1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bogdanovich [222]
3 years ago
12

Programmers refer to programs that contain meaningful names as ____. AnswerThe answer is: Programmers refer to programs that con

tain meaningful names as "self-documenting".
Computers and Technology
1 answer:
andreyandreev [35.5K]3 years ago
3 0
Self documenting, we also make comments.
You might be interested in
Advantages of python programming language
Sauron [17]

Answer:

Great starter programming language. Overall very powerful but for beginners the more advanced characteristics like GUIs are too complicated. This is coming from personal experience and after first experiencing programming through Python, Javascript is my new favorite.

Explanation:

a great video by code camp titled "Learn Python - Full Course for Beginners [Tutorial]" is a great starting point!

6 0
3 years ago
Which layer of the OSI model do network administrators typically check first when issues arise?
bazaltina [42]

Answer:

B

Explanation:

Typically I check the physical layer to ensure that the nodes are plugged accordingly.

4 0
2 years ago
Research three different distributions of Linux on the Internet. Record where you went to obtain your information. Compare and c
VARVARA [1.3K]

Answer:

The three Linux distributions are Arch Linux, Ubuntu and Fedora. In order to get more detailed information go to the wikipedia page of comparision of linux distributions.

Strengths and Features of these three are attached.

The two linux newsgroups are

1) Comp.os.linux.announce

2)comp.os.linux.networking

Explanation:

6 0
3 years ago
What are the basic problem that my pc can have?
Lena [83]
A virus, malware, unplugged, used too much storage, etc.
5 0
3 years ago
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
3 years ago
Other questions:
  • kai is interviewing for a job, and the interviewer asks him for an example of skill at cooperating with others. Which example be
    14·2 answers
  • Choose the sentences that describe techniques of formatting text.
    12·1 answer
  • Which type of operating system is usually used in personal computers?
    11·1 answer
  • You start up your laptop while getting a coffee across the room. You hear the usual chimes and doinks as it starts up. When you
    14·2 answers
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • As you are talking to your colleague over the phone, the sound of an airplane flying low drowns out part of your conversation. I
    11·1 answer
  • Name three types of hard drives, along with its speed and size.
    8·1 answer
  • What type of version of visual studio is the visual studio express
    8·1 answer
  • What is the ascii code for the letter D
    8·1 answer
  • What is the definition of Graphic AIDS?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!