1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
5

Which quality allows programmers to modify a program as and when required?

Computers and Technology
1 answer:
Irina18 [472]3 years ago
6 0

Answer:

A. Portability

Explanation:

Portability in computer programming is understood as capability of a program to be used in operating environment other than the one in which it was initially constructed.

A portable computer program can be run on different machines, having different operating environment, without making any major changes to program.

Program's portability allows programmer to make modification in programs as per need.

Hence the correct option is A. Portability.

Option B i.e. structure of a program is related to its overall presentation and organization.

Option C and D i..e generally and flexibility have no relevance here and are not used as keywords in context of computer programming.

You might be interested in
1. Which of the following is a result of a successful negotiation?
Alik [6]
Maybe a Win win outcome
7 0
4 years ago
Read 2 more answers
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
Viktor [21]

Answer:

Assignee

Explanation:

4 0
3 years ago
Read 2 more answers
A decision tree Multiple Choice is a chart that shows the hierarchy of levels and positions in an organization. is a chart that
dezoksy [38]

Answer:

is a chart that allows the reader to follow a particular path and arrive at an outcome.

Explanation:

A decision tree is a chart i.e tree like diagram that allow a user to make choice on the option to partake in. Decision trees are also used for classification and for making process

The decision tree usually have a root as the node. Then each option/decision is represented as a branch out extending from the previous node.

For Instance, when a coins is toss three times; a decision tree gives us the possible path that is available to choose from.

3 0
3 years ago
What can you do to make sure no one outside your company can gain access to its wireless network?
Oksana_A [137]

Disable SSID broadcasting, Lower radio energy groups, and Enable MAC filtering.

<h3>Why would you disable SSID broadcasting?</h3>
  • Disabling the SSID Broadcast is one method of ensuring your wireless web.
  • This procedure will stop other users from detecting your SSID or your wireless network title when they attempt to view the available wireless networks in your area.
  • The network character exists delivered to wireless devices, which is the reason for disabling the SSID broadcast.
  • A typical wireless adapter and its associated software will identify and list all available SSIDs for networks that are within range.
  • When somebody disables SSID broadcast on any of those networks, the network will no extended show up in the wireless adapter's list of known networks.

To learn more about Disable SSID broadcasting, refer to:

brainly.com/question/15289342

#SPJ4

The complete question is:

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.

What can you do to make sure no one outside your company can gain access to its wireless network?

6 0
2 years ago
Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t
Gelneren [198K]

The subnet's IP range, which in this case is 8 bits or up to 256 addresses, is covered by the mask's 0 digits.

The 255 address, or host address of all ones in binary notation, is used to send a message to every host on a network. It's important to keep in mind that no host can be given the first or final address in a network or subnet. A subnet mask is a 32-bit integer that is produced by setting all host bits to 0 and all network bits to 1. The subnet mask does this by dividing the IP address into network and host addresses. The "0" address is always a network address, but the "255" address is always allocated to a broadcast address.

Learn more about address here-

brainly.com/question/20012945

#SPJ4

4 0
1 year ago
Other questions:
  • What does a code of conduct include.
    10·2 answers
  • Based on the chart below, which pie flavors make up approximately one-half of the total? A pie chart shows the following pie fla
    7·2 answers
  • What is an administrator?
    8·1 answer
  • The activities that gather information about the organization and its network activities and assets is called fingerprinting. __
    14·1 answer
  • Type the correct answer in the box. Spell the word correctly. Which framework can be used to develop cross-platform applications
    15·2 answers
  • A jeweler designing a pin has decided to use five stones chosen from diamonds, rubies, and emeralds. In how many ways can the st
    9·1 answer
  • 12) If the image's name is filename.gif, how can I make this image the background of my page?
    6·1 answer
  • Carbohydrates are a huge source of
    7·2 answers
  • How can having more than one goal cause truble in the work place
    6·1 answer
  • P*********** is considered a serious social problem justify this statement​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!