1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
3 years ago
5

Which of the following is the process of writing the step-by-step instructions that can be understood by a computer?

Computers and Technology
1 answer:
Aleks04 [339]3 years ago
5 0

Answer:

computer programming

Explanation:

says the answer in the question

You might be interested in
Does anyone play genshin impact here?
Reika [66]
Answer


NO sorry
Have a great day
6 0
3 years ago
Read 2 more answers
You want to store, organize, and manipulate your photos. what type of software do you need?
ohaa [14]

Answer:

You want to store, organize, and manipulate your photos. what type of software do you need?Adobe photoshop

sub heading:

what is photoshop?

Explanation:

1. you can dream it, you can make it with Adobe Photoshop.

2. Create beautiful images, graphics, paintings, and 3D artwork on your desktop or iPad

Reference link:

https://brainly.com

Hashtag:

#SPJ4

3 0
1 year ago
Using language c, find the nth Fibonacci, knowing that nth Fibonacci is calculated by the following formula: - If n = 1 Or n = 2
Nina [5.8K]

Answer:

#include <stdio.h>

int fib(int n) {

 if (n <= 0) {

   return 0;

 }

 if (n <= 2) {

   return 1;

 }

 return fib(n-1) + fib(n-2);

}

int main(void) {

 for(int nr=0; nr<=20; nr++)

   printf("Fibonacci %d is %d\n", nr, fib(nr) );

 return 0;

}

Explanation:

The code is a literal translation of the definition using a recursive function.

The recursive function is not per se a very efficient one.

4 0
3 years ago
To ensure rapid recovery and security of data, backup data should be ________.
Nataly [62]

Answer:B kept at a secure location at the facility

Explanation:

8 0
3 years ago
Which of the following is a way the operating system prevents unknown or unauthorized users from accessing the system?
Xelga [282]

Put a code or security system on or a very secure password

Hope this helps...

6 0
3 years ago
Read 2 more answers
Other questions:
  • Jacob is a teacher and wants to sort his grades based on Test 1 and then on Test 2.
    14·2 answers
  • For a loop counter, the appropriate data type would be:
    14·1 answer
  • How does an agile team maintain requirement?​
    9·2 answers
  • The reliance on _____ as the design methodology for relational databases is seen as a stumbling block to its use in OLAP systems
    5·1 answer
  • What is application software? A computer language for accessing data in a database. A character string used to identify the loca
    10·1 answer
  • A ________ is a question you ask about data stored in a database
    9·1 answer
  • How do you resolve conflicts in your life??
    11·1 answer
  • What is the largest value that can be represented by 6 binary digits? .
    5·1 answer
  • If you need some one to talk to you can talk to me
    13·2 answers
  • Write a function check_palindrome that takes a string as an input and within that function determines whether the input string i
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!