1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
4 years ago
11

What is the informal language that programmers use to create models of programs that have no syntax rules and are not meant to b

e compiled or executed?
Computers and Technology
1 answer:
Yuri [45]4 years ago
5 0
Pcode (Pseudo-code).

-----------------------------
You might be interested in
Which subexpression will be solved first in the given statement?
Crazy boy [7]

Answer:

If you dont buy terraria than im going to make mrbeast buy it for you

Explanation:

reeeeeeeeeeeeeeeeeeeee

4 0
4 years ago
What is (12.2a + 9.7b) – (18.1b – 0.2a) – (6.7a + 6.8b), simplified?
Inga [223]
The answer should be 5.7a - 15.2b
8 0
3 years ago
Check the devices that are external peripheral devices:
irina [24]

Answer:

Mouse, and keyboard

Explanation:

Common Sense

6 0
3 years ago
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
3 years ago
A network administrator needs information about the printers that employees can access. Where can he find the information? The a
Kaylis [27]
The information can be found on the printserver or terminal serve information where mapped users to the server printers were granted or have access to. On setup of server printers, the administrators allow certain individual access to the terminal server after installing the printer to be made available on the server.
6 0
3 years ago
Read 2 more answers
Other questions:
  • WILL GIVE BRAINLIEST PLEASE HELP / urgent
    9·1 answer
  • An employee at your graphic design firm needs a solid computer that can handle the variety of graphics and animations he works w
    7·2 answers
  • What is diffie-hellman most commonly used for?
    15·1 answer
  • This LEGENDARY character made a much-celebrated comeback in 2017. What was the name of the villain he faced in this epic tale?
    7·2 answers
  • How can a network design project benefit from the principles of itsm? How might itsm impede a network design project?
    11·1 answer
  • Match the items with their respective descriptions. denotes row numbers denotes cell addresses denotes worksheets denotes column
    10·1 answer
  • Assignment 4: Evens and Odds
    11·1 answer
  • Describe in detail what each step would look like if you ran into a software error.
    7·1 answer
  • What does a black box represent in the system input/output model?.
    7·1 answer
  • What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!