1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
4 years ago
5

The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they

also plan, test, and document computer programs. in contrast,software apply formalized techniques to reduce the cost and complexity of software while increasing reliability. before program code can be written, a programmer needs a clear problem , which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution. programming projects can be approached using a(n) methodology, which requires extensive planning and documentation up front. an alternative approach is to use the methodology in which programs are developed in iterations called . with a clear plan, a programmer can begin coding using a text editor, program editor, or development environment. programs are composed of a series of statements that include a(n) such as input or print and parameters. those parameters may include that represent values that can change, or that represent unchanging values. all computer programs should include internal documentation in the form of , which are explanatory comments inserted into a computer program along with lines of code. a program is not complete until it has been tested to ensure that it contains no errors, logic errors, or runtime errors. programmers can use methods based on rigorous logical and mathematical models to reduce the number of defects in a software product. additional techniques for producing high-quality, secure code include threat modeling and programming.
Computers and Technology
2 answers:
lana66690 [7]4 years ago
7 0
The answer is Code. <span>The instructions for a computer program are sometimes referred to as Code.  </span>In programming, code (source code) is a term used for both the statements written in a particular programming language, and the object code, <span>a term for the source </span>code <span>after it has been processed by a compiler and made ready to run in the </span>computer.
Liono4ka [1.6K]4 years ago
3 0

Answer:

The answers to the problems are given in the bold font statements below

Explanation:

The instructions for a computer program are sometimes referred to as program code. Computer programmers focus on <u>programming</u> computer programs, but they also plan, test and document computer programs. In contrast, software programmers apply formalized techniques to reduce the cost and complexity of software while increasing reliability. Before a program can be written, a programmer needs a clear problem <u>statement,</u> which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution. Programming projects can be approached using a(n) <u>predictive</u> methodology, which requires extensive planning and documentation up front. An alternative approach is to use the <u>agile</u> methodology in which programs are developed in iterations called <u>sprints</u>. With a clear plan, a programmer can begin composing using a text editor, program editor, or <u>visual</u> development environment. Programs are composed of a series of statements that include a(n) <u>command words</u> such as input or print and parameters. Those parameters may include <u>variables</u> that represent values that can change, or <u>constants</u> that that represents unchanging values. All computer programs should include internal documentation in the form of <u>remarks</u> which are explanatory comments inserted into a computer program following language-specific symbols, such as # or keywords such as REM. A program is not complete until it has been tested to ensure that it contains no <u>syntax</u> errors, logic errors, or run time errors. Programmers can use <u>formal </u>methods based on rigorous logical and mathematical methods to reduce the number of defects in a software product. Additional techniques for producing high-quality, secure programs include threat modeling and <u>defensive</u> programming.

You might be interested in
Even though Wordpress is basically free, what is the company trying to accomplish?
Verdich [7]

Answer:

The purpose of wordpress is to develop blogs or dynamic websites.

5 0
3 years ago
Anyone help me with number 41.
Katarina [22]
It is te = t I yhink
8 0
3 years ago
What command issued from the command prompt will show the route that a packet travels from the issuing computer to another compu
svetoff [14.1K]

Answer:

B)tracert

Explanation:

Tracery Command can be regarded as

network diagnostic tool, it is used in tracking process of pathway of packet ranging from source to destination on IP network. It as well allows to know real time of each hops that are been taken by a packet as it enroutes to it's destination. The traceroute can be run by following these steps:

✓Open the run window

✓Open Command prompt, this can be done by enter "cmd" then enter.

✓ input" tracert" then destination ( Ip address or web address)

It should be noted that Tracery command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer.

6 0
3 years ago
Speakers wanting to control the movement of one slide to the next choose this option.
aleksklad [387]
Change slides by clicking on background.
6 0
3 years ago
How can one become a world scientist?
Lynna [10]
No need to woory abt age !!! In today's competitive grant world, this phenomenon is exacerbated. It is dangerous to one's funding to go against the trend, and if there is a lab to support and mouths to feed, the disincentives are great. This phenomenon stifles creativity, perhaps far more than biological age does. 
<span>While it is not frequently acknowledged either in the popular press or in scientific literature, a significant fraction of scientific discovery is the result of serendipity (or to put it more bluntly, luck). From the discovery of penicillin by Fleming to the discovery of new ionization techniques such as MALDI that power modern mass-spectrometry based proteomic research, luck has frequently played a big role. Such discoveries are generally attributed to hard work and genius, rather than to luck. Doing so gives the “genius” too much credit and luck too little.
</span><span>Risk taking is where most of the big discoveries in science lie. so takerisks.
</span>enjoy  always specially when you r  working and learn to say no
Learning to say “no” is particularly important for young faculty, who find themselves barraged with such requests, and who can easily get sucked into full-time committee duties. It is wise to step back frequently and ask, “overall, is this work I am doing fun?” If the answer is no, perhaps it is time to revisit and consider diving into a new area.
<span>Note the distinction in this guideline from: “learn to write and present well.”
</span><span>Understanding and conveying the big picture for one's work is perhaps the greatest challenge facing young scientists
</span>That's all I can give.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Think about a time when someone made a biased judgment about you or acted unfairly toward you because of your age, skin color, c
    6·1 answer
  • You're working at a large industrial plant and notice a tag similar to the one shown in the figure above. Which of the following
    5·1 answer
  • Although the battery on your smartphone is fully charged, it drains quickly. In some instances when the phone shows that the bat
    12·1 answer
  • Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending whe
    12·1 answer
  • Universal Containers recently rolled out a Lightning Knowledge implementation; however, users are finding unreliable and unrelat
    6·1 answer
  • Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t
    14·1 answer
  • Write the definition of a function that takes as input the three numbers. The function returns true if the first number to the p
    12·1 answer
  • Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
    7·1 answer
  • Who is he can anyone help me​
    14·2 answers
  • How are actual rocket launches similar to how balloon rockets and canister rockets launch?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!