1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
4 years ago
5

The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they

also plan, test, and document computer programs. in contrast,software apply formalized techniques to reduce the cost and complexity of software while increasing reliability. before program code can be written, a programmer needs a clear problem , which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution. programming projects can be approached using a(n) methodology, which requires extensive planning and documentation up front. an alternative approach is to use the methodology in which programs are developed in iterations called . with a clear plan, a programmer can begin coding using a text editor, program editor, or development environment. programs are composed of a series of statements that include a(n) such as input or print and parameters. those parameters may include that represent values that can change, or that represent unchanging values. all computer programs should include internal documentation in the form of , which are explanatory comments inserted into a computer program along with lines of code. a program is not complete until it has been tested to ensure that it contains no errors, logic errors, or runtime errors. programmers can use methods based on rigorous logical and mathematical models to reduce the number of defects in a software product. additional techniques for producing high-quality, secure code include threat modeling and programming.
Computers and Technology
2 answers:
lana66690 [7]4 years ago
7 0
The answer is Code. <span>The instructions for a computer program are sometimes referred to as Code.  </span>In programming, code (source code) is a term used for both the statements written in a particular programming language, and the object code, <span>a term for the source </span>code <span>after it has been processed by a compiler and made ready to run in the </span>computer.
Liono4ka [1.6K]4 years ago
3 0

Answer:

The answers to the problems are given in the bold font statements below

Explanation:

The instructions for a computer program are sometimes referred to as program code. Computer programmers focus on <u>programming</u> computer programs, but they also plan, test and document computer programs. In contrast, software programmers apply formalized techniques to reduce the cost and complexity of software while increasing reliability. Before a program can be written, a programmer needs a clear problem <u>statement,</u> which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution. Programming projects can be approached using a(n) <u>predictive</u> methodology, which requires extensive planning and documentation up front. An alternative approach is to use the <u>agile</u> methodology in which programs are developed in iterations called <u>sprints</u>. With a clear plan, a programmer can begin composing using a text editor, program editor, or <u>visual</u> development environment. Programs are composed of a series of statements that include a(n) <u>command words</u> such as input or print and parameters. Those parameters may include <u>variables</u> that represent values that can change, or <u>constants</u> that that represents unchanging values. All computer programs should include internal documentation in the form of <u>remarks</u> which are explanatory comments inserted into a computer program following language-specific symbols, such as # or keywords such as REM. A program is not complete until it has been tested to ensure that it contains no <u>syntax</u> errors, logic errors, or run time errors. Programmers can use <u>formal </u>methods based on rigorous logical and mathematical methods to reduce the number of defects in a software product. Additional techniques for producing high-quality, secure programs include threat modeling and <u>defensive</u> programming.

You might be interested in
What are preconceptions?
anastassius [24]
An idea or statement  that you had previously or earlier.

6 0
4 years ago
Read 2 more answers
Someone who participates online for social reasons usually has a:
Gwar [14]

I would say A.Informal and casual online persona

7 0
3 years ago
In Windows Server 2016, what must be running to allow you to manage a server remotely with PowerShell?
Allisa [31]

Answer:

WinRM

Explanation:

WinRM is Microsoft's implementation of WS-Management in Windows which allows systems to access or exchange management information across a common network.

1. Starts the WinRM service

2. Sets the WinRM service to automatically start during the next boot of computer system

3. Enables all session configurations

4. Changes the security descriptor of all session configurations to allows remote access

5. Enables a firewall exception for WS-management

6 0
3 years ago
A 'deny any-any' rule in a firewall ruleset is normally placed: a. Nowhere in the ruleset if it has a default allow policyb. Bel
tia_tia [17]

Answer:

D. . At the bottom of the ruleset

Explanation:

The main purpose of firewalls is to drop all traffic that is not explicitly permitted. As a safeguard to stop uninvited traffic from passing through the firewall, place an any-any-any drop rule (Cleanup Rule) at the bottom of each security zone context

6 0
4 years ago
In implementing Security Life Cycle:__________
Dvinal [7]

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

7 0
3 years ago
Other questions:
  • Which of the following is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given obj
    8·1 answer
  • Choose one of the four quotes below to reflect upon. Explain what you believe the quote means about journalism. Do you agree wit
    11·1 answer
  • Charges of the opposite tend to repel each other.
    9·2 answers
  • Suppose a developer gets class XYZ files and documentation from a subcontractor. This class does not implement the Comparable in
    9·1 answer
  • #Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find
    11·1 answer
  • Plz answer me will mark as brainliest​
    13·1 answer
  • What are the steps to creating a blank database? Use the drop-down menus to complete them.
    9·1 answer
  • Where does an antivirus run suspicious applications?
    12·1 answer
  • An example of a _________________ impact is when a consumer wants to buy a product on the internet but is afraid the company won
    8·2 answers
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!