1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
4 years ago
10

The ability of a language to let a programmer develop a program on computer system that can be run on other systems is called

Computers and Technology
1 answer:
kakasveta [241]4 years ago
6 0
It is called 'portability'.
You might be interested in
Your company collects and stores security camera footage. Within the first 30 days, footage is processed regularly for threat de
Sliva [168]

Answer:

<em>For the very first 30 days, use Google Cloud Regional Storage, then switch to Coldline Storage.</em>

Explanation:

Coldline Storage is a cost-effective, extremely durable information archiving, online backup, and disaster recovery web host.

Your information is available in seconds, not hours or days, unlike many other "cold" storage providers.

5 0
4 years ago
Program your own file lab7.cpp in which your main() function will test the new data structure. The main() function, Declares an
Stella [2.4K]
Is this a question or just something up here just to be here
3 0
3 years ago
At the heart of every computing device is a(n) _______________, which is usually a single, thin wafer of silicon and tiny transi
SSSSS [86.1K]

Answer:

CPU

Explanation:

Central Processing UnitUnit

5 0
3 years ago
I will give brainliest!!!!! I NEED HELP ASAP!!!!!!!
klemol [59]

Answer:

I'm pretty sure it's the first answer.

4 0
3 years ago
What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
cestrela7 [59]

<u>Explanation:</u>

Note, a DoS (Denial of Service) attack is <u>different in scope from a DDoS (Distributed Denial of Service) </u>attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.

To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.

4 0
3 years ago
Other questions:
  • Which native windows application allows one to access basic pc settings and controls system info?
    6·2 answers
  • If a local DNS server cannot find an IP address for a specified URL, it does this.
    9·1 answer
  • What are the latest technology in 2014
    11·1 answer
  • Should students be able to use their phones during class
    14·1 answer
  • Astrid's computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which
    11·1 answer
  • What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
    15·1 answer
  • Select each task that may be completed using a word processor.
    8·2 answers
  • What are some areas to fill out in the New Formatting Rule dialog box? Check all that apply. rule type function name condition c
    7·2 answers
  • Evaluate how suitable the hardware would be for:
    12·1 answer
  • Who used the term" software" first?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!