1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
3 years ago
15

____ languages create source code using words and structures similar to spoken language.​

Computers and Technology
1 answer:
zzz [600]3 years ago
6 0

Programming Languages.

Explanation:

Programming languages create source code using words such as "IF", "IF NOT" which is similar to spoken language.

Examples of Programming languages are C++, COBOL and Java.

You might be interested in
Select the correct answer.
ss7ja [257]
The answer a identifying portfolio goal
8 0
3 years ago
Read 2 more answers
Create a base class named rectangle that contains lenght and width data members.
kumpel [21]

Answer:

class Rectangle:  

   

   def __init__(self, length, width):

       self.length = length

       self.width = width

       

   

   def area(self):

       area = self.length*self.width

       return area

   

   

class Box (Rectangle):

   

   def __init__(self, length, width, height):

       super().__init__(length, width)

       self.height = height

       

   def volume(self):

       volume = self.length * self.width * self.height

       return volume

   

   def area(self):

       area = 2*(self.length*self.width) + 2*(self.length*self.height) + 2*(self.width*self.height)

       return area

rec_1 = Rectangle(2,4)

box_1 = Box(2,2,6)

print(box_1.length)

print(box_1.area())

   

print(rec_1.length)

print(rec_1.area())

Explanation:

The programming language used is python.

class Rectangle

The class Rectangle is created with attributes length and width.

The class attributes are initialized using the __init__ constructor.

In the rectangle class, a method/function is declared to return the area of the rectangle.

class Box

This class is a child of rectangle and it inherits all its attributes and methods,

It has an additional attribute of depth and its constructor is used to initialize it.

The class contains a volume function, that returns the volume and an override function 'area()' that displaces the area from the parent class.

Finally, some instances of both classes are created.

4 0
3 years ago
Sam wants to move from his current role in his organization to a managerial role. Which certification will help him get on a man
jolli1 [7]

CCIE refers to Cisco Certified Internetwork Expert, a technical certification that demonstrates high proficiency of managing and establishing computer networks.

CSPM may refer to Certified Security Project Manager, which is a certification to demonstrate the individual’s capability in managing project in the field of cybersecurity.

MCITP refers to Microsoft Certified IT Professional, which demonstrates an individual’s ability to be a database or enterprise messaging administrator.

Oracle DBA refers to Oracle Database Administrator, and this certification demonstrates an individual’s ability to manage Oracle’s database from retrieving, maintaining, and editing them.

While PMP refers to Project Management Professional certification, one that you can use to prove your abilities as a project manager in various business contexts.  

Thus, the best certification for him to use to get to a managerial career path is PMP.

4 0
2 years ago
When did Microsoft released MS-Word 2016? S When did Microsoft released MS - Word 2016​
Pepsi [2]

Answer:

July 9, 2015

Explanation:

It was released on macOS on July 9, 2015, and on Microsoft Windows on September 22, 2015, for Office 365 subscribers. Mainstream support ended on October 13, 2020, and extended support for most editions of Office 2016 will end on October 14, 2025, the same day as Windows 10.

3 0
1 year ago
If you receive an email message you suspect is spam, what should you do?
Alla [95]

Answer:

A.  delete the message without opening it.

Explanation:

Never open emails you don't know who sent it, it could be a hacker trying to get your personal/financial information.

6 0
3 years ago
Other questions:
  • Read the scenario and answer the question. Audrey had problems with her computer software recently. One of her programs shut dow
    12·2 answers
  • The ____ shortcut keys remove character formatting. (points : 2) ctrl 0 (zero) ctrl i ctrl spacebar ctrl u
    8·2 answers
  • Write a function M-file that takes as input two matrices A and B, and as output produces
    8·1 answer
  • How can website illustrate cooperations and kidness?
    8·1 answer
  • ( Game Design) The companies who get video games out to consumers are called:
    12·1 answer
  • __________ can be used to replace internal network addresses with one or more different addresses so the traffic that actually t
    9·1 answer
  • “identify the skill in the following scenario” :
    6·2 answers
  • What is the name of the option in most presentation applications with which you can modify slide elements? The ( answer here )op
    9·1 answer
  • Identifies the row and column that forms the cell
    11·1 answer
  • Discuss at least 1 Microsoft Windows security features that could protect data?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!