1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
5

What is stored in a source file, an object file, and his executable file?

Computers and Technology
1 answer:
neonofarm [45]3 years ago
6 0
A source file has source code, what a human understands. It isn't compiled or linked.

An object file has compiled, but not linked intermediary code.

An executable file has compiled and linked code which is executable.
You might be interested in
While using a Web-based order form, an attacker enters an unusually large value in the Quantity field. The value she entered is
maxonik [38]

Answer: integer overflow

Explanation:

The type of attack has occurred in this scenario is a integer overflow. An integer overflow occurs when there's an attempt by an arithmetic operation to create a numeric value which is outside the range which the given numbers are able to represent.

In this, the integer overflow occurs when the result of the integer operation cannot be able to fit in the allocated memory space which then brings about an unexpected result.

6 0
3 years ago
Write any four common hardware devices​
marishachu [46]

Answer:

Input devices: For raw data input.

Processing devices: To process raw data instructions into information.

Output devices: To disseminate data and information.

Storage devices: For data and information retention.

8 0
2 years ago
Maria is an experienced programmer who has worked on different projects. She was recently promoted to be a software development
Lana71 [14]
Leading a software engineering/development team must require patience, understanding, and of course strong leadership skills. To lead a software team, you have to understand the work that goes into programming and building the end product which takes time. Additionally, strong leadership and communication skills can drive the team towards the goal, which has been set.
5 0
3 years ago
What should you call a person who has permission to bypass the security of a computer to access it
Sav [38]

Answer:

Administrator

Explanation:

Such permission to bypass the security of a computer to access it is being given to only the administrator. No other user is allowed to have such privileges. And there is only one administrator in a team, and this is the standard as only then the security of a network of computers, and a particular computer can be ensured. And the correct answer to this question is certainly the Administrator.

7 0
3 years ago
When an isolated object becomes charged by induction, which best describes the net charge on the object?
cupoosta [38]
<span>C. The net charge does not change. 

The charge remains neutral and thus, polarization takes effect. Polarization simply means electrons and protons are separated into opposites. To best explain this, we can use a rubber balloon that has been rubbed against animal fur. Assume is has been negatively charged, bring it close to the object and make sure that these two do not touch. Electrons within the object will experience a repulsive force. 
</span>
Since repulsion will be greatest for those electrons nearest the balloon, many of them will be induced into moving away from the rubber balloon. By default, electrons are free to move from atom to atom and thus there will be a mass migration of balloons side of the object to the opposite side of the object. <span>This will leave more atoms on the rubber balloon’s side of the object with a shortage of electrons and will be positively charged and vice versa. </span>Overall, the object will become electrically neutral. 

 
5 0
3 years ago
Other questions:
  • According to your textbook, which of the following is a consequence of the quick development of new technologies in the digital
    8·1 answer
  • Which is a common problem caused by the widespread use of computers?
    7·1 answer
  • Adult learners understand a topic best by doing it. It gives them both new skills and confidence in their ability to carryout th
    6·1 answer
  • Michale spent 80 minutes at the libary he finished studying at 4:00 what time did michale start studying
    8·1 answer
  • Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred a
    9·1 answer
  • When is an original work considered public domain?
    7·1 answer
  • Design a class named Person and its two subclasses named Student and Employee. Make Faculty and Staff subclasses of Employee. A
    13·1 answer
  • Is there a way for me to play a .mp3 file from my computer using Atom?
    10·1 answer
  • Read each of the following statements about Computer Science and explain why you think that statement is true.
    9·1 answer
  • Function of Control Unit in a computer
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!