1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
2 years ago
9

What programming language has dominated scientific computing over the past 60 years?

Computers and Technology
1 answer:
lord [1]2 years ago
7 0

c++,  because it is considered as the mother of all programming languages. you can easily access other programming languages if you have a command on c++

You might be interested in
2.Use loops to create a 4X6 matrix in which the value of each element is two times its row number minus three times its column n
DiKsa [7]

Answer:

for(i=0; i<4; i++)

{

      for(j=0;j<6;j++)

      {

               A[ i ][ j ] = 2* i - 3*j;

      }

}

Explanation:

In this loop for each i = 0,1,2,3 we fill the the corresponding column values. and then move to next i value i.e. row.

3 0
3 years ago
A(n) _______________ CRM provides all users with the tools and information they need to fit their individual roles and preferenc
fgiga [73]
A(n) "Portal-based" CRM provides all users with the tools and information they need to fit their individual roles and preferences.
4 0
3 years ago
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
3 years ago
Read 2 more answers
How are devices connected to each other via Bluetooth? Choose two answers.
Olegator [25]

Answer:

Pairing and Passkey or PIN

Explanation:

8 0
3 years ago
why might a portrait be both a portrait of the subject and the photographer? how is a photographer present in a portrait?
Nataliya [291]
Because of the reflection on the window or mirror.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Compare the current in two lightbulbs wired in a series circuit
    11·1 answer
  • All digital images are made up from varying rectangles of color, called _____________.
    6·2 answers
  • What kind of company would hire an Information Support and Service employee?
    7·1 answer
  • Using the XML Document below (library with books), define the following queries in XQuery: (a) Give the titles of all Books sort
    11·1 answer
  • How can you enter Task Manager in Windows? Select 3 options. press Ctrl + Shift + Tab press Ctrl+Alt+Delete and then click Task
    8·1 answer
  • Hey, how is everyone????????????????????????????????
    8·2 answers
  • A corporate or government network that uses Internet tools, such as Web browsers, and
    13·1 answer
  • it refers to the ability of different parts of a computer to work together as one. please answer this​
    6·1 answer
  • You have been trying all day to check your direct messages on social media. The site is really slow to load and sometimes you ca
    13·1 answer
  • A web application consists of one or more web pages. group of answer choices true false
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!