1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
4 years ago
8

_____, such as basic, python, java, prolog, and c++, make the programming process easier by replacing unintelligible strings of

1s and 0s or cryptic assembly commands with understandable commands, such as print and write.
Computers and Technology
1 answer:
irakobra [83]4 years ago
7 0

These kind of languages are known as "High-Level Languages".

You might be interested in
Game Design Help please
vova2212 [387]

Because, to put it simply, to use more complicated shapes requires more processing power which is unnecessary. Only if they would touch all parts of the shape should it be complicated.

5 0
3 years ago
Why is Linux widespread in academic environments?
boyakko [2]
The answer will be... hmmm.. D?
8 0
3 years ago
A wireless access point is most like which other network device, in that all computers send signals through it to communicate wi
scZoUnD [109]

Answer:

Hub is the correct answer for the above question.

Explanation:

  • The hub is a network hardware device which can connect more computer with the network.
  • It has a multi-point which is used to connect multiple systems with the network or internet to share the information among them.
  • When any computer which is connected through this needs to communicate with the other computers on a network then it needs to send the signals to this device first then this device sends the signal to the other device.
  • The above question ask about that device which is used to connect the computer and send the signals to communicate which is a HUB which is described above.
3 0
4 years ago
In peer to peer systems, the guarantees offered by conventional servers may be violated by:(a) physical damage to the host;(b) E
gayaneshka [121]

Answer:

Check the explanation

Explanation:

The two examples for each type of violation:

A) Power failure and Act of sabotage

B) Accidental deletion of file and Permission failure

C) Tampering of data, Denial of service attack

D) Failures of HDD (hard disk) and finding program bugs.

Note:

There is a difference in trusted behavior for pc's and servers are relevant because pea-to-peer system must be designed to cope with the looser interpretation of trust for pi s

4 0
4 years ago
Given a structural design calling for 1-inch rebar with 2 inches of cover and a spacing of 2 inches center-to-center in a 9-inch
7nadin3 [17]

Answer:

Answer is 3/4 inch.

Refer below.

Explanation:

The nominal maximum aggregate size allowed by the ACI 318-08 code is:

3/4 inch

5 0
3 years ago
Read 2 more answers
Other questions:
  • For C++ (please make sure it runs properly)
    14·1 answer
  • Changeover means that ____. (select all that apply)
    7·2 answers
  • Is a small file that a web server writes to the disk drive of the client computer, containing information about the user?
    8·1 answer
  • To copy and paste from an excel workbook to a word document, you must first
    6·1 answer
  • On a network, a(n) ________ helps prevent data packets from colliding with each other.
    9·1 answer
  • In this chapter, you saw an example of how to write an algorithm that determines whether a number is even or odd. Write a progra
    6·2 answers
  • Is the following sentence true or false? During meiosis, the two alleles for each gene stay together. ______
    15·1 answer
  • What is computer networking?
    14·1 answer
  • What is the ribbon used for in word
    9·1 answer
  • How is an operating system like a translator?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!