はまはまはたはまりまる
6 0
3 years ago
Other questions:
  • Excel 2016 is primarily what type of program?
    15·1 answer
  • Which of the following statements is​ FALSE? A. Security is a huge concern for nearly all organizations with private or propriet
    14·1 answer
  • What controls the duration of light that is allowed on the sensors
    15·1 answer
  • Um can anyone who is really into science and physics answer this question
    7·1 answer
  • Which remote access configuration option should you choose if you want mobile users to be able to make a secure connection to th
    9·2 answers
  • What is the difference between operating systems and application software?
    5·1 answer
  • im in honors comupter science and one of my questions is evaluate 18% 7 does anyone know how to answer that
    6·1 answer
  • What are the defenses to protect against these attacks?
    13·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • 16 POINTS
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!