1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
3 years ago
5

The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they

also plan, test, and document computer programs. in contrast,software apply formalized techniques to reduce the cost and complexity of software while increasing reliability. before program code can be written, a programmer needs a clear problem , which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution. programming projects can be approached using a(n) methodology, which requires extensive planning and documentation up front. an alternative approach is to use the methodology in which programs are developed in iterations called . with a clear plan, a programmer can begin coding using a text editor, program editor, or development environment. programs are composed of a series of statements that include a(n) such as input or print and parameters. those parameters may include that represent values that can change, or that represent unchanging values. all computer programs should include internal documentation in the form of , which are explanatory comments inserted into a computer program along with lines of code. a program is not complete until it has been tested to ensure that it contains no errors, logic errors, or runtime errors. programmers can use methods based on rigorous logical and mathematical models to reduce the number of defects in a software product. additional techniques for producing high-quality, secure code include threat modeling and programming.
Computers and Technology
2 answers:
lana66690 [7]3 years ago
7 0
The answer is Code. <span>The instructions for a computer program are sometimes referred to as Code.  </span>In programming, code (source code) is a term used for both the statements written in a particular programming language, and the object code, <span>a term for the source </span>code <span>after it has been processed by a compiler and made ready to run in the </span>computer.
Liono4ka [1.6K]3 years ago
3 0

Answer:

The answers to the problems are given in the bold font statements below

Explanation:

The instructions for a computer program are sometimes referred to as program code. Computer programmers focus on <u>programming</u> computer programs, but they also plan, test and document computer programs. In contrast, software programmers apply formalized techniques to reduce the cost and complexity of software while increasing reliability. Before a program can be written, a programmer needs a clear problem <u>statement,</u> which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution. Programming projects can be approached using a(n) <u>predictive</u> methodology, which requires extensive planning and documentation up front. An alternative approach is to use the <u>agile</u> methodology in which programs are developed in iterations called <u>sprints</u>. With a clear plan, a programmer can begin composing using a text editor, program editor, or <u>visual</u> development environment. Programs are composed of a series of statements that include a(n) <u>command words</u> such as input or print and parameters. Those parameters may include <u>variables</u> that represent values that can change, or <u>constants</u> that that represents unchanging values. All computer programs should include internal documentation in the form of <u>remarks</u> which are explanatory comments inserted into a computer program following language-specific symbols, such as # or keywords such as REM. A program is not complete until it has been tested to ensure that it contains no <u>syntax</u> errors, logic errors, or run time errors. Programmers can use <u>formal </u>methods based on rigorous logical and mathematical methods to reduce the number of defects in a software product. Additional techniques for producing high-quality, secure programs include threat modeling and <u>defensive</u> programming.

You might be interested in
Lael Masterson works in the Student Activities Office at Valerian State College in Illinois. Lael has started compiling informat
Nina [5.8K]

Answer:

Use the HLOOKUP function in the cell E2 by specifying the student's hourly rate value, the range of cells of the table holding the information, the row from which to return the value, and a value of true or false for approximate or exact match respectively.

Explanation:

Microsoft Excel is a statistics tool used for data analysis. It has several functions and graphical properties for cleaning and representing data.

The HLOOKUP function is an example of a search function in excel, it returns a value based on another value from a range of cells. The function accepts four arguments, they are, the value to be searched, the range table or cell range to search, the row to get the search value, and a mode of return value to return, could be either true for an approximate match or false for an exact match.

6 0
3 years ago
Use the Wrap Text icon to _____. modify which graphic appears in the front of layered images modify the picture effects change t
sergey [27]

I believe it's change the way text is wrapped around an object.

3 0
3 years ago
Read 2 more answers
PLEASE HELP!!!
tino4ka555 [31]

Answer:

C or D

Explanation:

If he has previous experience, C might be better answer, otherwise, D is right.

not sure with my answer either lol

6 0
3 years ago
Design a 128KB direct-mapped data cache that uses a 32-bit address and 16 bytes per block. The design consists of two components
Kitty [74]

Answer:

See the attached pictures for detailed answer.

Explanation:

The cache contain 8K number of blocks.each block has 16 Byte worth of data. Each of these bytes are addressable by block offset. Now, each of these blocks are addressable and their address is provided by line offset or set offset. If block number is given in Decimal format then the block to which that block will be mapped is given by expression

mappedToBlock = (bNumber)mod2​​​13

TAG and valid but consititues something called cache controller. TAG holds the physical address information because the TAG in physical address get divided into TAG and line offset in cache address. Valid bit tells status of blocks. If it is 1 then data blocks are referred by CPI else not.

7 0
3 years ago
To get revenge on the pizza parlor burning his pizza and not reimbursing him for it, David returned to the pizza parlor after-ho
Andrew [12]
David will be charged with arson<span />
3 0
3 years ago
Read 2 more answers
Other questions:
  • python If the checksum is 10, the last digit is denoted as X according to the ISBN-10 convention. Write a program that prompts t
    10·1 answer
  • Write an if-else statement to describe an object. Print "Balloon" if isBalloon is true and isRed is false. Print "Red balloon" i
    9·1 answer
  • Your bluetooth headset is waiting for another bluetooth device to locate its signal. what is this mode known as?'
    8·1 answer
  • How are logical operators used?
    14·1 answer
  • Complete the steps for saving a presentation as a poi file,
    14·1 answer
  • Question 8 (True/False Worth 3 points)
    15·1 answer
  • 7 steps in infographic design​
    6·1 answer
  • Dunbar's number, 150, refers to the number of:
    5·1 answer
  • What is the difference between HTML and XML?
    8·1 answer
  • Your company has a team of remote workers that need to use Windows-based software to develop company applications, but your team
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!