1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
1 year ago
13

A(n) _____ consists of a series of digital instructions telling the computer to complete a specific task.

Computers and Technology
1 answer:
marusya05 [52]1 year ago
7 0

Answer:

A program does that role

You might be interested in
Hich is an aspect of spatial-level design?
Tresset [83]

The answer is perspective, because you need a point of view (perspective) in order to make a design, a great design/

4 0
3 years ago
Read 2 more answers
Select the correct answer.
vaieri [72.5K]

I'm not too sure, but I can remove three of the options above. Artificial Intelligence programmers write code for Artificial Intelligence- tis in the name. Game tool programmers code for video games. Web programmers program webpages or apps for the web.


Of the two options left, I would say that it is most likely D. System Programmers. It's not a definite, though. Good luck!

3 0
3 years ago
Read 2 more answers
PLEASE HELP, NEED THIS TURNED IN IN 20 MINUTES!!!!!! WILL GIVE BRAINLIEST!!!
ratelena [41]

Answer:

We cant help with that. Maybe give me more information?

5 0
3 years ago
How do I translate my Flowchart into Psuedocode?
harkovskaia [24]

Answer:

Step 1

Open the flowchart and locate the startinglocation on the chart.

Step 2

Write the pseudocode that is equivalent to the rectangular process boxes in your diagram.

Step 3

Write the pseudocode for the diamond-shaped decision boxes in your diagram.

Step 4

Write the pseudocode for the end terminator of the flowchart.

Combine all of your converted statements above and you have a flowchart that has been converted to pseudocode.

8 0
3 years ago
Why the internet is not policed​
trapecia [35]

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

4 0
3 years ago
Other questions:
  • What is the answer to this?
    9·1 answer
  • What does Adsl stand for?
    7·2 answers
  • A Windows user contacted the help desk with a problem that requires the technician to connect to the remote computer using Remot
    12·1 answer
  • Programmers insert documentation called facts into the program code.? <br> a. True <br> b. False
    9·1 answer
  • If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is b
    8·1 answer
  • Consider the three major Vs as Volume, Velocity and Variety along with other Big Data contexts. Match the terms with the short s
    15·1 answer
  • What is the output for the following program?
    6·2 answers
  • Which discipline focuses on the design of computer hardware?
    5·2 answers
  • How to use boolean to check if math answer is correct java
    7·2 answers
  • What is considered any computer system that isn't a general-purpose pc or server?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!