1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergejj [24]
3 years ago
14

Instructions written in code that a computer follows are called:

Computers and Technology
1 answer:
seraphim [82]3 years ago
4 0

\bold{Answer:}

Instructions written in code that a computer follows are called software programs.

You might be interested in
Best way to build a model bridge
DanielleElmas [232]
Personally, i would use a 3-D printer, but you can use any material that you have, and have an example next to you for reference if you aren't going to 3-D print.

7 0
3 years ago
Read 2 more answers
The mac group does not replace the primary functions of eocs or other dispatch organizations. True or False
Oxana [17]

Answer:

TRUE

Explanation:

MAC - multi-agency coordination is a group of executives or administrators that have the authority to control agency funds or resources while EOCs -  Emergency operation centers are in charge of carrying out of emergency tasks that requires preparedness or disasters, they ensure that work continues even in case of emergency and disasters.

7 0
3 years ago
he primary purpose of a database query is to a. find and retrieve specific information. b. correct information in the database.
cestrela7 [59]

Answer:

find and retrieve specific information

Explanation:

7 0
2 years ago
An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files f
LenKa [72]

Answer: Virus Hoax

Explanation:

A computer virus hoax is a message that warns someone of a false virus threat. It is a a chain email that encourages who ever has received the message to pass it to other people as a form of warning.

5 0
3 years ago
When an ethernet nic has been configured by os to use half-duplex, the transmit pair of the twisted-pair cable uses?
Maurinko [17]
Simplex, simplex, and half duplex.

Hope this helps!!
8 0
3 years ago
Other questions:
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    5·1 answer
  • What standard linux utility is used to install and configure software on centos operating systems?
    8·1 answer
  • What are some of the issues that organizations need to be aware of when designing and managing data?
    8·1 answer
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • What are the features of a strong résumé? Check all that apply. The résumé is printed on regular printer paper. The résumé is we
    5·2 answers
  • Press the _______ key to move to the next cell in a row.
    5·1 answer
  • Stuart wants to delete some text from a slide. What should Stuart do?
    8·1 answer
  • . Write a C++ Code to get a multiline statement Str1 from a user with a ‘$’ as return character (Hint:
    6·1 answer
  • What is media ethics. Explain two forms of maintaining media ethics with examples​
    13·1 answer
  • Pro and Cons of Artificial Intelligence in Art <br><br> You must have 3 statements in each
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!