1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
4 years ago
7

______A computer program may only be constructed in a high level language. (T/F)

Computers and Technology
1 answer:
NeTakaya4 years ago
5 0

Answer:

False.

Explanation:

A computer program can not only constructed in a high level language but also in low level language such as assembly language used for microprocessor for ex-8085 microprocessor,8086 microprocessor ,ARM assembly language and there are many more.

High level languages are programmer friendly they are easily understood by the programmers because they uses english words while low level languages are difficult because they uses binary language 0's or 1's.

Hence the answer to this question is False.

You might be interested in
What is the build in libary function to compare two strings?​
worty [1.4K]

Answer:

strcmp() is a built-in library function and is declared in <string. h> header file. This function takes two strings as arguments and compare these two strings lexicographically.

Explanation:

Hope it helps

3 0
4 years ago
How does computer network work in a paragraph
Maksim231197 [3]

You go in to the networks crosh/Linux and you insert the info you want in code

7 0
4 years ago
Jennine has a table that she has created in Word. She has removed all borders inside the table, but now she wants a box around t
Crazy boy [7]

Answer:

The steps to create table, hide boarder and show border around the whole table is given below.

Explanation:

<u>1. Create Table</u>

  1. Click on insert Tab
  2. In insert tab, Click on Table
  3. Select No. of row and columns to create the table

<u>2. Hiding Boarders</u>

  1. Click on Design Tab
  2. In table style section Choose the layout that have no boarder

<u>3. Add boarder Around table</u>

  1. Click on Design Tab
  2. Select whole table by clicking on Plus sign on the top right corner of table
  3. Click on arrow of boarders button in Boarders section in design tab
  4. Select the "outside boarder" option from the list

<em>By following above mentioned steps, jennnine can draw a boarder around the table to distinguish it from rest of the document.</em>

8 0
4 years ago
In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
kirill115 [55]
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
4 0
4 years ago
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________
tresset_1 [31]
The answer is Phishing
3 0
4 years ago
Read 2 more answers
Other questions:
  • Write a function name isPrime, which takes an integer as an argument and returns true if the argument is a prime number, or fals
    14·1 answer
  • On the UB-04 claim form, the type of bill is identified by a four-digit numerical code. The first digit is a leading zero, what
    10·1 answer
  • Instructions: Type the correct answer in the box. Spell the word correctly.
    5·2 answers
  • Using computers in place of paper to design components, products, and processes is referred to as ______.
    11·1 answer
  • What kind of sampling does a quasi experiment use?
    11·1 answer
  • What technology is being used instead of Adobe flash player​
    8·1 answer
  • In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
    9·1 answer
  • Help please what is the answer , thanks!!!
    13·1 answer
  • A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.
    8·1 answer
  • Jon wants to assign a value to the favorite food variable: favoriteFood! = "Pizza" but gets an error message. What does he need
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!