1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
3 years ago
10

1. Why do you think coding languages generally include the ability to create comments? What would those comments be used for? In

clude both how they can help a single developer and how they would help multiple developers working together on a single project.
2. I know you know a bit about computer programming languages and how they are used in Game Design. But, can computer programming languages be used in other fields of study? Do some researchAnd discuss what you found about the use of computer programming languages in other fields of study and top career fields they use computer programming outside of Specifically being a computer programmer (what fields, how they use the languages, why they use them).

3. We learned that Object-Oriented Programming was developed to make programming even easier by allowing programmers to simply tell computers what to do without having to specify all of the little steps involved with doing it. How might this concept apply to our lives in other ways, like with our own brains? Explain how our brains do “object-oriented programming” in real life. Come up with an example of a process that we don’t actually need to (consciously) teeny tiny step because our brain is already “programmed” to complete the process intuitively.

4.What are “rigid body dynamics,” both in natural science and immunity? Provide an example of a case where you might want to have different rigid body properties four different objects in unity.

5. Name and fix two errors in the following piece of code that is intended to print “Debugging is fun!”.
Computers and Technology
1 answer:
uranmaximum [27]3 years ago
4 0

Answer:

Please check the attachment.

Explanation:

The details in the text file attached is self explanatory.

Download txt
You might be interested in
What is the danger in judging someone according to his or her social networking profile
AfilCa [17]
They could find you and throw hands.
8 0
2 years ago
Which tool allows multiple users to dynamically update a document at the same time? Question 3 options: Google Docs OneDrive Exc
GenaCL600 [577]

Answer:

Excel

Explanation:

7 0
2 years ago
Need deveolpers not software
ivolga24 [154]
Developers? For what?
3 0
3 years ago
Read 2 more answers
When doing a Risk assessment, what is one of the most important things to do?
GaryK [48]

Answer:

Determine who might be harmed and how.

8 0
2 years ago
Read 2 more answers
A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action shoul
sergij07 [2.7K]

An action which this organization should take to find out if systems have been compromised is: C. Look for unauthorized accounts.

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities and compromises in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails a tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the computer system.

In this scenario, we can reasonably infer and logically deduce that an action which this organization or cybersecurity specialist should take to find out if systems have been compromised is to look out for unauthorized accounts.

Read more on penetration test here: brainly.com/question/25813524

#SPJ1

Complete Question:

A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

Look for policy changes in Event Viewer.

Scan the systems for viruses.

Look for unauthorized accounts.

Look for usernames that do not have passwords.

7 0
9 months ago
Other questions:
  • What does bam file stand for computer terms?
    9·1 answer
  • What is computer ????
    11·1 answer
  • What is the purpose of this diamond shape in a flowchart?
    8·1 answer
  • Which option organizes tasks based on importance?
    12·1 answer
  • NEED HELP FAST
    13·2 answers
  • A mobile device has stopped receiving automatic OS updates that until recently were pushed to the device.
    7·2 answers
  • A provides legal protection for something an individual has created
    12·1 answer
  • relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
    9·1 answer
  • Describe the importance of human interaction in a computing system.
    14·2 answers
  • Direction: Write True on the line if the statement is correct. Write False if the statement is incorrect. 1. All objects are com
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!