1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
11

Explain three reasons why so many different computer languages exist. Pleaseeee

Computers and Technology
1 answer:
zmey [24]3 years ago
3 0

Each language has its own use, some of them are used to create or manipulate back end codes and some of them are used mainly for web designing and some of them are used for data entries and control of data that is being implanted in the system, so if you put all uses in one language it will not be a simple task as it is nowadays for programmers. That is why there are different compt. langs.

You might be interested in
The Fed: decreases the money supply when the economy contracts. performs banking services for commercial banks in districts wher
Slav-nsk [51]

Answer:

performs banking services for commercial banks in districts where it operates.

Explanation:

The Federal Reserve System ( popularly referred to as the 'Fed') was created by the Federal Reserve Act, passed by the U.S Congress on the 23rd of December, 1913. The Fed began operations in 1914 and just like all central banks, the Federal Reserve is a United States government agency.

Generally, it comprises of twelve (12) Federal Reserve Bank regionally across the United States of America.

Hence, the Fed performs banking services for commercial banks in districts where it operates, as well as providing services to the general public.

4 0
3 years ago
Which method is useful for dimensionality reduction especially for small data-sets?
Anna [14]
Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.
8 0
3 years ago
Question 5 (2 points)
Scrat [10]

Answer:

B) 5 m/s

Explanation:

Took the test and this was the correct answer :)

6 0
3 years ago
1.07 (PX: 2 points)Some early computers protected the operating system by placing it in a memory partition that could not be mod
Anna11 [10]

Answer:

The user cannot make internal changes, or personalize the computer. Also it would make it very easy for viruses to get into the computers and ccorrupt the entire thing. There is a similar example of this today in Modern Day chromebooks, but earlier computers were not as safe or secure. Also the fact that it can takes up massive amounts of data, requiring more server storage or data storage facilities.

6 0
3 years ago
How will I go about conducting the investigation on fake news
Leno4ka [110]

Answer:

You can begin your report, and write about CNN, BBC, or any other liberal news network.

Explanation:

5 0
3 years ago
Other questions:
  • HELP PLEASE
    7·2 answers
  • What is the highest education degree available at a community college
    14·1 answer
  • Why is it important to use the binomial nomenclature system?
    6·1 answer
  • Write a program that reads in your question #2 Python source code file and counts the occurrence of each keyword in the file. Yo
    11·1 answer
  • 100 Base-T: Group of answer choices
    11·1 answer
  • Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model
    7·1 answer
  • You use a 1200 watt hair dryer for 10 mintues a day.
    7·1 answer
  • what is hardware ? Name the four functional hardware of a computer system Define each of them with the help of a diagram​
    12·1 answer
  • I need help fixing “Love Nikki” game on my phone. I had it on my phone and it worked just fine but then igot a new phone and tri
    8·1 answer
  • What extra dimension do 3D objects have that 2D objects do not have?<br><br> help
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!