1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
3 years ago
15

____ languages create source code using words and structures similar to spoken language.​

Computers and Technology
1 answer:
zzz [600]3 years ago
6 0

Programming Languages.

Explanation:

Programming languages create source code using words such as "IF", "IF NOT" which is similar to spoken language.

Examples of Programming languages are C++, COBOL and Java.

You might be interested in
How do you reset a g.mail password?
ikadub [295]

Answer:

put: forgot password to reset it

5 0
3 years ago
Read 2 more answers
Kelly arrives for work at a restaurant at 5:00 p.m. Once there, she washes and chops vegetables, then sets aside ingredients and
kari74 [83]

Answer:

ExplanKelly arrives for work at a restaurant at 5:00 p.m. Once there, she washes and chops vegetables, then sets aside ingredients and organizes them for the cook. Kelly is most likely a  

✔ Food Preparation Worker

.

Mark's work hours change every week, depending on when he is needed. He wears a suit and tie to work at an elegant restaurant. He greets guests and seats them in a waiting area. He then guides them to their tables. Mark is most likely a  

✔ Host

3 0
3 years ago
Read 2 more answers
The ____ shortcut keys remove character formatting. (points : 2) ctrl 0 (zero) ctrl i ctrl spacebar ctrl u
Bad White [126]
The CTRL+SPACEBAR shortcut keys remove character formatting. 
8 0
3 years ago
Read 2 more answers
E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA regulations affect e-mail us
oksano4ka [1.4K]

Sending potentially sensitive information by email

Potentially sensitive information can be sent via Email only if the Email is encrypted

Explanation:

No doubt Email is an inexpensive efficient means of communicating quickly. But it is prone to hacking and it is not a secure mechanism. In order to add security ,the Email needs to be sent in an encrypted form. Banking and HIPAA regulations require the emails to be sent in encrypted form as it is a secure mechanism. Even if one has the consent from the client , the Email has to be in encrypted. Even if the Organization's e-mail system has appropriate firewalls and related infrastructure , the golden rule is to send encrypted format Emails.

7 0
4 years ago
When declaring the data type for a multidimensional array of strings, which statement would be most appropriate?
romanna [79]

Answer:

This question required option (See Explanation)

Explanation:

Required

How to declare 2D array

Using Java as a programming language of reference, the syntax to declare a 2D array is:

Data-Type [][] Array-Name = new Data-Type[Rows][Column]

From the question, the data type is String. So, the syntax becomes

String [][] Array-Name = new String[Rows][Column]

Assume the array name is: myArray; The above becomes

String [][] myArray= new String[Rows][Column]

<em>I will not assume values for Rows and Column, but it is worth saying that Rows and Columns are positive integers greater than 1 to make the array a 2 D array</em>

4 0
3 years ago
Other questions:
  • Considers the assets of all things in an environment, and refers to the layering of security tools and methods often varying num
    13·1 answer
  • Do all accounts use the same routing number
    12·1 answer
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • The Boffo Balloon Company makes helium balloons. Large balloons cost $13.00 a dozen, medium-sized balloons cost $11.00 a dozen,
    13·1 answer
  • What safety precaution should you take while filling the fuel tank of a gasoline-powered boat?
    8·1 answer
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • Rachelle's computer has frequent system crashes and it takes a long time to access files and folders. What hardware component is
    8·1 answer
  • To make slides in a PowerPoint Online application presentation have the same transition effect, select __________ on the Transit
    11·2 answers
  • Lonnie needs to use a special kind of block in his game that will tell him whether an object has slammed into his car true or no
    13·1 answer
  • Shreya has combined all the cells in a single leftmost column in a table. Instead of identifying the category multiple times, sh
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!