1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
3 years ago
8

*When a computer programmer is finished writing or developing a program, what has to happen first before the computer can unders

tand and utilize the code?
A.a service pack needs to be applied to the newly created program
B.the object code has to be translated into source code C.the source code has to be translated into object code
D.a device driver for the program has to be installed E.the programmer needs to obtain a software license
Computers and Technology
1 answer:
Alenkinab [10]3 years ago
5 0

Answer:

C. The source code has to be translated into object code.

You might be interested in
I just logged onto brainly and all my questions were deleted and i lost 2 brainliest. What has brainly done to my account I also
krok68 [10]
I’d say message Brainly directly through email!! it would be easier for them to help solve the issue since all we really can do is assume what happened, I hope you’re able to figure it out =)
5 0
3 years ago
Read 2 more answers
How to get the lightning round in dares of eternity
murzikaleks [220]

Based on the design and experience of Dares of eternity 2, to get the lightning round requires <u>playing the legend difficulty level and playing efficiently</u>.

According to the Dares of Eternity design team leader, Tom Farnsworth, "the Lightning Round has a random chance to occur at the end of any Dares of Eternity run."

Tom Farnsworth concluded that playing efficiently improves the chance a little and playing the Legend difficulty increases its chance of occurrence as well.

Hence, in this case, it is concluded that the correct answer is "<u>playing the legend difficulty </u>level<u> and playing efficiently</u>."

Learn more about Video games here: brainly.com/question/14468591

6 0
3 years ago
Write a method swaparrayends() that swaps the first and last elements of its array parameter. ex: sortarray = {10, 20, 30, 40} b
Alexus [3.1K]
In the C programming language, you can't determine the array size from the parameter, so you have to pass it in as an extra parameter. The solution could be:

#include <stdio.h>

void swaparrayends(int arr[], int nrElements)
{
int temp = arr[0];
arr[0] = arr[nrElements - 1];
arr[nrElements - 1] = temp;
}


void main()
{
int i;
int myArray[] = { 1,2,3,4,5 };
int nrElements = sizeof(myArray) / sizeof(myArray[0]);
swaparrayends(myArray, nrElements);

for (i = 0; i < nrElements; i++)
{
printf("%d ", myArray[i]);
}

getchar();
}

In higher languages like C# it becomes much simpler:

        static void Main(string[] args)
        {
            int[] myArray = {1, 2, 3, 4, 5};
            swaparrayends(myArray);
            foreach (var el in myArray)
            {
                Console.Write(el + " ");
            }

            Console.ReadLine();
        }

        static void swaparrayends(int[] arr)
        {
            int temp = arr[0];
            arr[0] = arr.Last();
            arr[arr.Length - 1] = temp;
        }

3 0
3 years ago
Based on the following quote from Leonardo Da Vinci, what would be his definition of a fine artist? “Principles for the Developm
zvonat [6]

Answer:

A fine artist is one who sees the things other don't see and make connections other don't make.

7 0
3 years ago
Read 2 more answers
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
Other questions:
  • In networking, what addressing type is used in sending an email to someone?
    6·1 answer
  • What is wrong with the following declaration? How should it be fixed?
    11·1 answer
  • What are the 6 external parts of a computer system
    5·1 answer
  • What is the FTC used car rule
    12·1 answer
  • Programs are normally stored in ________ and loaded into main memory as needed. the input device the output device secondary sto
    15·1 answer
  • State and give reason, if the following variables are valid/invalid:
    12·1 answer
  • How does one award the brainliest???? will give brainliest.
    8·2 answers
  • Which of the following tools helps ensure your document will open in older versions of word
    13·1 answer
  • Write the program to accept the radius of circle and find its diameter coding
    11·1 answer
  • Choose the correct color to complete the sentence.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!