1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ainat [17]
3 years ago
12

An application programming interface (API) is ________. the code the application software needs in order to interact with the CP

U the code to interface between an application and RAM the code to interface between an application and a peripheral like a printer the currently active part of an application
Computers and Technology
1 answer:
Alika [10]3 years ago
3 0

Answer:

Option A

Explanation:

Option B is rejected because the code between RAM and application is usually the byte code.

Option C is rejected because the drivers are the code between application and peripherals.

Option A is selected because API's are made primarily to make application capable to communicate with GPU while working on big software processing or computations.

You might be interested in
1. What are the biggest password mistakes that people and companies make? How can you avoid those mistakes?
Ghella [55]

Answer:

1. Keeping a password with user name or password is very easy word.

2. Passwords should be kept strong so that it cannot be haccked. One should use upper case letters along with lower case letters and numeric and special characters to make the password strong.

3. The businesses usually run anti viruses in case of virus attack. In case of haccker attack businesses are temporarily shut down from their routine work and alternate business plan is activated which runs the business activities incognito version.

4. High profile passwords can be leaked as it is on the computer system which can be accessed from around the world.  

Explanation:

The businesses should use DRP system in order to avoid complete shut down of business operations in case of a cyber attack. The passwords should be kept strong enough so that no one can crack the password and all employees should not be given complete access to business operations and planning activities. Employees access should be restricted to their job role.

5 0
3 years ago
Building relationships during your career exploration is called A. clustering. B. futurecasting. C. matchmaking, D. networking.
Vaselesa [24]
Building relationships during your career exploration is called Networking. 
<span>when you're in career exploration phase, building a relationships with various people may expose you to various kind of opportunities that could benefit your career paths. 

Hope it helped!! :)</span>
5 0
4 years ago
Read 2 more answers
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
What game involves controlling a character who is trying to rescue his girlfriend from an ape?
ddd [48]

Answer:

E.  

Donkey Kong

Explanation:

5 0
4 years ago
Read 2 more answers
How are most gamepads installed on devices?
Doss [256]

Answer:

Plug and Play

Explanation:

most modern game pads are you just need to plug into a port and then you are free to use without any setting up.

3 0
3 years ago
Other questions:
  • Reputable firms often ask recent graduates to pay an up-front fee for a job.
    10·2 answers
  • What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typic
    14·1 answer
  • Write two statements to read in values for my_city followed by my_state. Do not provide a prompt. Assign log_entry with current_
    13·1 answer
  • Which sentence(s) below are true?a. IP stands for Internet Protocol.b. In most home networks IP addresses are assigned by the In
    6·1 answer
  • Consider the graph of the function f(x) = 2(x + 3)2 + 2. Over which interval is the graph decreasing? (–∞, –3) (–∞, 2) (–3, ∞) (
    10·2 answers
  • Part 1: Plan and Write the Pseudocode
    7·1 answer
  • Why are control components necessary in traditional software and generally not required in object-oriented software?​
    11·1 answer
  • You have imported a library with the birthMonth() function. Based on the API, how many strings are inputed to calculate the birt
    11·1 answer
  • write pseudocode to represent the logic of a program that allows the user to enter two values. The program outputs the sum of an
    13·1 answer
  • when inputting a formula into excel or other spreadsheet software, what components are required for the formula to function prop
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!