1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
12

What does a professional programmer usually do first to gain an understanding of a problem?

Computers and Technology
2 answers:
ElenaW [278]3 years ago
6 0
The correct answer to your question is:

Professional programmers work directly with, and interview customers to find out what the problem is.
Nadya [2.5K]3 years ago
6 0

Answer and explanation:

Before even starting encoding, a professional programmer should <em>find out what is the customer looking</em> for to have a general idea of what the programming will be like. This does not imply during the process of encoding the professional will not take the customer idea's into consideration to get to the final work result.

You might be interested in
Android OS "AFTER" Alpha.<br><br> A. Bubblegum<br><br> B. Beta<br><br> C. Berry<br><br> D. Buzz Cola
algol13
Alpha is first trial run

Beta usually comes next, with patches and fixes to problems or shortfalls in the Alpha test release

Then more tweaks/fixes comes a full public rollout.

Believe Android release 11.0 beta version testing started in June of 2020.
3 0
3 years ago
A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
Black_prince [1.1K]

Answer:

A(n)  <u>Cipher</u> or crypto-system is an encryption method or process encompassing the algorithm, key(s) or crypto-variable(s), and procedures used to perform encryption and decryption.

Explanation:

  • Cryptography is such a technique that is used for the secure transfer of the information. We make codes for this purpose.
  • Cryptosystem is such a system in cryptography is simply an encryption method that has three algorithms. One algorithm is used for the generation of key, one for encryption and decryption.
  • Encryption is a process of converting the information in a data that is not understandable and decryption, this non-understandable data is converted into information so that we can read it.  
3 0
4 years ago
In addition to the four primary computer operations, today's computers almost always perform ____ functions.
NeX [460]

The correct answer is:    " information "  .

_________________________

<u>Note</u>:  In addition to the [4 (four) "primary computer operations" —  which are:  

 "input, processing, output, and storage" ] — today's computers almost always perform <u>  information  </u> functions.

_________________________

5 0
3 years ago
"Which NET command is used on a Windows PC to establish a connection to a shared directory on a remote server?"
Advocard [28]

Answer:

The Tracert command

Explanation:

The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives.

6 0
3 years ago
Write a class named Car that has the following fields: yearMode1. The yearModel field is an int that holds the car's year model.
Gekata [30.6K]
Skeh wkf ahfmroztdjdy
Dmgk
Ann Write a class named Car that has the following fields: yearMode1. The yearModel field is an int that holds the car's year model. make. The make field is a String object that holds the make of the car, such as "Ford" "Chevrolet", "Honda", etc. speed. The speed field is an int that holds the car's current speed. In addition, the class should have the following methods . Constructor. The constructor should accept the car's year model and make as ments. These values should be assigned to the object's yearModel and make fields. The constructor should also assign 0 to the speed field. Accessor. The appropriate accessor methods get the values stored in an object's yearModel, make, and speed fields. , accelerate. The accelerate method should add 5 to the speed field each time it is called _________. brake. The brake method should subtract 5 from the speed field each time it is called.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Upgrading only the motherboard will give some performance improvement to a computer system. Why would the improvement be limited
    14·1 answer
  • Computer Architecture
    7·1 answer
  • Brainly won't let me create an account even though i tried multiple emails and ages! It keeps saying "We're sorry, but we are no
    8·2 answers
  • _____________ data is what is translated to digital format so it can be stored in a computer.
    10·1 answer
  • Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What
    9·1 answer
  • For a parking application that lets you pay for parking via your phone, which of these is an example of a functional requirement
    8·1 answer
  • define the term computer hardware and its various types mentioning 5 examples of IP or devices with one diagram each​
    9·1 answer
  • What will the computer do in response to a line of code reading # name = input("What is your name?")
    7·1 answer
  • Create a list called courses containing the names of your current courses.
    9·1 answer
  • true Or False 1. Computer Time is located in Start Menu, b. Ms Word is developed by Adobe Corporation c. Ms-Excel is Presentatio
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!