1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
3 years ago
5

The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they

also plan, test, and document computer programs. in contrast,software apply formalized techniques to reduce the cost and complexity of software while increasing reliability. before program code can be written, a programmer needs a clear problem , which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution. programming projects can be approached using a(n) methodology, which requires extensive planning and documentation up front. an alternative approach is to use the methodology in which programs are developed in iterations called . with a clear plan, a programmer can begin coding using a text editor, program editor, or development environment. programs are composed of a series of statements that include a(n) such as input or print and parameters. those parameters may include that represent values that can change, or that represent unchanging values. all computer programs should include internal documentation in the form of , which are explanatory comments inserted into a computer program along with lines of code. a program is not complete until it has been tested to ensure that it contains no errors, logic errors, or runtime errors. programmers can use methods based on rigorous logical and mathematical models to reduce the number of defects in a software product. additional techniques for producing high-quality, secure code include threat modeling and programming.
Computers and Technology
2 answers:
lana66690 [7]3 years ago
7 0
The answer is Code. <span>The instructions for a computer program are sometimes referred to as Code.  </span>In programming, code (source code) is a term used for both the statements written in a particular programming language, and the object code, <span>a term for the source </span>code <span>after it has been processed by a compiler and made ready to run in the </span>computer.
Liono4ka [1.6K]3 years ago
3 0

Answer:

The answers to the problems are given in the bold font statements below

Explanation:

The instructions for a computer program are sometimes referred to as program code. Computer programmers focus on <u>programming</u> computer programs, but they also plan, test and document computer programs. In contrast, software programmers apply formalized techniques to reduce the cost and complexity of software while increasing reliability. Before a program can be written, a programmer needs a clear problem <u>statement,</u> which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution. Programming projects can be approached using a(n) <u>predictive</u> methodology, which requires extensive planning and documentation up front. An alternative approach is to use the <u>agile</u> methodology in which programs are developed in iterations called <u>sprints</u>. With a clear plan, a programmer can begin composing using a text editor, program editor, or <u>visual</u> development environment. Programs are composed of a series of statements that include a(n) <u>command words</u> such as input or print and parameters. Those parameters may include <u>variables</u> that represent values that can change, or <u>constants</u> that that represents unchanging values. All computer programs should include internal documentation in the form of <u>remarks</u> which are explanatory comments inserted into a computer program following language-specific symbols, such as # or keywords such as REM. A program is not complete until it has been tested to ensure that it contains no <u>syntax</u> errors, logic errors, or run time errors. Programmers can use <u>formal </u>methods based on rigorous logical and mathematical methods to reduce the number of defects in a software product. Additional techniques for producing high-quality, secure programs include threat modeling and <u>defensive</u> programming.

You might be interested in
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
A. Directions: Read the statement carefully. Write True in the space provided if the statement is correct and False if it is not
faltersainse [42]

Answer:

  • TRUE
  • FALSE
  • TRUE
  • FALSE
  • TRUE
7 0
2 years ago
You are given two processors P1 and P2 that execute the same instruction set but have different architectures. The instructions
mafiozo [28]

The answer & explanation for this question is given in the attachment below.

3 0
3 years ago
What are the pros and cons of using ICT​
Setler79 [48]

Answer:

Communication - Speed / time – money can be saved because it's much quicker to move information around. ...

Globalization - Video conferencing saves money on flights and accommodation. ...

Cost effectiveness - It feels free to send an email (although it isn't); it's without doubt cheaper than phone calls.

Explanation:

4 0
2 years ago
The county clerk's office is writing a program to search their database for citizen records based on information about that citi
Alborosie

Answer:

The correct pseudocode to find the records of all citizens over the age of 50 is IF(age > 50).

OR EACH item IN citzlist

{

WHILE(not end of citzlist)

{

IF(age > 50)

{

DISPLAY(name)

}

}

}

If this is run, it will bring out all the names of the citizen who are over the age of 50 in the list.

Explanation:

6 0
3 years ago
Other questions:
  • Aubrey didnt like to use graphics or images on her slides. She preferred to use only a title for her slides and bullet-poinged t
    14·2 answers
  • Part 1: Create an application that allows you to enter student data that consists of an ID number, first name, last name, and gr
    14·1 answer
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • According to Holpp and Kelly's approaches to developing vision, the benchmarking approach is more internally focused, whereas th
    6·1 answer
  • Host A is sending Host B a large le over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknow
    14·1 answer
  • Find two consecutive even integers such that twice the smaller is 16 more than the larger
    10·1 answer
  • Write a program that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer values t
    5·1 answer
  • Your marketing director at ABC Marketing Agency would like to set up an email campaign that will use personalization to referenc
    5·1 answer
  • What is a good safety precaution to take when opening a computer case?
    9·1 answer
  • Do you know the energy unit question?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!