1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
3 years ago
5

An api is a set of application or operating system functions that programmers can add to the programs they create.?

Computers and Technology
2 answers:
Lorico [155]3 years ago
8 0
This is true but not always in this context. 
Paraphin [41]3 years ago
6 0

Answer:

The correct answer to the following question will be True.

Explanation:

Application Programming Interface (API):

An API is a set of routines, protocols, and software development tools. The API defines the connection between software components. Also, the Graphical User Interface components are programmed using the APIs. 

A reasonable API promotes the production of software with all building blocks. A programmer then assembles the blocks. That is he or she can add the features into the program they have created. 

You might be interested in
Some financial institutions can be really bad about putting unexpected charges
kherson [118]
I think it’s false ............
7 0
3 years ago
___________ is some danger that can exploit a vulnerability.
andreyandreev [35.5K]

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

8 0
2 years ago
FS and GS are two___________________ in protected mode.
masha68 [24]

Answer:

Segment registers

Explanation:

The initial purpose behind the segment registers was to enable a program to access many distinct (big) memory sections designed to be autonomous and part of a constant virtual store.

They don't have a processor-defined objective, but instead Operating system runs them for purpose. The GS register is used in Windows 64-bit to point to constructions defined by the operating scheme.   Operating system kernels usually use FS and GS to access thread-specific memory. In windows, thread-specific memory is managed using the GS register. To access cpu-specific memory, the linux kernel utilizes GS.

7 0
3 years ago
How would you describe the difference between a syntax error and a logic error?
Ugo [173]

Answer:

hii

Explanation

syntax error:  a syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in compile-time. A program will not compile until all syntax errors are corrected.

logic error:  logic error is a bug in a program that causes it to operate incorrectly, but not to terminate abnormally. A logic error produces unintended or undesired output or other behaviour, although it may not immediately be recognized as such.

6 0
3 years ago
Read 2 more answers
Imagine that a crime has been committed and being a police officer you have to investigate the case. Solving a crime can be a ve
Igoryamba

Explanation:

On October 31, around twelve o'clock at night, the lights were dull. It was Siberian cold and I was walking painfully under the whitish lighting of a lamppost and the retro neon lights of a convenience store in a neighborhood that was buzzing when I went to buy meat. buildings, grayish in this half-light, crumbled under the weight of sleep, while the neighborhood was still open. Its decoration was particularly macabre in tone: synthetic but very sticky spider webs adorned the porches of the terraces, pumpkin ornaments are exhibited like works of art, ... Some pushed the macabre by hanging mannequins made up in corpses. At the entrance to the neighborhood, I found the body of its owner stabbed. Frozen in place, I wondered what else awaits me. My heart was pounding, feeling a shiver of anguish. When I was removing the phone from my pocket to call my police friends, my hands were clenched in fear. An investigation was carried out to find out the causes of death. Also, I went with them so they take my words. Hopefully the murderer will be arrested to put an end to this sybilinous crime.

4 0
3 years ago
Other questions:
  • Two or more computers that are linked together are called which of the following
    10·1 answer
  • What kind of java program runs within a java-enabled browser?
    15·1 answer
  • Which of the following is NOT a component of a DFD?
    8·1 answer
  • Systems Software, Inc., is introducing a new piece of sophisticated graphics software. A recently hired writer has been assigned
    8·1 answer
  • Is a biometric system an input, output, storage or soft device?​
    6·1 answer
  • You’re having trouble connecting to the Internet so you call your Internet service provider for help. They need to know the perm
    15·1 answer
  • Neymar machine that Run on electricity
    11·1 answer
  • Programming Cycle. Arrange them in correct order​
    5·2 answers
  • What role do play in medicine ​
    11·1 answer
  • You have received an update package for a critical application you are running on a virtual machine. You have been told to insta
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!