1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klasskru [66]
3 years ago
10

Differentiatebetween:

Computers and Technology
1 answer:
Bezzdna [24]3 years ago
7 0

Answer:

a)Firmware Computers and Virtual Computers

<u>Firmware Computers-</u>A type of computer program that offers low-level device-specific hardware control.Once installed, the firmware is generally altered rarely and only by the manufacturer's updates. Firmware loss can often lead to the loss of function of a hardware device depending completely on the scenario.

<u>Virtual Computers-</u>The most common purpose of the software is to describe a program/piece of data to be changed, viewed or otherwise interacted by the user most often.A software or firmware upgrade allows a continuous change — generally a feature enhancement, performance enhancement, or error correction

b) Early binding and Late Binding

<u>Early binding-</u>The compiler matches the function call at compile time in early binding with the right function definition. It can be called as Compile-time Binding/Static Binding. The compiler defaults to the feature definition called during the moment of compilation. So, because of early binding, all the feature calls you've studied up to now.

<u>Late binding-</u>The compiler matches the function call at run-time with the right function definition in the event of late binding. It is also referred to as Run-time Binding.

The compiler defines the object type at run-time in late binding and then checks the function definition with the function call.

c) BNF and EBNF

<u>BNF(Backus – Naur form)-</u>It is used to officially describe a language's grammar, so there is no discrepancy or ambiguity about what is permitted and what is not. In reality, BNF is so unambiguous that there is a lot of mathematical theory around this kind of grammar, and you can effectively build a parser mechanically for a language with a BNF grammar.

<u>EBNF(Extended Backus–Naur form)</u>-It is used to convey a grammar that is context-free. EBNF is used to describe formally a formal language such as a language for computer programming. This is extension metasyntax notation of the fundamental Backus – Naur form (BNF).

You might be interested in
1. Which sentence best expresses the main idea
Neko [114]
B is the answer

Hope this helps




3 0
3 years ago
You can include up to _____ logical conditions in the and function. (487181)
Allushta [10]
Hi ! 

<span>You can include up to <u>255</u> logical conditions in the and function. </span>
8 0
3 years ago
Once a table is inserted into a publication, which two tabs become available?
rusak2 [61]

Answer:

insert i think sry if its wrong :(

Explanation:

7 0
3 years ago
Using C++.
butalik [34]
Alright -

So, we're going to create an object of type Calculator, with no additional information (which would be passed in the form of parameters). 

We would do this by saying: 

<em>Calculator calc;
</em>
Hopefully, this helps you! =)
4 0
3 years ago
The ________ is a system of interlinked documents on the Internet, or a graphical user interface to the Internet that provides u
RSB [31]

Answer:

World Wide Web (WWW)

Explanation:

Popularly referred to as the Web is an information system that comprises of many interconnected web resources and documents. These documents and web resources possess a certain URL (Uniform Resources Locators) such as https://www.brainly.com/ which makes them accessible over the internet.

The <em>HTTP or Hypertext Transfer Protocol</em> is a channel for transferring the resources of the World wide web among users.

In 1989, the World Wide Web was invented by Tim Berners-Lee. He developed the first web browser in 1990.

The World Wide Web has played a fundamental role in the advancement of the information age as it is greatly used by different people around the world to communicate efficiently.

6 0
3 years ago
Other questions:
  • Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she
    14·1 answer
  • Which were important characteristics of Sparta's government? Select the two correct answers. A. Oligarchs were able to hold a lo
    12·2 answers
  • In which phase of the design process does the developer establish the project goals? A. Design B. Planning C. Development D. Lea
    15·2 answers
  • This chapter uses the class rectangleType to illustate how to overload the operators +, *, ==, !=, &gt;&gt;, and &lt;&lt;. In th
    15·1 answer
  • 1. cybersquatting refers to the tampering of existing web sites and selling unrelated products (true or false)
    8·1 answer
  • Which of the following refers to a descriptive technique involving the systematic collection of quantitative​ information? A. Lo
    5·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • Which of the following is not a type of bank? (Everfi)
    9·2 answers
  • What is the first step to apply the line and page breaks options to groups of paragraphs in a Word document?
    10·2 answers
  • What is the size of BIOS?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!