1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adelina 88 [10]
3 years ago
9

An application programming interface (API) is: Group of answer choices the code the application software needs in order to inter

act with the CPU the currently active part of an application all other answers are incorrect the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM
Computers and Technology
1 answer:
WITCHER [35]3 years ago
7 0

Answer:

The code the application software needs in order to interact with the CPU

Explanation:

You might be interested in
_______For the C programming language, files containing the code you write are named with a file extension of .g. (T/F)
erastovalidia [21]

Answer:

False.

Explanation:

In C programming language the file which containing the code that we are writing the code is have the file extension .c and for c++ it is .cpp.  C programming language is a general purpose procedural computer programming language.

.g file extension is for data chart file format used by APPLAUSE database development software.

Hence the answer to this question is false.

4 0
3 years ago
Complete the sentences.
Anarel [89]

Answer:

fiances

Explanations it just  is

5 0
2 years ago
A programmer hacks software code to understand how it works. Then she writes a program that replicates the implementation of a s
Setler [38]

Answer:

Patent violation.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of trademarks, copyright and patents.

In this scenario, a programmer hacks software code to understand how it works. Then she writes a program that replicates the implementation of a solution that has already been granted intellectual property protection.

Hence, this is an example of a patent violation because she was not given the permission or rights by the intellectual property owner to modify the software.

4 0
3 years ago
Define a function below called average_num_in_file. The function takes one argument: the name of a file full of numbers. Complet
Nookie1986 [14]

Answer:

  1. def average_num_in_file(fileName):
  2.    with open(fileName) as file:
  3.        rows = file.readlines()
  4.        sum = 0
  5.        count = 0
  6.        for x in rows:
  7.            sum += float(x)  
  8.            count += 1
  9.        average = sum / count  
  10.    return average  
  11. print(average_num_in_file("cans.txt"))

Explanation:

The solution code is written in Python 3.

Firstly create a function that take one parameter, fileName (Line 1).

Open the file stream and use readlines method to read the data from the file (Line 2-3). Create variable sum and count to tract the total of the number from text files and number of data from the file (Line 5-6). Use a for loop to loop over each row of the read data and add the current value of each row to sum and increment the count by one (Line 7-9).

After the loop, calculate the average (Line 11) and return the result (Line 12).

At last, we can test the function by passing the cans.txt as argument (Line 14).

7 0
3 years ago
An automated search feature used by search engines to find results that match your search terms is called spider or
LenKa [72]
The answer is crawler
6 0
3 years ago
Other questions:
  • Where is the insert function button found in microsoft excel?
    11·1 answer
  • A poem for coduction
    15·2 answers
  • Company policies require that all network infrastructure devices send system level information to a centralized server. Which of
    6·1 answer
  • Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline.
    15·1 answer
  • [20 pts] Write the function rectangle(perimeter, area), which takes two positive integers, perimeter and area. It returns an int
    11·1 answer
  • Two technicians are discussing engine valve timing. Technician A says that the optimum valve timing is found through experimenta
    13·2 answers
  • Floating point numbers?
    9·1 answer
  • Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm th
    14·1 answer
  • a matched-pairs t-test is not an appropriate way to analyze data consisting of which of the following?
    11·1 answer
  • This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!