1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
12

According to the video, what is used to create computer programs?

Computers and Technology
2 answers:
Lena [83]3 years ago
8 0
Its a or b. znskdbxkdb
Rufina [12.5K]3 years ago
8 0

Answer:

d maybe i don't know

Explanation:

You might be interested in
You want your computer to boot off of the network and have the ability to be brought out of sleep mode over the network. Which t
notsponge [240]

The two technologies should be implemented in the BIOS are PXE and WOL

<h3>What is the term above about?</h3>

WOL is known to be a term that connote that which is often used to put on (power on) and PXE is known to be a term that is often used for turning (booting) that is when one wants to load an OS from a remote server.

Conclusively, Note that  WoL often occurs before PXE and as such, he two technologies should be implemented in the BIOS are PXE and WOL.

Learn more about technologies  from

brainly.com/question/25110079

#SPJ1

4 0
2 years ago
Information systems that support the sales process of B2C companies are typically Web storefronts that customers use to enter an
RoseWind [281]

Answer:

This statement is CORRECT in electronic commerce and Online stores

Explanation:

The term B2C is derived from e-commerce which means Business to Consumer which describes  the process of selling goods and services directly to consumers who are the end-users. The advent of the dot com web boom led to a huge increase in these kinds of companies that sell directly to consumers through their online (website) channels.

3 0
3 years ago
Who are the best candidates for members of skills USA?
Kryger [21]

Answer:

Is there more to the question? But I have had this question already and the answer is B)

7 0
3 years ago
Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz
jonny [76]

Answer:

C. Z-wave

Explanation:

The Z wave is a wireless communications protocol used primarily for automation. The Z- wave operates using a mesh network and then uses low energy radio waves to communicate from appliance to appliance.

The Z wave operates on a lower frequency than most other popular RF devices, thus making interference nonexistent.

The range of the Z-wave is 100m. Hence, it can give a perfect coverage from the base station to the company.

<em>Option A is wrong</em> . This is because the Zigbee is insecure and has a low coverage range (10m-20m). This means that there are possibilities of interference and also improper coverage beyond 50 m.

<em>Option B is wrong.</em> This is because Bluetooth devices are insecure, can loose connections under certain conditions. They have a range of 10m which is a lot lower than 50m benchmark.

<em>Option D is wrong</em>. NFC stands for Near Field Communication. This means its range is practically about 4cm and it cannot be used for long ranges as the company intends.

6 0
4 years ago
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
Other questions:
  • Which of the following qualifies as a teamwork skill? A. Free associating B. Multitasking C. Listening D. Problem solving
    6·1 answer
  • To pinpoint an earthquake's location, scientists need information from how many seismometers?
    8·1 answer
  • Allison, a very close friend of yours, is about to give a presentation to the class. You know that she has procrastinated and is
    14·2 answers
  • What file system allows you to continue to add files to a CD or DVD disc after the initial burn, as long as there is room on the
    14·1 answer
  • Write a method that takes in a String and returns a new
    15·1 answer
  • Anyone can give me the definition of specification ?
    10·2 answers
  • Using the same Apple ID for multiple devices will definitely sync them all together <br> True/False
    7·2 answers
  • Question 10
    14·1 answer
  • How do you think Beyoncé choreography has/will influence the future of dance?
    9·2 answers
  • What are some benefits that each computer system being used?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!