1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viktor [21]
3 years ago
13

A program called a ( n ) ____ translates instructions written in high-level languages into machine code.

Computers and Technology
1 answer:
Mazyrski [523]3 years ago
5 0
A program called an compiler
You might be interested in
19. The power supply in your server has just been replaced because of power problems. Your server boots, but now there is a mess
chubhunter [2.5K]

Answer:

System File Checker

Explanation:

For system file checker to work optimally it must be running as administrator on the system.

The System file checker mostly tries to Check also to verify the versions of system files on computer. If the system files are in any way noticed to be corrupted, system file checker will automatically replace corrupted files with correct versions.

The system file checker is that utility that can be used to scan all protected files to verify their versions on a Windows computer.

In the event where your day.power supply has spoilt and recently replaced, and after the window finished booting there is an error message, the utility that will be used to scan the system and restore corrupted file is the system file checker.

4 0
3 years ago
Traditional methods of business communication tend to mean paper-based messages such as formal letters, brochures, reports, prop
Mila [183]

Traditional methods of business communication tend to mean paper-based messages such as formal letters, brochures, reports, proposals, and notes.

There is no denying the fact that digital communication has a lot more advantages as compared to the traditional methods of business communication, but there are certain cases and situations where traditional methods and preferred over digital communication.

Paper-based messages provide objective evidence that a formal undertaking has been issued. The advantage of paper-based messages is that they can't be tampered with and not reproduced. They represent the signature of the concerned authority and are always treated above the digital signatures.

5 0
3 years ago
For the following 4-bit operation, assuming these register are ONLY 4-bits in size, which status flags are on after performing t
m_a_m_a [10]

Answer:

All flags are On ( c, z , N  )

Explanation:

Given data:

4-bit operation

Assuming 2's complement representation

<u>Determine status flags that are on after performing </u> 1010+0110

    1   1

    1  0   1  0

    0  1   1  0

  1  0 0 0 0

we will carry bit = 1 over

hence C = 1

given that: carry in = carry out there will be zero ( 0 ) overflow

hence V = 0

also Z = 1      

But the most significant bit is  N = 1

8 0
3 years ago
Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
Karo-lina-s [1.5K]

AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.

<h3>Artificial intelligence, machine learning, and malware</h3>

Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.

Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.

Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.

Learn more about malware here:

brainly.com/question/399317

4 0
2 years ago
As we move up a energy pyrimad the amount of a energy avaliable to each level of consumers
AleksandrR [38]

Explanation:

As it progresses high around an atmosphere, the amount of power through each tropic stage reduces. Little enough as 10% including its power is passed towards the next layer at every primary producers; the remainder is essentially wasted as heat by physiological activities.

8 0
3 years ago
Other questions:
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • Who created apple and in what year was it created
    9·2 answers
  • Help me find the difference between these logos
    10·2 answers
  • What should you do if you forget your root password for MySQL?
    13·1 answer
  • / Looks up author of selected books
    15·1 answer
  • What is the difference between the Internet and the World Wide Web? Explain in your own words.
    13·2 answers
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • Why do we need to make a plan before actions?
    7·1 answer
  • (14) Click on the
    7·2 answers
  • Can you move it like this? I can shake it like that
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!