1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
15

Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique web

sites. Many of his daily tasks are heavily technical in nature and require a high level of computer programming and Internet knowledge. Which of the below would Erik primarily use when performing his daily tasks?A. Source code
B. Brick-and-mortar
C. Information reach
D. Explicit knowledge
Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
5 0

Answer:

A. Source code

Explanation:

In the field of Programming; Source code is the code written in high level language given to the computer to translate to machine -  executable code before executing. It is usually written and understood by human. It is closer to human like language, as it allows easier expression. It is mostly consist of english-like statement.

So, Erik would primarily be writing source code when performing his daily tasks since his daily task require high level of computer programming and internet knowledge.

You might be interested in
Type the correct answer in the box. Spell all words correctly.
mojhsa [17]

Answer:

h

Explanation:

4 0
3 years ago
A program in which students learn a specific skill for a particular job is called a
Ne4ueva [31]
A certification program.
7 0
3 years ago
Read 2 more answers
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
55555,5555,555,55,5​
REY [17]

Answer: Decreasing Function????????????????????????????????

Explanation:

I'm confused, but I'm still gonna try and answer

6 0
3 years ago
Hodaya missed several days of her online nursing class and needs to catch up. The most effective way she can do
Snowcat [4.5K]

Answer

send an individual e-mail to her teacher for advice.

8 0
3 years ago
Read 2 more answers
Other questions:
  • You are most likely to automatically encode information about
    11·1 answer
  • Narrowband Satellite Communications supports ______________ data rates for both mobile and fixed users by providing access on a
    8·1 answer
  • The company database may be stored on a central database server and managed by a database adminstrator true or false
    12·1 answer
  • The interactive process through which people learn the basic skills, values, beliefs, and behavior patterns of a society.
    6·1 answer
  • Given the module description:________.
    11·1 answer
  • Write a Python program that accepts a numeric value from the user and prints the number starting from 0 up to the user’s value.
    8·1 answer
  • As with most professions, photography comes with its own unique set of terms and jargon. Identify at least four different words
    5·1 answer
  • create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.
    6·1 answer
  • 1) Given what you have learned about computers and information technology thus
    6·1 answer
  • Html is a markup language that lets you identify common sections of a web page
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!