1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kherson [118]
3 years ago
13

True / False The architecture of a computer determines its machine language.

Computers and Technology
1 answer:
ozzi3 years ago
6 0

Answer: True

Explanation:

The architecture of the computer determine the processor and it determines whether we will have fixed length instructions or variable length instructions.

We have CISC and RISC architectures which uses different types of instructions and the data are processes in different machine languages.

You might be interested in
Here's something random idc
melisa1 [442]

Answer:

ey ey

Explanation:

3 0
3 years ago
Read 2 more answers
Point out the wrong statement: SOA eliminates the use of application boundaries, the traditional methods where security is at th
love history [14]

Answer:

All the three statements given are true so the correct option is option 4 which is none of the above.

Explanation:

The options are given in a jumbled up form the options are sorted which are as follows:

  1. SOA eliminates the use of application boundaries, the traditional methods where security is at the application level aren't likely to be effective
  2. An atomic service cannot be decomposed into smaller services that provide a useful function
  3. XML security service may be found in retail application communication.
  4. None of the mentioned

SOA stands for Service Oriented Architecture. This eliminates the application boundaries so option 1 is true.

An atomic service is defined as the smallest service which cannot be divided further. So this is true as well

The XML security service is incorporated in all retail applications. so this is true as well.

So the remaining option is just None of the mentioned.

7 0
3 years ago
Can someone help me?
stich3 [128]

Answer:

2nd one

Explanation:

7 0
3 years ago
Read 2 more answers
¿Que es una linea del tiempo?
DanielleElmas [232]
Una línea donde vas ordenando los hechos que han sucedido hasta el presente, aquí te dejo un ejemplo

•___________________________•
P. N. E. HISTORIA
A. E. D
L. O. M
E. L
O. I
L. T
I. I
T. C
I. O
C
I
6 0
3 years ago
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software c
GalinKa [24]

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. <u>VPN </u> software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

Explanation:

  • A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet.
  • VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more. .
  • Virtual Private Network, is a private network that encrypts and transmits data while it travels from one place to another on the internet. VPNs aren't just for desktops or laptops, you can set up a VPN on your iPhone, iPad or Android phone.
  • A VPN encrypts the traffic from your machine to the exit point of the VPN network. A VPN isn't therefore likely to protect you from an adversary like Anonymous.
  • VPNs add another layer of encryption to your internet traffic, your latency will go up and speeds will go down.

3 0
4 years ago
Other questions:
  • An international magazine publisher has commissioned you to do a series of images in black and white. The publisher distributes
    13·1 answer
  • What is one way for an entrepreneur to decrease risk?
    8·1 answer
  • Which delivery model is an example of a cloud computing environment that provides users with a web based email service ?
    9·2 answers
  • For a loop counter, the appropriate data type would be:
    14·1 answer
  • Motorcycles have two or three wheels, a seat for the rider and at least a ____ horse-powered engine.
    15·1 answer
  • Fair Use means a teacher can take the contents of a web activity page and repost it in your school's web site because it is for
    7·1 answer
  • (within 200 words) analyzing the importance of information and communication technology in personal life.
    5·1 answer
  • Which symbol would be used in a flowchart to represent a connection to another part of the flowchart on the same page
    15·1 answer
  • why does planets orbit the sun? asap i give brainlist i know it on that subject i dont know what else goes with it
    10·1 answer
  • What is one way to process your thoughts about the information you are reading?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!