1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
3 years ago
13

Which generation of programming languages provides programmers with a visual environment to code programs?A. first generationB.

second generationC. third generationD. fourth generation
Computers and Technology
1 answer:
Mila [183]3 years ago
3 0

the answer is c third generation

You might be interested in
Technology can most broadly be defined as anything that does which of the following ?
Anastasy [175]
I would say A. Allowing us to improve efficiency in the workplace has helped grow our economy and we can thank technology for that. Due the it always improving our lives only get that much easier.
5 0
4 years ago
When you use an external style sheet with an html document, you get all but one of the benefits that follow. which one is it?
Lina20 [59]
The answer to this is your CCS files are easy to create and maintain
6 0
3 years ago
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.
faltersainse [42]

Answer:

Physical security

Explanation:

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to physical security. stop SQL injection attacks prevent unauthorized encryption provide physical security prevent email spoofing prevent brute force attacks

6 0
4 years ago
Across:
anygoal [31]
26891jfootbggagusppdmvtgya rkofoocihhf.
6 0
2 years ago
Consider sending a 1,600-byte datagram into a link that has an mtu of 500 bytes. suppose the original datagram is stamped with t
dsp73

Explanation:

Step one

The maximum size of data field in each fragment = 480

(because there are 20 bytes IP header) Thus the number of required

fragments  =\frac{1600-20}{480} \\\\= \frac{1580}{480} \\\\=3.29\\\\

thus the number of required fragment is 4

Step two

Each fragment will have identification number 291. each fragment except the last one will be of size 500 bytes (including IP header). the offset of the fragments will be 0, 60, 120, 180. each of the first 3 fragments will have

flag = 1; the last fragment will have flag =0

6 0
3 years ago
Other questions:
  • What type of Windows Server is the most likely server to be targeted by a computer hacker?
    13·2 answers
  • Can you help please.
    11·1 answer
  • Janis is preparing a financial document. She needs to use the dollar symbol placed above the number key 4. Which key will Janis
    12·2 answers
  • Using a cell phone while operating a motor vehicle is considered distraction because
    8·1 answer
  • What does the action tool allow you to do in Microsoft power point?
    9·1 answer
  • What type of things can be marketed
    11·1 answer
  • What are the three common forms for mining structured and unstructured data?
    14·1 answer
  • Suppose the message 111010 is to be transmitted (beginning with the leftmost bit) using
    6·1 answer
  • ANSWERED CORRECT BELOW
    7·1 answer
  • Select the correct answer from each drop-down menu.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!