1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
12

Specialized vocabularyis known as:

Computers and Technology
1 answer:
svet-max [94.6K]3 years ago
4 0

Answer:

<u>"Jargon"</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

<em>Specialized vocabulary</em> is sometimes also known as <u>"Jargon"</u> . These are sets of words that are used specifically and uniquely for specific sets of groups or organizations.

For example Lawyers Judges and other law enforcement officials have their own Specialized vocabulary that are better understood by other people in Law enforcement, people that are not part of Law Enforcement might have a hard time understanding.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
What objective behaves like a high level array
zavuch27 [327]

Answer:

C.Vector

Explanation:

Vector is a high level array used in C++.It has the capability of resizing itself when it gets full.it has many functions that increases it's functionality like size(),begin(),end(),erase(),clear(),push_back(),pop_back() and many more and we store any kind of data type in the vector.

syntax for declaring a vector:-

vector<data type> vector name.

8 0
3 years ago
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
Binary Number Cards
Sedaia [141]

Answer:

13: 1101

5: 0101

10: 1010

2: 0010

Explanation:

The binary system, on the other hand, is a base-2 number system. That means it only uses two numbers: 0 and 1. When you add one to one, you move the 1 one spot to the left into the twos place and put a 0 in the ones place

what is done with the dice is to have an example of how binary numbers are made until 15

5 0
3 years ago
Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
astraxan [27]

Answer:

Activation Records

The storage (for formals, local variables, function results etc.) needed for execution of a

subprogram is organized as an activation record.

An Activation Record for “Simple” Subprograms

.

Activation Record for a Language with Stack-Dynamic Local Variables

Dynamic link: points to the top of an activation record of the caller

Explanation:

6 0
3 years ago
In a C++ program, one and two are double variables and input values are 10.5 and 30.6. After the statement cin &gt;&gt; one &gt;
SSSSS [86.1K]

Answer:

variable one stores 10.5 and two stores 30.6

Explanation:

In c++ language, the cout keyword is used to write to the standard output. The input from the user is taken by using the cin keyword.

For the input from the user, a variable need is declared first.

datatype variable_name;

The input can be taken one at a time as shown.

cin >> variable_name;

The input for more than one variable can be taken in a single line as given by the syntax below.

1. First, two variables are declared.

datatype variable_name1, variable_name2;

2. Both input is taken simultaneously as shown.

cin >> variable_name1, variable_name2;

For the given scenario, two double variables are declared as below.

double one, two;

The question mentions input values for the two double variables as 10.5 and 30.6.

3. The given scenario takes both the values as input at the same time, in a single line as shown below.

cin >> one >> two;

4. After this statement, both the values entered by the user are accepted.

The values should be separated by space.

First value is stored in the variable one.

Second value is stored in the variable two.

5. The user enters the values as follows.

10.5 30.6

6. The value 10.5 is stored in variable one.

7. The value 30.6 is stored in variable two.

The c++ program to implement the above is given below.

#include <iostream>

using namespace std;

int main() {

   double one, two;      

   cout << " Enter two decimal values " << endl;

   cin >> one >> two;

   cout << " The input values are " << endl;

   cout << " one : " << one << " \t " << " two : " << two << endl;

   return 0;

}

OUTPUT

Enter two decimal values  

10.5 30.6

The input values are  

one : 10    two : 530.6

6 0
3 years ago
Other questions:
  • A(n) __________ program translates a high-level language program into a separate machine language program.
    8·1 answer
  • What is SAFFiR? (The robot)
    12·1 answer
  • Which law was established to prevent law enforcement agencies from accessing communication through telephone and digital mediums
    8·2 answers
  • A Gym Masters system programmer has just installed the first Windows Server 2016 sys- tem and now needs to do an initial configu
    13·1 answer
  • Pls help with this (20 points again)
    8·1 answer
  • 1) How can you set data types such as Number, currency and date in Ms- Excel? 2) Explain how values, text, data and time can be
    11·1 answer
  • To light up an LED, you need to connect the cathode leg to one of the Digital Pins and connect the Anode leg to the ……………. on th
    13·1 answer
  • The template code provided is intended to check whether an integer entered by the user is outside of the range 20-29 (inclusive)
    9·1 answer
  • What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usag
    7·1 answer
  • The ability to present an effective message with useful content is obviously important to a good _____ presentation.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!