1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariulka [41]
3 years ago
8

In a(n) ____, the programmer uses a programming language (in context free grammar) to tell the computer what to accomplish and h

ow to do it. 1GL 2GL 3GL 4GL 5GL
Computers and Technology
1 answer:
Mamont248 [21]3 years ago
6 0

A 5GL fifth-generation languages a programming language design to solve given problem without programmer. The user only needs to solve the problem and condition without implementing an algorithm.

Explanation:

First Generation Language

The first generation language is called low- level style because they were used at a superficial level of abstraction. First-generation language referred to as the native language.

Second Generation Language

The second-generation language is also low-level language or assembly language. The second level of language uses the concept of mnemonics for the writing program. Symbolic name are used.

Third Generation Language

The third-generation language overcomes the first and second-generation languages. Third generation language is considered as high- level language because the target is to focus on the logic of the program.

Fourth Generation Language

The language of generation required a lot of time and effort that affect programmers.The fourth-generation was developed to reduce the time, cost, and effort.

Fifth Generation Language

The programming language of this generation focuses on constraints programming. The fifth-generation programming languages are Artificial Intelligence and Artificial Neural Network.

You might be interested in
Who is Mr.Anonymous?
lorasvet [3.4K]

Answer:

me

Explanation:

me

4 0
3 years ago
Read 2 more answers
Kash has created a document that needs to be protected. only certain users should be able to open the document. what option shou
levacccp [35]
It makes it a lot easier if the document hasn't been published on the web. When sending the document, only send it to the necessary recipients. 
6 0
3 years ago
Cui documents must be reviewed to which procedures before destruction?
Aliun [14]

Answer:

Documents containing CUI must be destroyed by shredding..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

8 0
3 years ago
What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​
Salsk061 [2.6K]

Answer:

Explanation:

These will be shared with the public because websites like haveibeenpwned share what data leaks that your password has appeared on. It is inevitable that these hacks will continue to occur as long as security can be breached.

6 0
2 years ago
Mary’s computer is running slow and will not load programs or videos. She has tried restarting her computer yet it is still not
luda_lava [24]
She shall not reset her computer because she will have to load every thing again
8 0
4 years ago
Other questions:
  • Janet has to create a webpage for a software company that should be accessible from both desktop computers and mobile devices. W
    12·1 answer
  • Which Windows feature captures and stores copies of folders and files at specific points in time, allowing users or administrato
    10·1 answer
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • Will a pair of bar magnet ,with keepers on the two ends, act as a magnet
    13·1 answer
  • Presses the Schedulr app icon Selects the list item for CSCI 448 Presses the "View Classroom on Map" button While only performin
    11·1 answer
  • Write code to simulate the following differential equation for x ranging from 0 to 5. Assume y = 0 when x = 0. Plot y vs. x usin
    11·1 answer
  • Which of the following is the most significant outcome of the formation of the SMPTE?
    6·2 answers
  • Explain how devices on a lan access resources in a small to medium-sized business network.
    15·1 answer
  • Read the steps in the process of making a video.
    5·2 answers
  • Why is my Brainly scanner not work​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!