1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dlinn [17]
4 years ago
11

An instruction to a computer to perform some action

Computers and Technology
1 answer:
Tanya [424]4 years ago
3 0
This would be a command. Commands are what programmers use to make a program do a certain action i.e. draw a circle or move a object.
You might be interested in
Are there protections for people in terms of what data can be collected by different sites?
s2008m [1.1K]
Yes , usually before you sign up for a website or app it will warn you and tell you what the app or website will have access to and what will gained through using the website or app
8 0
4 years ago
D. What is the work of the following features:<br>1. Foot note​
Bess [88]

Answer:

In footnotes, information is separated by commas, while in the bibliography, it is separated by periods.

In footnotes, the author's first name is listed first, while in the bibliography, the author's last name is listed first.

The titles of books and journals are put in italics.

The titles of articles are put in quotation marks.

All key words in titles are capitalized.

Explanation:

3 0
3 years ago
if you love games played on facebook, such as farmville, what might be your motivation for playing games
castortr0y [4]

Plato users the answer is Social Interaction!

3 0
4 years ago
How do technologies such as virtual machines and containers help improve
Alla [95]
The answer is.. D. By allowing multiple applications to run on a single server.

Got 100% on test!

Hope this helps!!
8 0
2 years ago
In a wireless ____ network, devices broadcast directly to each other.
Softa [21]
In a wireless Broadband network
5 0
3 years ago
Other questions:
  • According to many experts how often should files be backed up
    12·2 answers
  • Program for bit stuffing...?
    9·1 answer
  • What two methods can be used to access and modify an existing program that is running on an iot device in cisco packet tracer? (
    6·1 answer
  • Stella is surfing the Internet to look for affordable apartments in New York City. Every time she clicks on a link to a webpage,
    9·1 answer
  • In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:
    10·1 answer
  • James would like to send a document he has saved on the hard drive to coworkers in Ireland, Brazil, and India. These coworkers h
    6·2 answers
  • The __________ utility has the capability to manage users, create and administer user groups, and apply user rights to those use
    8·1 answer
  • Which scenario describes unethical lab behavior?
    9·1 answer
  • Add and multiply
    10·1 answer
  • A large company has a LAN. The manager of the company wants to change it to a WAN
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!