1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
5

Programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as sen

d or receive data. For example, Amazon provides these to let developers write their own applications and websites that can send the firm orders.
Computers and Technology
1 answer:
RideAnS [48]3 years ago
4 0

Answer:

"Application programming interface(API)" is the correct answer for the above question.

Explanation:

  • API is an interface which is used to call the different software in the currently developing software by the developer to inbuilt some task of that software.
  • The full of this is the Application programming interface. It is an interface or guidelines which are used to tell the other software, that how a particular service is performed.
  • The above concept is asked by the above question. so the answer is API.
You might be interested in
The tone a writer takes is referred to as the writing _____.
ch4aika [34]
Atmosphere or mood!
 i really hope this is it


6 0
2 years ago
Read 2 more answers
True/False: If a function is legally prototyped to return an integer value, it can return a structure member that is an integer
sdas [7]
#1) If a function is legally prototyped to return an integer value, it can return a structure member that is an integer data type.
Answer: True. Any method that is not declared void must contain a return statement with a corresponding return value. The data type of the return value must match the method's declared return type; you can't return an integer value from a method declared to return a boolean.
5 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
What would you recommend for data segregation if using cloud software
Nadusha1986 [10]

Answer:

Hard very good hard drive

Explanation:

3 0
3 years ago
Read 2 more answers
Human centered technology often recommends a0 to computer designers and manufacturers, telling them how to make systems and the
IceJOKER [234]

Human centered technology often recommends best practices to computer designers and manufacturers, ...............

Human-Computer Interaction is a study that particularly focuses more on the design of computer technology and the interaction between humans and computers. Since the 1980s when HCI surfaced, it has become a crucial tool in popularizing the idea that the interaction between a user and a computer should resemble a human-to-human, open-ended dialogue. When HCI is done well, a human-centered approach powers the creation of products that resonates more deeply with a certain audience. This will ultimately drive engagement and growth.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Write an essay on online collaboration, how to do it, the challenges, resolving the challenges, and consider whether the risks a
    12·1 answer
  • Write a program that reads in text from standard input (hint: use Scanner) and prints out the number of words in the text. For t
    5·1 answer
  • Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks
    15·1 answer
  • Discuss the pros and cons of tombstoning versus multitasking. Why do you think Microsoft chose tombstoning?
    11·1 answer
  • PLEASE HELP! I'm offering brainliest!
    6·1 answer
  • Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
    8·1 answer
  • Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and
    13·1 answer
  • Cleo is new to object oriented programming. which type of action can be taken on on object?
    14·2 answers
  • Information about www
    14·1 answer
  • What is the meaning of s used in 0 and 1 in computer .​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!