1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jobisdone [24]
3 years ago
9

Which statement is NOT true:

Computers and Technology
1 answer:
RSB [31]3 years ago
5 0

Answer:

The correct answer for the given question is   "Machine languages can be used to write programs that can run on any machine."

Explanation:

The machine language consist of binary digit i. e 0 and 1 .Computer can understand only the machine language .The machine language consist of code that is written in bits so it is used  to express algorithms.When any program is compiled the compiler are converted into machine code so the machine language is produced by the compiler .

Machine language cannot used to write a program that run on any machine.

You might be interested in
What is the correct sequence of processing instructions in a machine cycle?
Aleks04 [339]

Answer:

The four-step process of fetch, decode, execute, and store. Type of memory where the contents of this are not erased when the computer is turned off.

7 0
3 years ago
Please answer the following will mark brainiest except the first 3 rest all
ollegr [7]

Answer:

1) Standalone machine

2) Local

3) Either Wide area network(WAN) or a web

Done your first 3

6 0
3 years ago
What are some commands found in the Sort dialog box? Check all that apply.
Novosadov [1.4K]

Answer:

A. add level

D. Delete level

E. Copy level

F. Move up or down

Explanation:

I just did it on edg. 2020

4 0
3 years ago
Read 2 more answers
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofin
Ipatiy [6.2K]

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

4 0
3 years ago
In which model does each computer in a network act as a server for all the other computers, sharing files and access to devices?
RoseWind [281]
The second one Client server?
6 0
2 years ago
Other questions:
  • Why might you need to convert a file to another file type
    11·1 answer
  • In the formula "=A3/B3", what part of the formula is the "/"?<br><br> A)An operator<br> B)An operand
    5·2 answers
  • ______________ is a raw fact about a person or an object
    6·1 answer
  • Mention five features on the desktop screen​
    5·1 answer
  • What is the purpose of a report?
    12·2 answers
  • Why media is far from government​
    6·2 answers
  • Calculate The Average of Grades Instructions:
    8·1 answer
  • Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,150,
    6·1 answer
  • I need help with these
    8·1 answer
  • The code to perform a binary search is below. Match the variable name with what it holds.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!