1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
4 years ago
6

Machine language is also known as ____ language.

Computers and Technology
1 answer:
Novosadov [1.4K]4 years ago
8 0
Machine language is known also as a cod language or a low level language
You might be interested in
What is a computer memory <br>​
Alex_Xolod [135]

Answer:

In computing, memory is a device or system that is used to store information for immediate use in a computer or related computer hardware and digital electronic devices. The term memory is often synonymous with the term primary storage or main memory. An archaic synonym for memory is store.

5 0
3 years ago
Read 2 more answers
THERES THIS USER ON HERE WHO IS TAKING ALL YOUR POINTS SO I DID THE SAME THING TO HER CUZ SHE DID IT TO ME...SO WHY DONT WE ALL
GaryK [48]

Answer:

That is so low and I don't understand why that's necessary for her to do. Smh.

Explanation:

8 0
3 years ago
Why are listening and speaking part of the Common Core and ELD Standards? Why is this particularly important for our ELD student
Leona [35]

Answer:

Learning and speaking are core elements in ELD Standards. ELD emphasizes the importance of understanding academic and instructional languages necessary for academic success. For a better understanding of language instructions, there should be some form of communication between the learner and the educator. Communication itself entails listening appropriately and speaking accordingly to convey the right message.

Listening and speaking improves the language skills of students. They are also able to express themselves through speech.

Explanation:

3 0
4 years ago
Some students are studying the amount of pollution in a river They are using a computer to measure the pollution level using sen
Tpy6a [65]

Answer:

optical sensors

Explanation:

optical sensors measure the amount of gases like carbon dioxide and carbon monoxide in the air

4 0
3 years ago
Each of the following code fragments contains a number of security vulnerabilities. For each fragment, identify these security v
Trava [24]

Answer:

Check the explanation

Explanation:

a)

1) int main(int argc, char *argv){

argv has always been an array of pointer whereby each and every element points to the command line argument that is passed to the program.

int main(int argc, char *argv[]) {

2) passwords = fopen(filePath, "r");

argv[0] always holds the name of the program currently running i.e. itself

So you shouldn't even try not to open a executable file for reading. since doing this will not give error but you won't be able to read the file as it is a binary file.

it is god to always check whether the file was opened successfully or not after opening the file. If file was not opened successfully fopen will return NULL.

passwords = fopen(filePath, "r");

if(passwords == NULL)

{

printf(“\n Unable to open file”);

return -1;

}

3) execl(shellPath, "shell", NULL);

Before making a call to execl you should close the open file

close(passwords);

b)

1) char itemID[9];

After creating a char array one should always initialize the array as it may contain some garbage value.

char itemID[9] = “”;

2) scanf("%d", &unitsOrdered);

Since unitOrdered represents the quantity, it should always be non zero and non negative

c)

1) char fullName[MAX_LEN];

MAX_LEN should not be zero or negative as it used to define the size.

If ( MAX_LEN <=0 )

{

return error;

}

else

{

char fullName[MAX_LEN]

}

2) strcpy(fullName, firstName);

Before using the string functions you're expected to always make sure that the pointer that you are passing to the functions should not be NULL i.e. the pointers should always pass to certain memory location.

if (firstName && lastName)

{

strcpy(fullName, firstName);

strcat(fullName, " ");

strcat(fullName, lastName);

return fullName;

}

else

{

return error;

}

5 0
3 years ago
Other questions:
  • A foreign country attempting to access government networks in order to disable a national power grid would be an example of: Sel
    7·2 answers
  • Explain the use of keyboard shortcuts and key combinations. You are at the tenth page of a 20-page document. You need to make ch
    14·1 answer
  • What are the pros and cons of using the internet in a medical office setting?
    7·1 answer
  • Why information technology is important in healthcare?
    13·1 answer
  • Assemble a Server computer based on your budget (state the amount in Ghana Cedis), discussing the type of components (giving the
    11·1 answer
  • SUMMING THE TRIPLES OF THE EVEN INTEGERS FROM 2 THROUGH 10) Starting with a list containing 1 through 10, use filter, map and su
    15·1 answer
  • You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain
    12·1 answer
  • LISTEN I NEED EVERY SINGLE BRAINLY USER TO RE POST THIS THERE IS A USER WHO JUST SAID THEY ARE GOING TO KILL THEMSELVES PLEASE C
    12·2 answers
  • Choose all items that are true about the two example of HTML shown on the right.
    5·2 answers
  • Advantages of python programming language
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!