1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
3 years ago
5

Which of the following activities are performed by computer programmers? Choose all that apply.

Computers and Technology
1 answer:
AleksAgata [21]3 years ago
3 0

Answer:

- They write step by step instructions for a computer to follow.

- They create a logic problem that the computer program can solve.

You might be interested in
In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.
Advocard [28]

In object-oriented analysis, an object is a member of a CLASS, which is a collection of similar objects. It is a software engineering method.

<h3>Object-oriented analysis </h3>

Object-oriented analysis and design can be defined as a software engineering methodology.

This methodology (object-oriented analysis) is used to model a system as a particular group of interacting objects.

The object-oriented analysis is characterized due to the fact that objects are organized according to particular classes.

Learn more about object-oriented analysis here:

brainly.com/question/3522354

3 0
2 years ago
Choose the sentences that describe techniques of formatting text.
OLEGan [10]

I'm sorry if this answer has come to late.

Answer:

She opened her type tool and wrote in 'Happy Thanksgiving at the bottom of the image. She smoothed the edges of the text and changed its color. She then placed the text on a rug and tilted it to create an effect that showed as if the text was written on the rug.

Hope this helps!

8 0
3 years ago
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
Murljashka [212]

Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack.

<h3>What is downgrade security attack?</h3>

A downgrade attack is known  to be a kind of of cyber attack that is made up of the fact that an attacker is known to often forces a network channel to make a switch to a kind of an unprotected or one that is said to be less secure data transmission standard.

Note also that the  Downgrading of a given protocol version is said to be a key element of  a type of a  man-in-the-middle attacks, and it is known to be one that is often used to take or hijack encrypted traffic.

Hence, Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack

Learn more about Downgrade attack from

brainly.com/question/24304791

#SPJ1

3 0
2 years ago
Annie needs to provide a form field that will allow users to select from a predefined list of options but without the ability to
Lana71 [14]

Answer:

Drop down list

Explanation:

You have not listed what the possible answers are, however a drop down list would be an option to accomplish this.

8 0
3 years ago
How to create a comparator generic type in java.
KIM [24]

Answer:

public class Person {

//fields

private int id;

private String name;

private Payment pay;

//constructor

public Person(String name, int id,

int startSal, int startBon){

this.name = name;

this.id = id;

this.pay = new Payment(startSal, startBon);

}

//method get name

public String getName(){

return name;

}

//method get id

public int getId(){

return id;

}

//method get start salary

public int getStartSalary(){

return pay.startSalary;

}

//method get start bonus

public int getStartBonus(){

return pay.startBonus;

}

//inner payment class

private class Payment{

int startSalary;

int startBonus;

public Payment(int sal, int bon){

this.startSalary = sal;

this.startBonus = bon;

8 0
2 years ago
Other questions:
  • Krystal recorded her times for all her cross-country meets this season. To sort her data showing the lowest times first, what wi
    14·2 answers
  • Why are computer programs so much longer now than they were in the late 1980?
    8·1 answer
  • Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
    13·2 answers
  • What method of the Math object can be used to return the largest value from the values that are passed to it?
    14·1 answer
  • A group of computers that are interconnected in order to share information or documents is called a _____.
    7·1 answer
  • In a black box model are the customers told that they should be expecting to be haxked?
    13·1 answer
  • Rosa is building a website for a multimedia company. She wants to add a drop-down menu functionality to the website's main page.
    12·1 answer
  • Which term best describes these lines?
    7·1 answer
  • Create a function that takes an integer array as input and a value and returns a POINTER to the number of times the value appear
    13·1 answer
  • Consider the following code using the posix pthreads api:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!