1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrrafil [7]
2 years ago
11

What is machine level language ?​

Computers and Technology
1 answer:
NeX [460]2 years ago
5 0

Answer:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1.

You might be interested in
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
3 years ago
You are flying on an ifr flight plan at 5500 feet with a vfr on top clearance when you encounter icing. you know there is clear
zepelin [54]

Answer:

A. Yes, you are still IFR with VFR-on-top clearance

Explanation:

Instrument Flight Rules (IFR) and Visual Flight Rules (VFR) are regulations controlling the operations of civil aviation. Pilots use these terms as well to describe their flight plan.

When your request is rejected to fly 9500 feet from atc, your VFR-on-top clearance is still active and you are still IFR.

8 0
3 years ago
Which of the following is an absolute cell reference
rodikova [14]

Answer:

The content of the cell is called an absolute cell reference.

Explanation:

Ms-excel can hold a value or string or number or formulas in each cell.  

The end-user can input the values to a cell and do any calculation by using inbuilt formulas and do the necessary calculation and get the output in the required cell  

When end-user try to copy and paste the data to another cell he or she can use paste special option where he or she can select values, by selecting values to end-user is just copying the data not formula this is called absolute reference of the cell

By using paste special end users copy the image or Unicode also.

This process is called an absolute cell reference

6 0
3 years ago
Data in the vendor master are grouped into which three segments? (A) General data, storage data, and purchasing data (B) General
sveticcg [70]

Answer:  (E) General data, accounting data and purchasing data

Explanation: Data in the vendor master data collection is the data that describes about the vendors that supply the firms or businesses. The record of the vendors are stored in the database which has subjects like address of vendor, name of vendor etc.

The segments or levels of the vendor master database are general data , purchasing data and the accounting data which gives the information about the good and services that are being supplied by the vendor along with his own details .

Other options are incorrect because inventory data, storage data and pricing data are not found in the data collection of vendor master .thus , the correct option is option(E).

   

6 0
3 years ago
Describe five ways in which Process Explorer (procexp) can be used in computer forensics as part of an investigation
nataly862011 [7]

Answer:

 The process explorer is mainly used for tracking the actual problems in the system. Process explorer is also known as proc-exp and it is also used as system monitoring where it monitor the microsoft window that are typically created by the SysInternals.  

The following are the five ways in which the proc-exp (Process explorer) are used in the computer forensics for the purpose of investigation are:

  • The process explorer mainly provide the various types of functionality to the task manager for monitoring the system properly.
  • It basically used in the system for tracking the main problems.
  • It used in computer forensics for tracking the system problems and it give the detail information about the system memory also.
  • It keeps track all the virus and malicious software in the computer system.
  • It helps for investigation purpose as by using the process explorer we can get all the information about the particular computer system and software.  

4 0
2 years ago
Other questions:
  • You can double-click a window’s title bar to maximize the window. true false
    9·1 answer
  • Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
    12·2 answers
  • What does a data bar in a cell represents​
    12·2 answers
  • A group of students are collaborating on an online research project. What is an example of appropriate online behavior?
    10·2 answers
  • Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices again
    6·1 answer
  • Write a program that takes an integer n as a parameter and sums all of the multiples of 2 or 5 from 1 to n. For example, if n =
    14·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • Set methods are also commonly called _____ methods, and get methods are also commonly called _____ methods.
    6·1 answer
  • Can somebody tell me the Minecraft command to clear an entire world and destroy every block if u Dunno please don’t answer >-
    13·1 answer
  • PLEASE HELP THIS IS CONFUSING ME
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!