1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
4 years ago
14

A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor

age locations.
a. COBOL languageb. programming languagec. ASCIId. machine language
Computers and Technology
1 answer:
Makovka662 [10]4 years ago
7 0

Answer:

Option d is the correct answer.

Explanation:

Machine language is a language that is understood by any machine because it is made from the electric signal which has only two states on and off. On state refers to 1 and off-state refers to 1. The computer is also a type of machine so it can also understand machine language. The above question asked about the instruction which is made by 0's and 1's and it is used for the computers then the answer is Machine language which is described above and which is stated from the option d. Hence option d is the correct answer while the other is not because--

  • Option 'a' states about COBOL language which is an example of high-level-language, not the example of machine language.
  • Option b states about the programming language which is a mixture of all language of computers.
  • Option c states about ASCII which is not the correct answer.

You might be interested in
Which loan type requires you to make loan payments while you’re attending school?
LUCKY_DIMON [66]
The answer is student loans
3 0
4 years ago
Read 2 more answers
Please answer questions in complete sentences!
Troyanec [42]

i need help on that too :cc

7 0
2 years ago
Why would a network administrator want to filter certain ports when capturing data such as FTP traffic
hjlf

Answer:

To avoid receiving malware-infected files like spam.

Explanation:

Hackers use malware to gain unauthorized access to company files and information for personal gain. Files infected by the malware can infect other systems or files. There are various types of malware namely; virus, trojan horse, worm, spyware, ransomware, adware etc.

5 0
3 years ago
I got a question in computer science I don't understand, can someone please help.​
AnnyKZ [126]

Answer:

Hi, this program allows you to calculate a sphere’s area and volume depending on the radius of your choosing.

Please give brainliest, means alot!

6 0
3 years ago
Funny or fascinating web content is said to go _________ when it is shared and re-shared a large number of times over a short pe
beks73 [17]
It is said to go viral?
4 0
3 years ago
Other questions:
  • In the scene where we see Don and Lina acting in a silent film (beginning at time code 11:05), describe the silent film. How is
    7·1 answer
  • Using the bitwise AND operation, the result of 1 AND 0 is ___________. 10100100 ___________ 11010101 = 01110001. A common way to
    15·1 answer
  • Why might a government entity choose to offer some information and services online as in e-government
    8·2 answers
  • What are paragraphs separated by
    9·1 answer
  • Which is the oldest of the following sports?
    6·2 answers
  • E-What is the important of Recycle bin?<br>Ans:​
    12·1 answer
  • ________________, _______________ and ___________ are what you see when you open Excel
    15·1 answer
  • PLEASE I NEED HELP FAST
    8·1 answer
  • When James added a date field to a PivotTable, Excel grouped the date values into quarters, months, and years. He does not want
    13·1 answer
  • imagine that you are explaining the art of visual comparison to a group of photography students. You are mentoring. What do you
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!