1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
3 years ago
10

Why do software developers prefer to use high-level language to author programs? A. It can be used on computers without micropro

cessors. B. It prevents anyone from making changes to the software later. c. It uses a more English-like syntax. d. It’s less complicated because it only uses zeros and ones.
Computers and Technology
1 answer:
aalyn [17]3 years ago
4 0

Answer:

the answer is B.....

Explanation:

You might be interested in
What must you be careful of when retrieving messages/data from mobile devices in public?
pochemuha

We must be careful of when retrieving messages/data from mobile devices in public because of Bluebugging.    It is a form of attack through the use of Bluetooth.  It is more than just Bluesnarling and Bluejacking.  It goes beyond, allowing the thieves to take control of a device.

7 0
3 years ago
The concepts of ________________, _________________, and _________________ for covert acts are pivotal to understanding state-on
DIA [1.3K]

The concepts of Power, anonymity and political utility for covert acts are pivotal to understanding state-on-state interactions within cyberspace.

<h3>What is Anonymity?</h3>
  • Anonymity describes cases where the interim person's identity is anonymous.
  • Some writers have argued that anonymity, though technically accurate, does not capture what is more centrally at stake in contexts of anonymity.
  • The essential concept here is that an individual is non-identifiable, unavailable, or untrackable.
  • Anonymity is seen as a technique, or a way of realizing, sure other values, such as solitude, or liberty.
  • Over the past few years, anonymity tools used on the dark web by offenders and harmful users have drastically changed the ability of law enforcement to use conventional surveillance Techni.

To learn more about Anonymity, refer to:

brainly.com/question/28115737

#SPJ4

3 0
1 year ago
Give an example of a process that may need a flowchart to clarify procedures.<br><br> HELP ASAP!
11111nata11111 [884]

To understand flow of programming logic flow chat technique been used. Once end user starts any learning programming flow chat design been learned and corrected the mistake. After success of flow chat design end user been advice to do programming and tested in computer.

<u>Explanation:</u>

In flow chart design is used for beginner level programming. Some time to make higher level managers to understand this flow chart design is used.

Flow chart has start, procedure, condition, function or procedure and end with stop diagrams.

Flow chart makes end user understand the flow of logics.

Suppose we need to do a process for a procedure, end user has to design with start flow chart symbol and put a procedure flow chart symbol with identification character, then end user has use same identification character and start designing the procedure in the flow chart diagram.

Procedure in flow char design is used to call same procedure number of time, so that repeated coding is avoided.

5 0
3 years ago
If you enter the search "genetically modified foods" in a database, the double quotes around the three words will:
In-s [12.5K]

Answer:

Have a more specified search

Explanation:

If you do this in G0OGLE Then it will be the same thing all it basically does it narrow down the search to find more of what you want

4 0
3 years ago
You are considering upgrading memory on a laptop. What are three attributes of currently installed memory that HWiNFO can give t
Dennis_Churaev [7]

Answer:

Some of the qualities of the installed memory which HWiNFO can reveal are:

  • Date of manufacture
  • Memory type
  • Speed of memory

Explanation:

HWiNFO is an open-source systems information app/tool which Windows users can utilize as they best wish. It helps to detect information about the make-up of computers especially hardware.

If you used HWiNFO to diagnose the memory, the following information will be called up:

  • the total size of the memory and its current performance settings
  • the size of each module, its manufacturer, and model
  • Date of manufacture
  • Memory type
  • Speed of memory
  • supported burst lengths and module timings,
  • write recovery time etc.

Cheers

6 0
3 years ago
Other questions:
  • Annabella was giving a presentation to a group of 20 real estate agents on
    15·2 answers
  • When did the silver market drop sharply, hurting Bolivia's income?
    7·2 answers
  • Apart from confidential information, what other information does NDA help to outline?
    15·1 answer
  • A speaker takes a variety of information from the results of a web search, and puts it together in an outline to make up his spe
    8·1 answer
  • Which of the following variable names is not valid? 1price 1 price price 1 price1
    15·2 answers
  • What is the quickest way to change the format of a table?
    8·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • Write a Java class with the following methods: getArray(int numStrings) is an instance method that takes command line input (use
    11·1 answer
  • Here is what my rob-lox user USED to look like, btw what is better, Samsung or apple?
    13·2 answers
  • you are investigating the use of website and url content filtering to prevent users from visiting certain websites. which benefi
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!