1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
4 years ago
11

What is the informal language that programmers use to create models of programs that have no syntax rules and are not meant to b

e compiled or executed?
Computers and Technology
1 answer:
Yuri [45]4 years ago
5 0
Pcode (Pseudo-code).

-----------------------------
You might be interested in
Network ____ specify the way computers access a network. a. wires b. files c. standards d. instructions
Marizza181 [45]

Answer:

c. standards

Explanation:

Network standard specifies the way computers access a network. They are guided rules that must be taken into consideration for successful integration and interaction of technologies that use a wide variety of networks.

Another integral importance of network standard is that they ensure that individual usage of carried out without issues related to inconsistency.

Examples of Agencies governing the regulation of network standards are the International Telecommunication Union (ITU) and the Institute of Electrical and Electronics Engineers (IEEE)

8 0
4 years ago
Arrange the following units of storage in descending<br> order. B, TB,KB, GB,MB
adell [148]

Answer:

TB,GB,MB,KB,B

Explanation:

7 0
3 years ago
Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for e
Goryan [66]

Answer:

The correct answer to the following question will be "Digital Forensics".

Explanation:

  • Digital forensics is a field of forensics that involves the analysis and retrieval of materials found in electronic devices, sometimes related to cybercrime.
  • The objective of digital forensics methodologies would be to check, maintain and evaluate evidence on computing systems to find possible evidence for a trial. In the initial days of computing, an individual investigator could process files because the power consumption was so small.

Therefore, Digital Forensic is the right answer.

7 0
4 years ago
Write a complete method to create an array of random integers. The method takes in three integer parameters: the array size, the
Nataly [62]
Write a complete method to create an array of random integers. The method takes in three integer parameters: the array size, the lower bound, and the upper bound. The method also takes in a boolean parameter. The method creates and returns an integer array of the specified size that contains random numbers between and lower and upper bound. If the boolean parameter is true, the upper bound is inclusive. If the boolean parameter is false, the upper bound is not inclusive (meaning it is exclusive). Note the lower bound is always inclusive. If any of the parameters are invalid, null is returned.

Hope this helps!
5 0
3 years ago
Provide examples of how you can use a computerized
Alexus [3.1K]
File management systems are vital! For example, when you are developing a website, having a good file management system is critical for successful development.

Each file needs a corresponding folder where it can belong. When you are working on developing a website, you will be extracting files in your code from a certain directory. It's because of a good file management system that this is possible! =)
3 0
3 years ago
Other questions:
  • Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to
    8·1 answer
  • .All of the following are true with the respect to implicitinvocation except:
    8·1 answer
  • What is added to the &lt; meta &gt;tag to describe the encoding type?
    15·1 answer
  • Why is personal responsibility important when considering technology?​
    14·2 answers
  • Why is it a good idea to defrag your hard disk regularly?
    9·1 answer
  • Does access provide email communication
    13·1 answer
  • b) Derive the logic expressions for the incrementor and 7-sgement decoder. Since software can perform gate-level optimization, y
    7·1 answer
  • The introduction of an academic paper must include a:
    12·2 answers
  • Submit your business presentation that clearly compares and contrasts three different cell phone service plans. I have TO HAVE I
    14·1 answer
  • From Edmentum/Plato
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!