1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
3 years ago
11

What is an assembler?

Computers and Technology
1 answer:
Flauer [41]3 years ago
4 0

an assembler is a program that converts code written in a high-level language to assembly language that the computer processor can execute.

You might be interested in
The elements in a string type array will be initialized to ____.?
ivanzaharov [21]
The elements in a string type array will be initialized to "Null".
7 0
3 years ago
After you select your recipients, the next step in using the Mail Merge Wizard would be to _____.
NARA [144]

Answer:

Write your letter

Explanation:

When using a Mail Merge Wizard in a Microsoft Word Document, this is the process.

  • Click on your document type
  • Click on the starting document
  • Select the recipient(s)
  • Write your letter and add some custom fields
  • Insert your address Block
  • Strike enter and click on Greeting line (to enter a greeting)
  • Preview your letter and click on complete merge
3 0
3 years ago
Read 2 more answers
. is the language that Web pages are written in?(PHP,XML,HTML,Javascript)
dalvyx [7]

Answer:

<em>HTML</em><em>(</em><em>hypertext</em><em> </em><em>markup</em><em> </em><em>language</em><em>)</em><em> </em>is the language that Web Pages are written in.

4 0
3 years ago
Read 2 more answers
Which wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
Korolek [52]

Answer:

WEP, WPA Personal, and WPA2 personal, these are the wireless security method which are used common shared key configured on the wireless access point and wireless clients. WEP is the wired equivalent privacy and WPA stands for wifi protected access.

These are the wireless security protocols, which basically provide the wireless security to the system. Wireless network are transmitted within the range for every direction. WPA modern application used the pre shared key system and this system are developed for link the device to the access point easily.

4 0
3 years ago
What type of servers are used to store recently accessed DNS records from other domains to avoid incurring the performance overh
Kruka [31]

The correct answer is B. Primary DNS Server.

DNS records are type of data that is equivalent to IP address where the website or domain is located.  DNS records are normally stored in DNS server in a raw or flat file. A host, using port number 53 will send a DNS request to the server. If the computer has stored it's data or record in it's database, it will automatically reply to the requesting host. Example: You typed in www.website.com, if you have a matching DNS record in your server, using an IP address, your server will reply and display the website.

8 0
3 years ago
Other questions:
  • If you plan on operating several applications at s time, the amount of RAM should be considered when purchasing a computer
    10·2 answers
  • Which task might be suitable for moving into a separate function so you can re-use it from multiple places in your code?
    11·1 answer
  • In your opinion, is it more beneficial to have many folders or is it better to “nest” subfolders? Explain your response.
    10·2 answers
  • Which of the following parameters should match in order for a pair of routers to form an adjacency when running OSPFv2? (Points
    9·1 answer
  • write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
    9·1 answer
  • A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page fr
    14·1 answer
  • Write a java program to create and display unique three digit number using 1,2,3 and 4 also count how many three digit number ar
    10·1 answer
  • In the program below, which two variables have the same scope?
    9·2 answers
  • Which storage is faster than secondary storage​
    14·2 answers
  • In the tcp/ip protocol that allows communication across the internet, what does tcp do?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!