1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
3 years ago
11

________ are used to translate each source code instruction into the appropriate machine language instruction.

Computers and Technology
1 answer:
Liono4ka [1.6K]3 years ago
8 0

Answer:

compillers

Explanation:

computer programs belong in three classes; these are

Machine language (0s and 1s)

Assembly language and Highlevel languages

The popular programming languages like Java, C, C++, Python etc are all examples of high level languages. When programs are written in these highlevel languages, the programs will require another special program called compillers to carryout a translation from the highlevel language to a machine level (0s and 1s) which is the level that is executable by computers.

You might be interested in
Which method will return the first element in an ArrayList employees?
Wittaler [7]

Answer:

employees.get(0)

Explanation:

In the programming, the index of ArrayList start from zero.

So, the element start storing in the ArrayList from the zero index.

get() is the function which is used to retrieve or getting the value in the

ArrayList.

The function employees.get(0), it retrieve the element of zero index.

The function employees.get(1), it retrieve the element of first index.

The function employees.first(1), it is wrong calling.

The function employees.get(), it is wrong calling. you have to enter the index value inside the get().

3 0
3 years ago
For this step, submit your work in the programming environment by
Tems11 [23]

Answer:

is there some oppsense you can choose from

7 0
2 years ago
Identifying what you will need to review takes place during?
marishachu [46]
It takes places during surveying.

For example, let's say you want to review your own produced game application software, and found out whether it satisfy your consumer or not

Before you conduct the survey, you have to identify what aspect you want to find out from your consumers , such as : Does it have any bug ? Is it challenging enough ? is the graphic good enough ? etc
7 0
3 years ago
Read 2 more answers
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
dexar [7]

Answer:

The answer is "Recovery Plan for Disasters".

Explanation:

In the given statement, some of the information is missing, which can be described as follows:

A) systems engineering plan

B) security compliance plan

C) risk assessment plan

D) Recovery Plan for Disasters

It is a set of guidelines for the execution of a recovery process, it provides the restoration and safety to the system for the organization in the event of a disaster. It defined as "a detailed summary of the appropriate acts to be carried out before, during and after a disaster", and incorrect choices were explained as follows:

  • In option A, It is used to design and analyze complex systems.
  • In option B, It provides frameworks for the corporate evaluation process.
  • In option C, It is used to identify the problems.
6 0
3 years ago
The term ________________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, se
Vinvika [58]

Answer:

The term "Local storage"denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term "hosted storage," "Internet storage" or "cloud storage." denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network

4 0
3 years ago
Read 2 more answers
Other questions:
  • Your desktop computer monitor is not displaying a picture. What would you do to troubleshoot the problem?
    7·2 answers
  • What is the value of length after the code that follows is executed?int[][] nums = { new int [] {1, 2, 3},new int [] {3, 4, 5, 6
    8·1 answer
  • which statement draws an accurate comparison between social media marketing and conventional marketing?
    13·1 answer
  • For large and complex amounts of information, storing the information is best achieved by using what?
    5·1 answer
  • Does access provide email communication
    13·1 answer
  • David is taking a test. To answer a question, he first covers up the answer choices. Next, he tries to answer the question. Then
    15·2 answers
  • An instruction for the computer. Many commands put together to
    5·1 answer
  • Now that you have learned the basics of acquiring relevant information through research, it's time to put your skills to work.
    7·1 answer
  • Anyone have any website ideas I could use for my computing website project? Thank you.
    15·2 answers
  • Complete the following sentence by choosing the best answer from the options listed below.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!