1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
4 years ago
6

Popular in astronomic circles, the ______ programming language is based on a stack.

Computers and Technology
1 answer:
Zina [86]4 years ago
4 0

Answer: Smalltalk

Explanation:

 The Smalltalk is one of the most popular and general purposed programming language which is used in different types of problem domain.

This programming language is basically based on the stack, that used for various types of application that are:

  • Mobile applications
  • Machine leaning
  • Financial industries
  • Military applications

You might be interested in
For homework, we have to figure out what's in the picture. It's " too close to tell " but I can't figure out what it is. Any ide
CaHeK987 [17]
It seems like some type of fabric, maybe a car seat? i honestly don't know, sorry
4 0
3 years ago
Which process refers to starting up a computer
sergey [27]

It's usually called "Booting Up"

Booting up is usually the process in which you usually refers to the computer loading up basic software to the computers memory.

6 0
3 years ago
1. For which of the following are you not required to signal beforehand?
Katyanochek1 [597]

Answer:

C stopping.

Explanation:

The situation varies, if there is a cross-walk and there is a pedestrian trying to cross you it is mandatory to stop. and allow the pedestrian the right of way. so if you're driving and suddenly stop to allow the pedestrian their right of way then all oncoming vehicles must stop to allow the pedestrian to cross the street.

3 0
4 years ago
You are a help desk technician providing support for a wireless network. A user calls and complains he cannot access the Interne
konstantin123 [22]

Answer:

From the user explanations, it can be inferred that the issue may be as a result of incorrect security parameters such as Wireless Protected Access (WPA) which ensure security for wireless connections.

Explanation:

If there is an incorrect access pass to the wireless network by the WPA, any wireless user will not be able to complete a Layer 2 connection to the wireless network after connecting and getting good signal indication and would thus be unable to obtain IP address automatically to be able to log on to browse the internet from the DHCP Server.

8 0
3 years ago
Read 2 more answers
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
Other questions:
  • What is binary coded decimal,EBCD and ASCII
    15·1 answer
  • Data ____________ refers to any technique that recodes the data in a file so that it contains fewer bits.​
    10·1 answer
  • Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and
    7·1 answer
  • Systems thinking includes consideration of all of the following EXCEPT
    9·1 answer
  • A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were se
    15·1 answer
  • 1, and
    9·1 answer
  • Using the simple alphabet code below, you will decode and encode the message. Write the Full
    6·1 answer
  • If you play video games, please answer these questions it’s for a survey for my game development class!!
    5·1 answer
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • Being technologically literate requires being able to ______. a. use advanced graphics manipulation tools (adobe photoshop) b. u
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!