1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
12

Are there different types of machine language?

Computers and Technology
2 answers:
Setler79 [48]3 years ago
8 0
No it has only one type
7nadin3 [17]3 years ago
7 0
No machine language have no any type
You might be interested in
Question #2
Bezzdna [24]
Computational thinking inclines invokes the techniques of decomposition, latter reconstruction, abstraction & algorithms development
3 0
3 years ago
Read 2 more answers
In a student​ database, a row that describes the top​ student, including his or her​ LastName, FirstName, and​ StudentNumber, is
STatiana [176]

Answer:

Record

Explanation:

4 0
3 years ago
. Which one of the following is not a JAD participant? 1. Managers 2. System analyst 3. Business development manager 4. Users
asambeis [7]

Answer: 3) Business development manager

Explanation:

 JAD stand for joint application development and it is the methodology which basically involved users and client in the development and designing of the application.

It is the process which basically accelerate the designing of the information technology system. JAD involve managers , system analyst and users to develop the dynamic solution. But it does not involve the business development manager as the JAD basically focused o the individual approach in the development.

6 0
3 years ago
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology? and that no u
slega [8]

This technology is known as an anti-climb collar.

Spiked collars are used to protect equipment mounted on poles like CCTV or in areas where you can easily climb a pole over a security fence. This technology offers a very simple and practical solution to protecting poles against thieves and vandals.

3 0
3 years ago
How can the order of precedence in this formula, =c12 c13*f4, be changed so that cells c12 and c13 are added together as the fir
OlgaM077 [116]
<span>How can the order of precedence in this formula, =C12+C13*F4, be changed so that cells C12 and C13 are added together as the first operation that occurs?

We must add a parenthesis.

from:  = C12+C13*F4
to: =(C12+C13)*F4

This is the same in Math, the order of operation is PEMDAS
Do first the operation with in the PARENTHESIS, then those that have EXPONENTS, then MULTIPLICATION, then DIVISION, then ADDITION, lastly SUBTRACTION.</span>
7 0
3 years ago
Other questions:
  • If you want an app to reach the largest possible audience, which two platforms should you use?
    7·1 answer
  • ___ Jacking is a crime that takes place when a hacker misdirects URL to a different site. The Link Itself Looks Safe, But the us
    11·1 answer
  • What option is used to combine several objects so that they can be treated as a single unit
    6·1 answer
  • What type of application would be appropriate for learning a foreign language?
    15·2 answers
  • Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? [BEGIN
    5·1 answer
  • Question 7 (1 point)<br> Increasing hue levels means increasing saturation.<br> True<br> False
    11·1 answer
  • Write a c++ to read seven days in an array and print it
    14·1 answer
  • Which types of scenarios would the NETWORKDAYS function help calculate? Check all that apply.
    15·1 answer
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
  • Alex has composed a layout with this Image for a magazine. Which rule of composition has Alex applied?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!