1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
2 years ago
9

The collection of computer instructions and other files that constitute a piece of software is

Computers and Technology
2 answers:
lutik1710 [3]2 years ago
8 0
The answer would be
A. Codebase

Anettt [7]2 years ago
4 0

Answer:

A. codebase

Explanation:

A a codebase (or code base) is a collection of computer instructions known as source code written in one or more programming languages used to build a particular software system, application, or software component.

A codebase from a business perspective represents an asset could easily run into millions of lines of code representing person centuries of effort.

Also, IT staff that have been with the organization for a while  tend to develop a knowledge of the code base, and this enables them to make improvements and fix bugs and add enhancements easily.

You might be interested in
Ally made the net below to find the surface area of a box she was designing. The box measures 12 centimeters long by 9 centimete
jarptica [38.1K]

The area of the box is 972.

7 0
3 years ago
What is the difference between the (BIOS) basic.input.output.system and R.O.M
abruzzese [7]
EX: A BIOS is a file used to make an emulator work properly. <span>A ROM is a copy of a game downloadable online.</span>
6 0
3 years ago
Please help! i need to answer this soon!
natali 33 [55]

Answer:

1. a modem connects a computer to the internet  

4. a modem transmits digital signals over a telephone line

5. a dial-up modem communicates using a telephonic call​

All of three mentioned above.

Modem stands for modulator de-modulator, and it connects the computer to the internet. Its not the fastest, which is router. And the connection is established via the telephone line, through which the digital signals is being transmitted, And the type used is dial up communication.

Explanation:

The answer is self explanatory.

4 0
3 years ago
Most _____ focus on galning entry over the internet to a secure computer system by finding a
dangina [55]

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

5 0
3 years ago
Choose the comparison operator that will create a true statement in Scratch
andrew11 [14]

Answer:

The second option

90 > 85

The statement above means 90 is more than 85 which is true.

7 0
2 years ago
Other questions:
  • Which of the following statements is false?
    12·1 answer
  • False when you tap or click the ‘decrease font size’ button, excel assigns the next lowest font size in the font size gallery to
    13·1 answer
  • Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
    12·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • [Java] Using the comparable interface
    13·1 answer
  • Which of the following jobs is considered part of the information technology industry?
    15·2 answers
  • Generally considered to be the most important information security policies, what item below defines the actions a user may perf
    11·1 answer
  • What do you mean by GIGO (Garbage-In-Garbage-Out) in computer system?​
    6·1 answer
  • Whay is processing?Explain with an example.​
    9·2 answers
  • What can hack or code can I use to get a shadow or frost dragon in adopt me
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!