1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
4 years ago
5

The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they

also plan, test, and document computer programs. in contrast,software apply formalized techniques to reduce the cost and complexity of software while increasing reliability. before program code can be written, a programmer needs a clear problem , which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution. programming projects can be approached using a(n) methodology, which requires extensive planning and documentation up front. an alternative approach is to use the methodology in which programs are developed in iterations called . with a clear plan, a programmer can begin coding using a text editor, program editor, or development environment. programs are composed of a series of statements that include a(n) such as input or print and parameters. those parameters may include that represent values that can change, or that represent unchanging values. all computer programs should include internal documentation in the form of , which are explanatory comments inserted into a computer program along with lines of code. a program is not complete until it has been tested to ensure that it contains no errors, logic errors, or runtime errors. programmers can use methods based on rigorous logical and mathematical models to reduce the number of defects in a software product. additional techniques for producing high-quality, secure code include threat modeling and programming.
Computers and Technology
2 answers:
lana66690 [7]4 years ago
7 0
The answer is Code. <span>The instructions for a computer program are sometimes referred to as Code.  </span>In programming, code (source code) is a term used for both the statements written in a particular programming language, and the object code, <span>a term for the source </span>code <span>after it has been processed by a compiler and made ready to run in the </span>computer.
Liono4ka [1.6K]4 years ago
3 0

Answer:

The answers to the problems are given in the bold font statements below

Explanation:

The instructions for a computer program are sometimes referred to as program code. Computer programmers focus on <u>programming</u> computer programs, but they also plan, test and document computer programs. In contrast, software programmers apply formalized techniques to reduce the cost and complexity of software while increasing reliability. Before a program can be written, a programmer needs a clear problem <u>statement,</u> which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution. Programming projects can be approached using a(n) <u>predictive</u> methodology, which requires extensive planning and documentation up front. An alternative approach is to use the <u>agile</u> methodology in which programs are developed in iterations called <u>sprints</u>. With a clear plan, a programmer can begin composing using a text editor, program editor, or <u>visual</u> development environment. Programs are composed of a series of statements that include a(n) <u>command words</u> such as input or print and parameters. Those parameters may include <u>variables</u> that represent values that can change, or <u>constants</u> that that represents unchanging values. All computer programs should include internal documentation in the form of <u>remarks</u> which are explanatory comments inserted into a computer program following language-specific symbols, such as # or keywords such as REM. A program is not complete until it has been tested to ensure that it contains no <u>syntax</u> errors, logic errors, or run time errors. Programmers can use <u>formal </u>methods based on rigorous logical and mathematical methods to reduce the number of defects in a software product. Additional techniques for producing high-quality, secure programs include threat modeling and <u>defensive</u> programming.

You might be interested in
If an engine has four cylinders and a total of 16 valves, how many valves would each cylinder have?
wel
4 because 4 x 4=16. Easy. I like to think of it as multiplication.
4 0
3 years ago
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35
ikadub [295]

Answer: I believe the answer is 6

Explanation: taking 35 and 65 out leaves the rest of the numbers; 15,25,45,55, and 75.

3 0
4 years ago
What does ALU stand for?
ValentinkaMS [17]
It stands for arithmetic logic unit 
3 0
3 years ago
Read 2 more answers
Which of the following is an example of cyberharassment?a. Someone sends you a credible threat that they are "out to get you."b.
Marta_Voda [28]

Answer:

D

Explanation:

In order for it to be considered harassment, it has to happen on more than one occasion.

7 0
3 years ago
Which of the following is another word for paradigm?
EleoNora [17]
The best answer choice is model, it is a synonym for the word paradigm

3 0
3 years ago
Other questions:
  • What will be the biased exponent of 1,100.1? <br> A:130<br> B:127<br> C:-127<br> D:2^3
    12·2 answers
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • _____ involves those activities that ensure the orderly dissolution of a system, including disposing of all equipment in an envi
    7·1 answer
  • Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by stateme
    12·1 answer
  • What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
    6·1 answer
  • A properYour customer has connected a 1000-watt microwave oven and a 600-watt mixer to a 15-amp branch service line for the kitc
    11·2 answers
  • Which factor did not contribute to the increase of leisure travel in the early twentieth century in the United States?
    7·2 answers
  • A hidden backlog contains the projects that the IT department is not aware of because of low feasibility.
    13·1 answer
  • Vegetable farming is a good source of income explain this statement<br>​
    5·1 answer
  • Which is a concept of the CIA of Computer Security
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!