1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
4 years ago
7

The basic meaningful units of any language are called ______. phonemes morphemes semantics sound bytes pragmatics

Computers and Technology
1 answer:
Alenkinab [10]4 years ago
4 0
The true language of computers is communicating in binary code. Binary code is just a long strip of 1's and 0's, and each one digit is called a byte. A byte is either a 1, or 0, so the language of computers will be composed of bytes. 

Hopefully, this answered your question! And if it didn't completely, then I hope it gave you a better level of general understanding. =)
You might be interested in
Discuss the importance of top management commitment and the development of standards for successful project management. Provide
sasho [114]

Answer:

Significance of top administration responsibility: Top administration duty assumes an indispensable job in the development of any association. The duties of top administration decied the future objective of the association. So we can say that the development of association is straightforwardly proportional to the duties set by the top administration.

The viable and effective headings and the duties bargains the association to achive the arranged objectives and the objectives.

Improvement of Standards: Development of norms are likewise significant in any association. The quality check of the association or the review is being finished dealing with the these measures. So we can say that the nature of association is estimated on the bases of norms set. That is the reason its essential to set the gauges

initially, characterize the measures and flow it inside the association. Since it by implication sway the nature of any association.

For example if we are developing any project that its important that we should be clear about the expectation and commitments set by the top management regarding the

project and it should be developed on the standards set by the organization. Because without these two fators it may happen that our project fails in real

scenario

1. Difficulties in regards to asset the board.

2. Difficulties with respect to cost and budgetary needs

3. Difficulties in regards to innovations and skiils

4. Difficulties in regards to convenient conveyance of the task

Explanation:

4 0
4 years ago
O How basic blocks are identified and how the blocks are used to construct control flow graphs
OLEGan [10]

Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Note that  Basic Block is said to be a composition  of statements that is known to be one that often always executes one after other, and this is often done in a sequence.

<h3>How do you create a flow graph from the basic blocks?</h3>

Flow graph  is gotten by:

  • Lets Block B1 be the initial node and also Block B2 will tend to follows B1, so from B2 to B1 there is seen a kind of an edge.

Note that the first task is for a person to partition a sequence of three-address code and this is done into basic blocks.

Hence, Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Learn more about basic blocks from

brainly.com/question/132319

#SPJ1

5 0
2 years ago
What are the names of first generation computers?
KengaRu [80]
EDSAC is the first computer ever
8 0
3 years ago
A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.
masha68 [24]

This is a trojan horse type of virus.

5 0
3 years ago
Read 2 more answers
How is a secure HTTP (HTTPS) different from a non-secured HTTP?
GuDViN [60]

Answer:

the second last option

Explanation:

secure HTTP is armed with passwords to ensure that only authorised users gain entry.

the data is encrypted during transmission

6 0
2 years ago
Other questions:
  • A network engineer is examining a configuration implemented by a new intern who attached an ip phone to a switch port and config
    9·1 answer
  • To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuat
    8·2 answers
  • Write the function header (the first line of the function definition) to define a function named DisplayStats that accepts a str
    5·1 answer
  • What should you do to help prepare yourself for the delivery of your presentation? you can chose more then one
    8·1 answer
  • To display data in a certain manner, like alphabetical order, is called
    5·2 answers
  • Which famous individuals was born on october 31st?
    7·1 answer
  • A local pizza shop is selling a large pizza for $9.99. Given the number of pizzas to order as input, output the subtotal for the
    12·1 answer
  • To obtain your class E learner license, youll need too _
    9·1 answer
  • What will be displayed after this code segment is run?
    5·1 answer
  • Write a recursive function called digit_count() that takes a positive integer as a parameter and returns the number of digits in
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!