1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
3 years ago
10

Algorithm that has been coded into something that can be run by a machine.

Computers and Technology
1 answer:
hram777 [196]3 years ago
8 0
The answer is program
You might be interested in
____________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities
ss7ja [257]

Answer:

D) Black -hat

Explanation:

if any other colors of the hats will not work cuz the only way to go dark and scary is to use the black hat

4 0
3 years ago
Read 2 more answers
Drivers should scan 10-12 secound down the road looking of potential hazards
Setler [38]
This statement is true.

Drivers should always scan the road ahead to check for any potential hazards so that they have enough time to safely avoid any dangerous situations. It is very important for a driver to be constantly scanning the road while driving to take in his or her surroundings.

Hope this answer helps! :)
8 0
3 years ago
True or false
atroni [7]

Answer:

for no.2 true and for Ctrl-Z False

Explanation:

Ctrl-z is and "undo" shortcut

not really sure about no.1 though, sorry :(

5 0
3 years ago
Edhesive assignment 1 movie ratings
Oliga [24]

Answer:

ok

Explanation:

3 0
3 years ago
When the "swen" virus infected someone's system, it made significant changes to the registry that caused it to be extremely diff
Effectus [21]
<span>In certain cases, when the Swen executable is removed or renamed by an anti virus program without stopping to fix the registry, it then will become impossible to run any executable files on the machine. This happens because windows will be unable to find the file that is associated with any executables on it's hard drive.</span>
7 0
3 years ago
Other questions:
  • Does toontown rewritten carry spyware or malware
    9·1 answer
  • What are ways to enter a formula in Excel? Check all that apply. Click on the Function Library group and select a function from
    10·2 answers
  • Why should you not perform any personal grooming task while driving?
    5·2 answers
  • Which sign or symbol will you use to lock cells for absolute cell reference
    5·1 answer
  • The "origin" of the cartesian plane in math is the point where x and y are both zero. Given a variable, origin of type Point-- a
    5·1 answer
  • Hurry answerrrrrrr pleaseee
    11·2 answers
  • economists measure the personal satisfaction someone gets from consuming goods and services with the concept of.....?
    6·1 answer
  • 35 POINTS
    10·1 answer
  • Submit your business presentation that clearly compares and contrasts three different cell phone service plans..
    14·2 answers
  • Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!