1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
5

What is stored in a source file, an object file, and his executable file?

Computers and Technology
1 answer:
neonofarm [45]3 years ago
6 0
A source file has source code, what a human understands. It isn't compiled or linked.

An object file has compiled, but not linked intermediary code.

An executable file has compiled and linked code which is executable.
You might be interested in
Smartphones use ________ technology, allowing users to perform several functions with one device. group of answer choices embedd
12345 [234]

Smartphones use <u>convergence or integration</u> technology, allowing users to perform several functions with one device.

<h3>What are smartphones?</h3>

Smartphones can be defined as hybrid versions of mobile devices that are designed and developed to have more features, so as to enable them run different software applications, functions and perform tasks with the aid of software applications such as web browsers, multimedia player, etc.

<h3>Types of smartphones.</h3>

In Computer technology, there are three popular types of mobile devices and these include the following:

  • Handheld computers
  • Personal digital assistants (PDAs)
  • Smartphones.

In Computer technology, smartphones are designed and developed to use <u>convergence or integration</u> technology by combining previously unrelated technologies together, in order to allow end users perform several functions with one device.

Read more on smart phones here: brainly.com/question/15867542

#SPJ1

8 0
2 years ago
A contracting company recently completed its period of performance on a government contract and would like to destroy all inform
avanturin [10]

Answer:

A. Consult data disposition policies in the contract.

Explanation:

The disposition of data should be carefully handled. The data associated with government project should be handled with care as it may include sensitive information. To destroy the data the company should refer the agreement and see if there is any notes included regarding the data disposition policy. The course of action to destroy the data should be according to the agreement.

5 0
3 years ago
Write an SQL statement to display full name of employees supervised by the manager whose ID is 105. Note that full name includes
Ghella [55]

Answer:

SELECT CONCATENATE(FIRST_NAME, " ", LAST_NAME) as FULL_NAME FROM TABLE_NAME WHERE MANAGER_ID = 105;

Explanation:

SELECT IS THE KEYWORD TO FETCH DATA

CONCATENATE combines FIRST_NAME, " " AND LAST_NAME and displays as FULL_NAME

TABLE_NAME is the name of the table containing the data

MANAGER _ID is the name of the column containing the manager id data

8 0
4 years ago
Read 2 more answers
Write a complete program that declares an integer variable, reads a value from the keyboard into that variable, and writes to st
vovikov84 [41]

Answer:

#include <iostream>

using namespace std;

int main ()

{

int num;

cin>>num;

cout << num<< " " << 2 num << " " << numnum;

return 0;

}

Explanation:

See answer

5 0
3 years ago
Dan needs to ensure that delegates as well as those looking at his shared calendar information are unable to see the details of
Klio2033 [76]

Answer:

If Dan uses Google Calendar application, he may edit the public visibility to "private" mode. Then, only the host of the meeting can see details. Usually can he hide the guest list but the meeting agenda is unlikely.

Explanation:

3 0
4 years ago
Other questions:
  • Can someone please help me? my audio visual teacher wants me to watch two movies. i've never seen them and i have no way to watc
    7·1 answer
  • 1. The future of 2D animation does not include hand-drawing. (1 point)
    13·1 answer
  • Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
    7·2 answers
  • You use a ____ following the closing brace of an array initialization list.
    12·2 answers
  • What properties make it suitable to be used for musical instruments?
    8·1 answer
  • Who's YouTube creator?
    10·2 answers
  • How can a smartphone's gyroscope and accelerometer be used in product marketing? A. to locate the user's geographical position B
    5·1 answer
  • Which support function under Tech Mahindra is governing data privacy and protection related requirements
    15·1 answer
  • Dates of birth were entered into a computer program . The data was stored in the format DAY/MONTH/YEAR.The program rejected this
    12·1 answer
  • What is the value of six sigma ? How dose it relate to agile management
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!