1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
3 years ago
9

The collection of computer instructions and other files that constitute a piece of software is

Computers and Technology
2 answers:
lutik1710 [3]3 years ago
8 0
The answer would be
A. Codebase

Anettt [7]3 years ago
4 0

Answer:

A. codebase

Explanation:

A a codebase (or code base) is a collection of computer instructions known as source code written in one or more programming languages used to build a particular software system, application, or software component.

A codebase from a business perspective represents an asset could easily run into millions of lines of code representing person centuries of effort.

Also, IT staff that have been with the organization for a while  tend to develop a knowledge of the code base, and this enables them to make improvements and fix bugs and add enhancements easily.

You might be interested in
Which of the following questions will most likely be answered by displaying data on a line graph?
Neko [114]
It would be A because B could be answered best with a poll graph, C with a pie graph, and D with a bar graph. Line graphs typically show speed and rate so A makes the most sense, but you are still able to do the other questions on a line graph.
4 0
3 years ago
What modifier should you use on the members of a class so that they are not accessible to another class in a different package,
vova2212 [387]

The private modifier specifies that only other members of the same class can access the member. The protected modifier restricts access to the member to within its own package.

<h3>What are public and private modifiers?</h3>

The public access modifier permits code from both inside and outside the class to access the class's methods and properties, whereas the private modifier prevents outside code from accessing the class's methods and properties.

Thus, private modifier is the member.

For more details about private modifier, click here

brainly.com/question/15108837

#SPJ1

5 0
2 years ago
What is a device that connects to the system unit and is controlled by the processor in the computer called !
Airida [17]
Most computers have three types of ports: serial, parallel, and USB. A serial port is a type of interface that connects a device to the system unit by transmitting data only one bit at a time. Serial ports usually connect devices that do not require fast data transmission rates, such as a mouse, keyboard, or modem.
4 0
3 years ago
Your manager asks you to calculate the sale price if the product is marked down 20 percent. You enter the original price in cell
padilas [110]
The answer is =A2*.80
7 0
3 years ago
Read 2 more answers
A data type consisting of numbers, letters and symbols is a _____.
LekaFEV [45]

Answer:

That's the answer

Hope it helps

#brainliest

#heart

#star

#Carryonlearning

4 0
2 years ago
Other questions:
  • Technician A says that the excessive length of a heater hose is intended to protect the heater core from undue stress. Technicia
    5·1 answer
  • A(n) _____ identifies how you feel about an activity or subject. computer calculator interest inventory both b and c
    7·2 answers
  • What is the maximum amount that OSHA can impose as a penalty on an employer for each Willful violation?
    11·1 answer
  • Can anyone help? Please.
    10·2 answers
  • What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash
    12·1 answer
  • Hidden costs of computers into our schools
    13·1 answer
  • Write the statements needed so that the variable secondWord is associated with the second word of the value of sentence . So, if
    13·1 answer
  • A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
    15·1 answer
  • Discuss five domains of Instructional technology​
    7·1 answer
  • Create One print command in LOGO​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!