1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rusak2 [61]
3 years ago
8

Choose the correct statements about computer-programming languages. Choose all that apply.

Computers and Technology
2 answers:
Nady [450]3 years ago
8 0

Answer:

Computer-programming languages are like English, French, and German in that they follow set rules and patterns.

Computers understand binary machine language.

Programming languages like BASIC were developed for the convenience of programmers.

Explanation:

Kryger [21]3 years ago
3 0

Answer:

1, 2, 4

edge2020

Explanation:

You might be interested in
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. quest
bogdanovich [222]
The correct answer is B. A throughput refers to how much a data can be transmitted from a certain amount of time from one location to another. It is also used to measure the function of hard drives and internet connections.
3 0
4 years ago
Password ____ traverse the network searching for passwords from remote authentication systems.
irga5000 [103]

The correct answer is scanners.

<h3>what is password?</h3>

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

When a password contains more than one word, it may be referred to as a passphrase. When a password contains solely digits, such as a personal identification number, it may be referred to as a passcode or passkey (PIN).

learn more about password refer:

brainly.com/question/15569196

#SPJ4

3 0
1 year ago
Given the variables costOfBusRental and maxBusRiders of type int , write an expression corresponding to the cost per rider (assu
Liono4ka [1.6K]

Answer:

       int costOfBusRental;

       int maxBusRiders;

       int costPerRider;

       costPerRider = costOfBusRental/maxBusRiders;

Explanation:

The costPerRider is the total cost of renting the bus (costofBusRental) divided by all the bus users (maxBusRiders). So we declare the three variables to be of type int as required by the question.

7 0
4 years ago
The part of the computer that provides acess to the internet is called?
Eva8 [605]

<u>Answer:</u>

<em> </em><em>Modem is an hybrid device,</em><em> which is responsible for modulating and demodulating information. </em><em>It is a transmission medium and also it is a hardware tool used for connecting to internet.</em>

<u>Explanation:</u>

What is modulation?, let us understand. The <em>process of converting analog to digital signal is called modulation and demodulation is vice-versa.</em> The computer connects internet classically using telephone wire.

The <em>telephone wire understands only analog signal and a computer understands only digital signal.</em> So Modem’s role is to take care of this aspect while <em>connecting to the internet.</em>

3 0
3 years ago
Mara is a network system analyst for a large investment firm. What kind of
Alchen [17]

Mara is a network system analyst for a large investment firm. The education that Mara would have needed to achieve this position is  a bachelor's degree in computer science

Explanation:

  • Network systems analysts monitor and maintain computer hardware and software applications for businesses and organizations.
  • They specialize in the infrastructural design of the network and analyze the performance of these systems to best improve it.
  • The network system analyst also research and report the costs of upgrading or replacing the current networking technology used within a business.
  • Most bachelor's programs require completion of general education courses in mathematics, English and statistics.
  • Employers require systems analyst applicants to have at least a bachelor's degree in computer systems analysis, computer science, computer information systems, management information systems, business intelligence or a similar field of study.
  • A network analyst should hold a bachelor's degree in a field related to programming, information assurance, or computer science as a minimum.
  • The new criteria include the employers to look for those who hold a master's degree with the master of business administration.
8 0
3 years ago
Other questions:
  • Your computer running Windows 7 is doing some very strange things with the operating system. You are fairly certain it is not a
    10·1 answer
  • Why would you activate more than one nic on a pc?
    7·1 answer
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • Which statement is true regarding achievers?
    8·1 answer
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. Certain project
    11·1 answer
  • Please help i will give brainiest. Plus 30 points
    9·1 answer
  • How can a user remove or delete a Pivot Table?
    8·1 answer
  • Before entering an intersection, the safest searching process is to search ________. right, left, right, center left, center, ri
    5·1 answer
  • Once the data center routes to the destination server that hosts the website, what's the next step in the Internet process?
    12·1 answer
  • Ingredient Adjuster
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!